Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Y8Q1voljvb.exe

Overview

General Information

Sample name:Y8Q1voljvb.exe
renamed because original name is a hash value
Original sample name:0c7fc6fd424661d954ddf30325f8c98aed5b144cdf24a4197225d691be16f730.exe
Analysis ID:1587877
MD5:d1642b4a6a94d085fabfd70a2ac37deb
SHA1:6c00daa9f86d1afcdfdb47cf3a4555eb242d5d21
SHA256:0c7fc6fd424661d954ddf30325f8c98aed5b144cdf24a4197225d691be16f730
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Y8Q1voljvb.exe (PID: 6944 cmdline: "C:\Users\user\Desktop\Y8Q1voljvb.exe" MD5: D1642B4A6A94D085FABFD70A2AC37DEB)
    • RegSvcs.exe (PID: 1244 cmdline: "C:\Users\user\Desktop\Y8Q1voljvb.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.alltoursegypt.com", "Username": "admin@alltoursegypt.com", "Password": "OPldome23#12klein"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3753903730.0000000002C7C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x34edb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x34f4d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x34fd7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x35069:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x350d3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x35145:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x351db:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x3526b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000002.00000002.3752702335.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 7 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x34edb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x34f4d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x34fd7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x35069:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x350d3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x35145:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x351db:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x3526b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              0.2.Y8Q1voljvb.exe.2450000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.Y8Q1voljvb.exe.2450000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 4 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 192.254.186.165, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 1244, Protocol: tcp, SourceIp: 192.168.2.10, SourceIsIpv6: false, SourcePort: 49733
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.alltoursegypt.com", "Username": "admin@alltoursegypt.com", "Password": "OPldome23#12klein"}
                  Source: Y8Q1voljvb.exeVirustotal: Detection: 56%Perma Link
                  Source: Y8Q1voljvb.exeReversingLabs: Detection: 71%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: Y8Q1voljvb.exeJoe Sandbox ML: detected
                  Source: Y8Q1voljvb.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.10:49717 version: TLS 1.2
                  Source: Binary string: wntdll.pdbUGP source: Y8Q1voljvb.exe, 00000000.00000003.1314361052.0000000003FA0000.00000004.00001000.00020000.00000000.sdmp, Y8Q1voljvb.exe, 00000000.00000003.1315702339.0000000004140000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: Y8Q1voljvb.exe, 00000000.00000003.1314361052.0000000003FA0000.00000004.00001000.00020000.00000000.sdmp, Y8Q1voljvb.exe, 00000000.00000003.1315702339.0000000004140000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0090DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0090DBBE
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008DC2A2 FindFirstFileExW,0_2_008DC2A2
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_009168EE FindFirstFileW,FindClose,0_2_009168EE
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0091698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0091698F
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0090D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0090D076
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0090D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0090D3A9
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00919642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00919642
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0091979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0091979D
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00919B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00919B2B
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00915C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00915C97
                  Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                  Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                  Source: Joe Sandbox ViewIP Address: 192.254.186.165 192.254.186.165
                  Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0091CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0091CE44
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                  Source: global trafficDNS traffic detected: DNS query: mail.alltoursegypt.com
                  Source: RegSvcs.exe, 00000002.00000002.3753903730.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002E0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://alltoursegypt.com
                  Source: RegSvcs.exe, 00000002.00000002.3753903730.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002E0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.alltoursegypt.com
                  Source: RegSvcs.exe, 00000002.00000002.3753903730.0000000002C84000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753437117.0000000000F80000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3757328496.0000000005E60000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753437117.0000000000FB7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002E0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/01
                  Source: RegSvcs.exe, 00000002.00000002.3753903730.0000000002C84000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753437117.0000000000F80000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3757328496.0000000005E60000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753437117.0000000000FB7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002E0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                  Source: RegSvcs.exe, 00000002.00000002.3753903730.0000000002C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000002.00000002.3757328496.0000000005EF7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002C84000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3757328496.0000000005E60000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753437117.0000000000FB7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002E0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: RegSvcs.exe, 00000002.00000002.3757328496.0000000005EF7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002C84000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3757328496.0000000005E60000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753437117.0000000000FB7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002E0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: Y8Q1voljvb.exe, 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3752702335.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: Y8Q1voljvb.exe, 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3752702335.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                  Source: RegSvcs.exe, 00000002.00000002.3753903730.0000000002C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                  Source: RegSvcs.exe, 00000002.00000002.3753903730.0000000002C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.10:49717 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0091EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0091EAFF
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0091ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0091ED6A
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0091EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0091EAFF
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0090AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0090AA57
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00939576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00939576

                  System Summary

                  barindex
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.Y8Q1voljvb.exe.2450000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.Y8Q1voljvb.exe.2450000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: Y8Q1voljvb.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: Y8Q1voljvb.exe, 00000000.00000000.1280596281.0000000000962000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2032c470-3
                  Source: Y8Q1voljvb.exe, 00000000.00000000.1280596281.0000000000962000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_aa0acce9-3
                  Source: Y8Q1voljvb.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_426e3137-b
                  Source: Y8Q1voljvb.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_ec6a3254-3
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0090D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0090D5EB
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00901201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00901201
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0090E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0090E8F6
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_009120460_2_00912046
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008A80600_2_008A8060
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_009082980_2_00908298
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008DE4FF0_2_008DE4FF
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008D676B0_2_008D676B
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_009348730_2_00934873
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008CCAA00_2_008CCAA0
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008ACAF00_2_008ACAF0
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008BCC390_2_008BCC39
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008D6DD90_2_008D6DD9
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008A91C00_2_008A91C0
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008BB1190_2_008BB119
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C13940_2_008C1394
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C17060_2_008C1706
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C781B0_2_008C781B
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C19B00_2_008C19B0
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008A79200_2_008A7920
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008B997D0_2_008B997D
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C7A4A0_2_008C7A4A
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C7CA70_2_008C7CA7
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C1C770_2_008C1C77
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008D9EEE0_2_008D9EEE
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0092BE440_2_0092BE44
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C1F320_2_008C1F32
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_019133580_2_01913358
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00F641C82_2_00F641C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00F6A1B02_2_00F6A1B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00F6A9782_2_00F6A978
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00F64A982_2_00F64A98
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00F63E802_2_00F63E80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00F6F9C82_2_00F6F9C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00F61BB12_2_00F61BB1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05745E682_2_05745E68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057493202_2_05749320
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0574A2602_2_0574A260
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0574E2082_2_0574E208
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05743DE02_2_05743DE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0574C4A02_2_0574C4A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057457882_2_05745788
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057436902_2_05743690
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057403382_2_05740338
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: String function: 008BF9F2 appears 40 times
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: String function: 008C0A30 appears 46 times
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: String function: 008A9CB3 appears 31 times
                  Source: Y8Q1voljvb.exe, 00000000.00000003.1314538508.000000000426D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Y8Q1voljvb.exe
                  Source: Y8Q1voljvb.exe, 00000000.00000003.1316060131.0000000004113000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Y8Q1voljvb.exe
                  Source: Y8Q1voljvb.exe, 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename106790a0-b81d-4bde-9832-48ebd9bb7fec.exe4 vs Y8Q1voljvb.exe
                  Source: Y8Q1voljvb.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.Y8Q1voljvb.exe.2450000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.Y8Q1voljvb.exe.2450000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_009137B5 GetLastError,FormatMessageW,0_2_009137B5
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_009010BF AdjustTokenPrivileges,CloseHandle,0_2_009010BF
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_009016C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_009016C3
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_009151CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_009151CD
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0092A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0092A67C
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0091648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0091648E
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008A42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_008A42A2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeFile created: C:\Users\user\AppData\Local\Temp\aut6A2B.tmpJump to behavior
                  Source: Y8Q1voljvb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Y8Q1voljvb.exeVirustotal: Detection: 56%
                  Source: Y8Q1voljvb.exeReversingLabs: Detection: 71%
                  Source: unknownProcess created: C:\Users\user\Desktop\Y8Q1voljvb.exe "C:\Users\user\Desktop\Y8Q1voljvb.exe"
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Y8Q1voljvb.exe"
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Y8Q1voljvb.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: Y8Q1voljvb.exeStatic file information: File size 1139712 > 1048576
                  Source: Y8Q1voljvb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: Y8Q1voljvb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: Y8Q1voljvb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: Y8Q1voljvb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Y8Q1voljvb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: Y8Q1voljvb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: Y8Q1voljvb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: Y8Q1voljvb.exe, 00000000.00000003.1314361052.0000000003FA0000.00000004.00001000.00020000.00000000.sdmp, Y8Q1voljvb.exe, 00000000.00000003.1315702339.0000000004140000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: Y8Q1voljvb.exe, 00000000.00000003.1314361052.0000000003FA0000.00000004.00001000.00020000.00000000.sdmp, Y8Q1voljvb.exe, 00000000.00000003.1315702339.0000000004140000.00000004.00001000.00020000.00000000.sdmp
                  Source: Y8Q1voljvb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: Y8Q1voljvb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: Y8Q1voljvb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: Y8Q1voljvb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: Y8Q1voljvb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008A42DE
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C0A76 push ecx; ret 0_2_008C0A89
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0191373C push ebx; retf 0_2_0191373D
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0191394B push esp; iretd 0_2_0191394E
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_01913AA9 push 48324D47h; retf 0_2_01913AB1
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_01913FBB push 48324D4Fh; retf 0_2_01913FC5
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_01913E1D push 48324D4Eh; retf 0_2_01913E25
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00F60C45 push ebx; retf 2_2_00F60C52
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0574ABF9 push ecx; iretd 2_2_0574AC00
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008BF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_008BF98E
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00931C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00931C41
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-98288
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeAPI/Special instruction interceptor: Address: 1912F7C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2384Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7443Jump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeAPI coverage: 3.9 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0090DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0090DBBE
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008DC2A2 FindFirstFileExW,0_2_008DC2A2
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_009168EE FindFirstFileW,FindClose,0_2_009168EE
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0091698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0091698F
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0090D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0090D076
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0090D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0090D3A9
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00919642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00919642
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0091979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0091979D
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00919B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00919B2B
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00915C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00915C97
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008A42DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99884Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99216Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99108Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98672Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98563Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98078Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97969Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99873Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99761Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99655Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99340Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99232Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99125Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99015Jump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.3757328496.0000000005E60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0091EAA2 BlockInput,0_2_0091EAA2
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008D2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008D2622
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008A42DE
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C4CE8 mov eax, dword ptr fs:[00000030h]0_2_008C4CE8
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_019131E8 mov eax, dword ptr fs:[00000030h]0_2_019131E8
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_01913248 mov eax, dword ptr fs:[00000030h]0_2_01913248
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_01911B88 mov eax, dword ptr fs:[00000030h]0_2_01911B88
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00900B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00900B62
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008D2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008D2622
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008C083F
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C09D5 SetUnhandledExceptionFilter,0_2_008C09D5
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_008C0C21
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: BD9008Jump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00901201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00901201
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008E2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_008E2BA5
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_0090B226 SendInput,keybd_event,0_2_0090B226
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_009222DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_009222DA
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Y8Q1voljvb.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00900B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00900B62
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00901663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00901663
                  Source: Y8Q1voljvb.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: Y8Q1voljvb.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008C0698 cpuid 0_2_008C0698
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00918195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00918195
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008FD27A GetUserNameW,0_2_008FD27A
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008DB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_008DB952
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_008A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008A42DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Y8Q1voljvb.exe.2450000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Y8Q1voljvb.exe.2450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3753903730.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3752702335.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3753903730.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Y8Q1voljvb.exe PID: 6944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1244, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Y8Q1voljvb.exeBinary or memory string: WIN_81
                  Source: Y8Q1voljvb.exeBinary or memory string: WIN_XP
                  Source: Y8Q1voljvb.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                  Source: Y8Q1voljvb.exeBinary or memory string: WIN_XPe
                  Source: Y8Q1voljvb.exeBinary or memory string: WIN_VISTA
                  Source: Y8Q1voljvb.exeBinary or memory string: WIN_7
                  Source: Y8Q1voljvb.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Y8Q1voljvb.exe.2450000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Y8Q1voljvb.exe.2450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3752702335.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3753903730.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Y8Q1voljvb.exe PID: 6944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1244, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Y8Q1voljvb.exe.2450000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Y8Q1voljvb.exe.2450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3753903730.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3752702335.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3753903730.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Y8Q1voljvb.exe PID: 6944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1244, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00921204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00921204
                  Source: C:\Users\user\Desktop\Y8Q1voljvb.exeCode function: 0_2_00921806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00921806
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets331
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts221
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials221
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Y8Q1voljvb.exe57%VirustotalBrowse
                  Y8Q1voljvb.exe71%ReversingLabsWin32.Trojan.AutoitInject
                  Y8Q1voljvb.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://alltoursegypt.com0%Avira URL Cloudsafe
                  http://mail.alltoursegypt.com0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  api.ipify.org
                  104.26.12.205
                  truefalse
                    high
                    alltoursegypt.com
                    192.254.186.165
                    truetrue
                      unknown
                      mail.alltoursegypt.com
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://mail.alltoursegypt.comRegSvcs.exe, 00000002.00000002.3753903730.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002E0D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.ipify.orgY8Q1voljvb.exe, 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3752702335.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                            high
                            http://r10.o.lencr.org0#RegSvcs.exe, 00000002.00000002.3753903730.0000000002C84000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753437117.0000000000F80000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3757328496.0000000005E60000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753437117.0000000000FB7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002E0D000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://r10.i.lencr.org/01RegSvcs.exe, 00000002.00000002.3753903730.0000000002C84000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753437117.0000000000F80000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3757328496.0000000005E60000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753437117.0000000000FB7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002E0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://account.dyn.com/Y8Q1voljvb.exe, 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3752702335.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                  high
                                  https://api.ipify.org/tRegSvcs.exe, 00000002.00000002.3753903730.0000000002C01000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3753903730.0000000002C01000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://x1.c.lencr.org/0RegSvcs.exe, 00000002.00000002.3757328496.0000000005EF7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002C84000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3757328496.0000000005E60000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753437117.0000000000FB7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002E0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://x1.i.lencr.org/0RegSvcs.exe, 00000002.00000002.3757328496.0000000005EF7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002C84000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3757328496.0000000005E60000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753437117.0000000000FB7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002E0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://alltoursegypt.comRegSvcs.exe, 00000002.00000002.3753903730.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3753903730.0000000002E0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          104.26.12.205
                                          api.ipify.orgUnited States
                                          13335CLOUDFLARENETUSfalse
                                          192.254.186.165
                                          alltoursegypt.comUnited States
                                          46606UNIFIEDLAYER-AS-1UStrue
                                          Joe Sandbox version:42.0.0 Malachite
                                          Analysis ID:1587877
                                          Start date and time:2025-01-10 18:56:23 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 7m 59s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:7
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:Y8Q1voljvb.exe
                                          renamed because original name is a hash value
                                          Original Sample Name:0c7fc6fd424661d954ddf30325f8c98aed5b144cdf24a4197225d691be16f730.exe
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@3/2@2/2
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 99%
                                          • Number of executed functions: 49
                                          • Number of non-executed functions: 299
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                          • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
                                          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                          TimeTypeDescription
                                          12:57:21API Interceptor11311431x Sleep call for process: RegSvcs.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          104.26.12.205Yoranis Setup.exeGet hashmaliciousUnknownBrowse
                                          • api.ipify.org/
                                          RtU8kXPnKr.exeGet hashmaliciousQuasarBrowse
                                          • api.ipify.org/
                                          jgbC220X2U.exeGet hashmaliciousUnknownBrowse
                                          • api.ipify.org/?format=text
                                          xKvkNk9SXR.exeGet hashmaliciousTrojanRansomBrowse
                                          • api.ipify.org/
                                          GD8c7ARn8q.exeGet hashmaliciousTrojanRansomBrowse
                                          • api.ipify.org/
                                          8AbMCL2dxM.exeGet hashmaliciousRCRU64, TrojanRansomBrowse
                                          • api.ipify.org/
                                          Simple2.exeGet hashmaliciousUnknownBrowse
                                          • api.ipify.org/
                                          Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
                                          • api.ipify.org/
                                          Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                          • api.ipify.org/
                                          6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                                          • api.ipify.org/
                                          192.254.186.165EZZGTmJj4O.exeGet hashmaliciousAgentTeslaBrowse
                                            4089137200.exeGet hashmaliciousAgentTeslaBrowse
                                              rDOC24INV0616.exeGet hashmaliciousAgentTeslaBrowse
                                                INVOICE NO. USF23-24072 IGR23110.exeGet hashmaliciousAgentTeslaBrowse
                                                  Shipping Documents 72908672134.exeGet hashmaliciousAgentTeslaBrowse
                                                    PUK ITALIA PO 120610549.EXE.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      api.ipify.orgIUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      DpTbBYeE7J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 104.26.12.205
                                                      RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                      • 104.26.13.205
                                                      7DpzcPcsTS.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 172.67.74.152
                                                      B8FnDUj8hy.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      FSRHC6mB16.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 172.67.74.152
                                                      9pIm5d0rsW.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                      • 104.26.13.205
                                                      VYLigyTDuW.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 172.67.74.152
                                                      gem1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                      • 104.26.12.205
                                                      https://www.tremendous.com/email/activate/yE_yBdRtyVv4Xqgg7hu_Get hashmaliciousUnknownBrowse
                                                      • 172.67.74.152
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      CLOUDFLARENETUSofZiNLLKZU.exeGet hashmaliciousFormBookBrowse
                                                      • 104.21.28.65
                                                      xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 104.21.112.1
                                                      3HnH4uJtE7.exeGet hashmaliciousFormBookBrowse
                                                      • 104.21.48.233
                                                      https://www.mentimeter.com/app/presentation/alp52o7zih4ubnvbqe9pvb585a1z3bd7/edit?source=share-modalGet hashmaliciousUnknownBrowse
                                                      • 104.17.25.14
                                                      AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.64.1
                                                      eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.64.1
                                                      Encrypted_Archive_2025_LHC1W64SMW.htmlGet hashmaliciousHTMLPhisherBrowse
                                                      • 104.17.25.14
                                                      MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.96.1
                                                      3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.80.1
                                                      SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.16.1
                                                      UNIFIEDLAYER-AS-1USsecured File__esperion.com.htmlGet hashmaliciousPhisherBrowse
                                                      • 162.241.149.91
                                                      secured File__esperion.com.htmlGet hashmaliciousPhisherBrowse
                                                      • 162.241.149.91
                                                      XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 162.241.62.63
                                                      NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 162.241.62.63
                                                      B8FnDUj8hy.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 192.254.225.136
                                                      FSRHC6mB16.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 50.87.144.157
                                                      9pIm5d0rsW.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                      • 50.87.144.157
                                                      armv6l.elfGet hashmaliciousUnknownBrowse
                                                      • 76.162.166.146
                                                      https://sacredartscommunications.com/Get hashmaliciousHTMLPhisherBrowse
                                                      • 192.185.25.242
                                                      http://abdullaksa.com/fetching//index.xml#?email=Z2xhbGlja2VyQGhpbGNvcnAuY29tGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                      • 192.185.118.129
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      3b5074b1b5d032e5620f69f9f700ff0eMWP0FO5rAF.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.12.205
                                                      MWP0FO5rAF.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.12.205
                                                      AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.26.12.205
                                                      eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.26.12.205
                                                      grW5hyK960.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.12.205
                                                      MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.26.12.205
                                                      grW5hyK960.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.12.205
                                                      r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 104.26.12.205
                                                      RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 104.26.12.205
                                                      IUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.12.205
                                                      No context
                                                      Process:C:\Users\user\Desktop\Y8Q1voljvb.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):160038
                                                      Entropy (8bit):7.915872806925297
                                                      Encrypted:false
                                                      SSDEEP:3072:9qI3CWB1yt8MnUwp14tbweLFLfmedXZhkxxzzxRZDJP3b/m/:9LBQLUwpveLFLdXZhEzhDJP3b/m/
                                                      MD5:22B332D9BEDF203C770BA09315F41A01
                                                      SHA1:BF3FEDE6D9EC7B9AEB22FD7F81EA9D4F1AB1D5CD
                                                      SHA-256:2CAAC44A6241751AF282E9AC65E338FEFB4B90BD55A452F11F239DDC04A5CF6B
                                                      SHA-512:9146359C49E759AC84AB2E1F53E5A228CA5C2ADDE42EB8959A19629B85E7B3F0C0C9E3E24C059F870178DFD65E55A4E4227F3C2A9EBDBDBD4416D1F96D1B6D95
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:EA06.......5j.R.W..(T=...G.S.5z}".N...Z.Z..4P@..mJ.G...f..5....C..)5..#5n.R`X..r.(.....M#.[f2.L.C5..e....h.K..h.F.,...:...t.N.v.H..j......4kCW..ht.4...U.U..,|.4.=B..hj)`.D"kA..A.Z.R..i.(..Z.J..i.}J..S.5z}`.i.Mh4`..T.4; ..Q...iA... ._=Z.N.........J.....M.@..;c.K..@......"@.......'z.N...y..b.h.N[ .B..4}.`._...M.Y&.Y..iO.Q....L.( .....w....8.`...8.*.z.W.@..m4.=L..R)......k.y<.l.*.......C9r.I9..o....0z<>...y.8.J....KT...........m.?.\.'\...n.o..I.s.|.9?..e.J....Zlr8...E..f....e.I...o....:.f..[.Gb......N$ViL.{^...Sy..a>.U.. ..c..a}_..bIJ...Z.*.E...==.~.U.F=\}..l..K.4......P.@....@..u.0..~..A.[1R..u.@.BJ.h[...`....i.?..]#..G..K......~.#gc..VI.f]....[<...y...^UnU..E..M....Ia...jGH._".*.B.Q.T(.zu....o....N.M.Ri3.$"...kr.m....u2=Y...L.. .lkj....1.........r9..F.}V.U7.~.S.C.O%rY..#.Z'R..vIC.].P....$.K&.7X.Sit.E.t...*.%..H....=B...W...d....J!.J.N.U.P......k..f.u6q5...........EB.G.\....\..S*.`.Ai..)3.]:.S....*l....uH...U.oi.....N..m.E*.m.r...eV....(
                                                      Process:C:\Users\user\Desktop\Y8Q1voljvb.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):247296
                                                      Entropy (8bit):6.6620529616798585
                                                      Encrypted:false
                                                      SSDEEP:3072:kv283F5IUr7j8mAVxSCBs1JJsR31u8eEXuRHJ797GiHPqM/vljnyudnumhR0tHWQ:IkG7jNEX2Rhv/NjnDtum3O2K59
                                                      MD5:5E2C7A03343830D089C12A1C48D3237C
                                                      SHA1:1FCA223AC62714E92F50D13366DC4BF7DE0371BA
                                                      SHA-256:7C274F4E8CA6FD0C6C4E3ED5310487D7CE687427893008A7CA62171B4EEA68C1
                                                      SHA-512:873F5B1D0D4B446A08FC2F63499D8E95C066E6EE00433423998B3313BF27DBBC61B06A880161D986A976D7C191A9F8BDAD1DD96E99F5D322A6754B3A837966C7
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:.o.VQTBWETBC..JG.NAWOHHN.2H5AVRTBWATBCMRJGPNAWOHHNM2H5AVRTBW.TBCCM.IP.H.n.I....](%r$08&&#.m1+)>!5w--h<8\h\/v...w,;&&c_GMtNAWOHHN.wH5.WQT6..1BCMRJGPN.WMICOF2H.BVR\BWATBC.IGPnAWO.KNM2.5AvRTBUATFCMRJGPNEWOHHNM2H.EVRVBWATBCOR..PNQWOXHNM2X5AFRTBWATRCMRJGPNAWOH .N2.5AVR.AW.QBCMRJGPNAWOHHNM2H5AVVTNWATBCMRJGPNAWOHHNM2H5AVRTBWATBCMRJGPNAWOHHNM2H5AVRTBwATJCMRJGPNAWOH@nM2.5AVRTBWATBCc&/?$NAW..KNM.H5A.QTBUATBCMRJGPNAWOHhNMRfG2$1TBW.QBCM.IGPHAWO.KNM2H5AVRTBWAT.CM.d55".4OHDNM2H5EVRVBWA.ACMRJGPNAWOHHN.2HwAVRTBWATBCMRJGPN.LHHNM2.5AVPTGW..@CYiKGSNAWNHHHM2H5AVRTBWATBCMRJGPNAWOHHNM2H5AVRTBWATBCMRJGPNAWR......+l^ P.r.$.Q..C.....G.X.3!...O....j'L..N.X...D....#.\G.@....r'[?O?.?gA,.U....ic#...E#.0...?e.&Nj....pq....[6....3.."8"f)>=^-..7450>.V.BMRJG........$J.olU]JvE9....~U(....6NM2,5AV TBW TBC.RJG?NAW!HHN32H5?VRT.WAT.CMR}GPNdWOH%NM2l5AV,TBW.)ML...#.WOHHNx....;.....c..d;...#o...*.y.oD..[*.6.....D.%..X.#Hn|.2@PVQ@PEWN~C....oCSKMJII1D.O....v.r.t..!....2.2M2H5AV.TB.ATB..R.GPN.W.H..M2H..V.T.W...C
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):7.000149398870638
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:Y8Q1voljvb.exe
                                                      File size:1'139'712 bytes
                                                      MD5:d1642b4a6a94d085fabfd70a2ac37deb
                                                      SHA1:6c00daa9f86d1afcdfdb47cf3a4555eb242d5d21
                                                      SHA256:0c7fc6fd424661d954ddf30325f8c98aed5b144cdf24a4197225d691be16f730
                                                      SHA512:5d2e5645c943cc729a1daf24147a67334df9cdfddd90c693d5be606db255bfc131b4ddac6851e76404f0a0e32d8dc7417ee0521838fc81c72e562b413bc0f696
                                                      SSDEEP:24576:OqDEvCTbMWu7rQYlBQcBiT6rprG8ag4mjRxL:OTvC/MTQYxsWR7agp9x
                                                      TLSH:A835BF0273D1C062FF9BA2334F5AF6515ABC69260123E61F13981DB9BE701B1563E7A3
                                                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                      Icon Hash:aaf3e3e3938382a0
                                                      Entrypoint:0x420577
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x6762E7E3 [Wed Dec 18 15:18:59 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:1
                                                      File Version Major:5
                                                      File Version Minor:1
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:1
                                                      Import Hash:948cc502fe9226992dce9417f952fce3
                                                      Instruction
                                                      call 00007F34FCD9F7A3h
                                                      jmp 00007F34FCD9F0AFh
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      push dword ptr [ebp+08h]
                                                      mov esi, ecx
                                                      call 00007F34FCD9F28Dh
                                                      mov dword ptr [esi], 0049FDF0h
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      and dword ptr [ecx+04h], 00000000h
                                                      mov eax, ecx
                                                      and dword ptr [ecx+08h], 00000000h
                                                      mov dword ptr [ecx+04h], 0049FDF8h
                                                      mov dword ptr [ecx], 0049FDF0h
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      push dword ptr [ebp+08h]
                                                      mov esi, ecx
                                                      call 00007F34FCD9F25Ah
                                                      mov dword ptr [esi], 0049FE0Ch
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      and dword ptr [ecx+04h], 00000000h
                                                      mov eax, ecx
                                                      and dword ptr [ecx+08h], 00000000h
                                                      mov dword ptr [ecx+04h], 0049FE14h
                                                      mov dword ptr [ecx], 0049FE0Ch
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      mov esi, ecx
                                                      lea eax, dword ptr [esi+04h]
                                                      mov dword ptr [esi], 0049FDD0h
                                                      and dword ptr [eax], 00000000h
                                                      and dword ptr [eax+04h], 00000000h
                                                      push eax
                                                      mov eax, dword ptr [ebp+08h]
                                                      add eax, 04h
                                                      push eax
                                                      call 00007F34FCDA1E4Dh
                                                      pop ecx
                                                      pop ecx
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      lea eax, dword ptr [ecx+04h]
                                                      mov dword ptr [ecx], 0049FDD0h
                                                      push eax
                                                      call 00007F34FCDA1E98h
                                                      pop ecx
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      mov esi, ecx
                                                      lea eax, dword ptr [esi+04h]
                                                      mov dword ptr [esi], 0049FDD0h
                                                      push eax
                                                      call 00007F34FCDA1E81h
                                                      test byte ptr [ebp+08h], 00000001h
                                                      pop ecx
                                                      Programming Language:
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x3f9c4.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1140000x7594.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xd40000x3f9c40x3fa00c99e63b3842afe124e810252c858e5d0False0.8969179764243614data7.820696356442517IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x1140000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                      RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                      RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                      RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                      RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                      RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                      RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                      RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                      RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                      RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                      RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                      RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                      RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                      RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                      RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                      RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                      RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                      RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                      RT_RCDATA0xdc7b80x36c8bdata1.0003386884734509
                                                      RT_GROUP_ICON0x1134440x76dataEnglishGreat Britain0.6610169491525424
                                                      RT_GROUP_ICON0x1134bc0x14dataEnglishGreat Britain1.25
                                                      RT_GROUP_ICON0x1134d00x14dataEnglishGreat Britain1.15
                                                      RT_GROUP_ICON0x1134e40x14dataEnglishGreat Britain1.25
                                                      RT_VERSION0x1134f80xdcdataEnglishGreat Britain0.6181818181818182
                                                      RT_MANIFEST0x1135d40x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                      DLLImport
                                                      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                      PSAPI.DLLGetProcessMemoryInfo
                                                      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                      UxTheme.dllIsThemeActive
                                                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                      USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                      GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                      OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 10, 2025 18:57:20.495815039 CET49717443192.168.2.10104.26.12.205
                                                      Jan 10, 2025 18:57:20.495843887 CET44349717104.26.12.205192.168.2.10
                                                      Jan 10, 2025 18:57:20.495938063 CET49717443192.168.2.10104.26.12.205
                                                      Jan 10, 2025 18:57:20.502399921 CET49717443192.168.2.10104.26.12.205
                                                      Jan 10, 2025 18:57:20.502417088 CET44349717104.26.12.205192.168.2.10
                                                      Jan 10, 2025 18:57:21.140002966 CET44349717104.26.12.205192.168.2.10
                                                      Jan 10, 2025 18:57:21.140171051 CET49717443192.168.2.10104.26.12.205
                                                      Jan 10, 2025 18:57:21.193217039 CET49717443192.168.2.10104.26.12.205
                                                      Jan 10, 2025 18:57:21.193247080 CET44349717104.26.12.205192.168.2.10
                                                      Jan 10, 2025 18:57:21.193568945 CET44349717104.26.12.205192.168.2.10
                                                      Jan 10, 2025 18:57:21.245217085 CET49717443192.168.2.10104.26.12.205
                                                      Jan 10, 2025 18:57:21.426312923 CET49717443192.168.2.10104.26.12.205
                                                      Jan 10, 2025 18:57:21.467329979 CET44349717104.26.12.205192.168.2.10
                                                      Jan 10, 2025 18:57:21.547163010 CET44349717104.26.12.205192.168.2.10
                                                      Jan 10, 2025 18:57:21.547233105 CET44349717104.26.12.205192.168.2.10
                                                      Jan 10, 2025 18:57:21.547450066 CET49717443192.168.2.10104.26.12.205
                                                      Jan 10, 2025 18:57:21.576931000 CET49717443192.168.2.10104.26.12.205
                                                      Jan 10, 2025 18:57:22.962757111 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:22.968269110 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:22.968354940 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:23.712574959 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:23.713610888 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:23.719583988 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.038227081 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.038579941 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:24.043354988 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.209523916 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.210046053 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:24.215091944 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.374253988 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.374298096 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.374314070 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.374325037 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.374361992 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:24.444756031 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:24.449532032 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.608817101 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.611412048 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:24.616241932 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.763225079 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.767074108 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:24.771923065 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.918626070 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:24.923254013 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:24.928085089 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:27.328244925 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:27.328643084 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:27.333529949 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:27.489676952 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:27.491072893 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:27.491166115 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:27.497634888 CET49733587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:27.502437115 CET58749733192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:27.552531004 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:27.557837009 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:27.557957888 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:28.249882936 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:28.250205040 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:28.255384922 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:28.420805931 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:28.420939922 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:28.426306963 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:28.570619106 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:28.571248055 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:28.576282978 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:28.764739990 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:28.764760017 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:28.764775038 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:28.764894962 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:28.766561985 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:28.771344900 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:28.914716005 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:28.915899992 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:28.921036005 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:29.072320938 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:29.074738979 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:29.079540968 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:33.233583927 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:33.233922958 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:33.238740921 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:35.394627094 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:35.397037983 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:35.402008057 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:35.551297903 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:35.552153111 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:35.552740097 CET58749758192.254.186.165192.168.2.10
                                                      Jan 10, 2025 18:57:35.552881956 CET49758587192.168.2.10192.254.186.165
                                                      Jan 10, 2025 18:57:35.556889057 CET58749758192.254.186.165192.168.2.10
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 10, 2025 18:57:20.481657028 CET6102253192.168.2.101.1.1.1
                                                      Jan 10, 2025 18:57:20.488828897 CET53610221.1.1.1192.168.2.10
                                                      Jan 10, 2025 18:57:22.547620058 CET5708353192.168.2.101.1.1.1
                                                      Jan 10, 2025 18:57:22.961395025 CET53570831.1.1.1192.168.2.10
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jan 10, 2025 18:57:20.481657028 CET192.168.2.101.1.1.10x626fStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                      Jan 10, 2025 18:57:22.547620058 CET192.168.2.101.1.1.10xe8e5Standard query (0)mail.alltoursegypt.comA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jan 10, 2025 18:57:20.488828897 CET1.1.1.1192.168.2.100x626fNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 18:57:20.488828897 CET1.1.1.1192.168.2.100x626fNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 18:57:20.488828897 CET1.1.1.1192.168.2.100x626fNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 18:57:22.961395025 CET1.1.1.1192.168.2.100xe8e5No error (0)mail.alltoursegypt.comalltoursegypt.comCNAME (Canonical name)IN (0x0001)false
                                                      Jan 10, 2025 18:57:22.961395025 CET1.1.1.1192.168.2.100xe8e5No error (0)alltoursegypt.com192.254.186.165A (IP address)IN (0x0001)false
                                                      • api.ipify.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.1049717104.26.12.2054431244C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-10 17:57:21 UTC155OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                      Host: api.ipify.org
                                                      Connection: Keep-Alive
                                                      2025-01-10 17:57:21 UTC426INHTTP/1.1 200 OK
                                                      Date: Fri, 10 Jan 2025 17:57:21 GMT
                                                      Content-Type: text/plain
                                                      Content-Length: 12
                                                      Connection: close
                                                      Vary: Origin
                                                      CF-Cache-Status: DYNAMIC
                                                      Server: cloudflare
                                                      CF-RAY: 8ffe8c893b4a43e3-EWR
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=21755&min_rtt=21755&rtt_var=10877&sent=6&recv=7&lost=0&retrans=1&sent_bytes=4178&recv_bytes=769&delivery_rate=57495&cwnd=229&unsent_bytes=0&cid=2642d27d2e6dfa9d&ts=467&x=0"
                                                      2025-01-10 17:57:21 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                      Data Ascii: 8.46.123.189


                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                      Jan 10, 2025 18:57:23.712574959 CET58749733192.254.186.165192.168.2.10220-gator3170.hostgator.com ESMTP Exim 4.96.2 #2 Fri, 10 Jan 2025 11:57:23 -0600
                                                      220-We do not authorize the use of this system to transport unsolicited,
                                                      220 and/or bulk e-mail.
                                                      Jan 10, 2025 18:57:23.713610888 CET49733587192.168.2.10192.254.186.165EHLO 367706
                                                      Jan 10, 2025 18:57:24.038227081 CET58749733192.254.186.165192.168.2.10250-gator3170.hostgator.com Hello 367706 [8.46.123.189]
                                                      250-SIZE 52428800
                                                      250-8BITMIME
                                                      250-PIPELINING
                                                      250-PIPECONNECT
                                                      250-AUTH PLAIN LOGIN
                                                      250-STARTTLS
                                                      250 HELP
                                                      Jan 10, 2025 18:57:24.038579941 CET49733587192.168.2.10192.254.186.165STARTTLS
                                                      Jan 10, 2025 18:57:24.209523916 CET58749733192.254.186.165192.168.2.10220 TLS go ahead
                                                      Jan 10, 2025 18:57:28.249882936 CET58749758192.254.186.165192.168.2.10220-gator3170.hostgator.com ESMTP Exim 4.96.2 #2 Fri, 10 Jan 2025 11:57:28 -0600
                                                      220-We do not authorize the use of this system to transport unsolicited,
                                                      220 and/or bulk e-mail.
                                                      Jan 10, 2025 18:57:28.250205040 CET49758587192.168.2.10192.254.186.165EHLO 367706
                                                      Jan 10, 2025 18:57:28.420805931 CET58749758192.254.186.165192.168.2.10250-gator3170.hostgator.com Hello 367706 [8.46.123.189]
                                                      250-SIZE 52428800
                                                      250-8BITMIME
                                                      250-PIPELINING
                                                      250-PIPECONNECT
                                                      250-AUTH PLAIN LOGIN
                                                      250-STARTTLS
                                                      250 HELP
                                                      Jan 10, 2025 18:57:28.420939922 CET49758587192.168.2.10192.254.186.165STARTTLS
                                                      Jan 10, 2025 18:57:28.570619106 CET58749758192.254.186.165192.168.2.10220 TLS go ahead

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:12:57:15
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\Desktop\Y8Q1voljvb.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Y8Q1voljvb.exe"
                                                      Imagebase:0x8a0000
                                                      File size:1'139'712 bytes
                                                      MD5 hash:D1642B4A6A94D085FABFD70A2AC37DEB
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1319158030.0000000002450000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:12:57:18
                                                      Start date:10/01/2025
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Y8Q1voljvb.exe"
                                                      Imagebase:0x880000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3753903730.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3752702335.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3752702335.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3753903730.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3753903730.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:3.3%
                                                        Dynamic/Decrypted Code Coverage:0.4%
                                                        Signature Coverage:2.9%
                                                        Total number of Nodes:2000
                                                        Total number of Limit Nodes:57
                                                        execution_graph 97105 8a1cad SystemParametersInfoW 97106 8a2de3 97107 8a2df0 __wsopen_s 97106->97107 97108 8a2e09 97107->97108 97109 8e2c2b ___scrt_fastfail 97107->97109 97122 8a3aa2 97108->97122 97112 8e2c47 GetOpenFileNameW 97109->97112 97114 8e2c96 97112->97114 97180 8a6b57 97114->97180 97118 8e2cab 97118->97118 97119 8a2e27 97150 8a44a8 97119->97150 97192 8e1f50 97122->97192 97125 8a3ae9 97198 8aa6c3 97125->97198 97126 8a3ace 97128 8a6b57 22 API calls 97126->97128 97129 8a3ada 97128->97129 97194 8a37a0 97129->97194 97132 8a2da5 97133 8e1f50 __wsopen_s 97132->97133 97134 8a2db2 GetLongPathNameW 97133->97134 97135 8a6b57 22 API calls 97134->97135 97136 8a2dda 97135->97136 97137 8a3598 97136->97137 97249 8aa961 97137->97249 97140 8a3aa2 23 API calls 97141 8a35b5 97140->97141 97142 8e32eb 97141->97142 97143 8a35c0 97141->97143 97147 8e330d 97142->97147 97266 8bce60 41 API calls 97142->97266 97254 8a515f 97143->97254 97149 8a35df 97149->97119 97267 8a4ecb 97150->97267 97153 8e3833 97289 912cf9 97153->97289 97155 8a4ecb 94 API calls 97156 8a44e1 97155->97156 97156->97153 97158 8a44e9 97156->97158 97157 8e3848 97159 8e384c 97157->97159 97160 8e3869 97157->97160 97161 8e3854 97158->97161 97162 8a44f5 97158->97162 97339 8a4f39 97159->97339 97164 8bfe0b 22 API calls 97160->97164 97345 90da5a 82 API calls 97161->97345 97338 8a940c 136 API calls 2 library calls 97162->97338 97177 8e38ae 97164->97177 97167 8a2e31 97168 8e3862 97168->97160 97169 8e3a5f 97174 8e3a67 97169->97174 97170 8a4f39 68 API calls 97170->97174 97174->97170 97347 90989b 82 API calls __wsopen_s 97174->97347 97176 8a9cb3 22 API calls 97176->97177 97177->97169 97177->97174 97177->97176 97315 90967e 97177->97315 97318 910b5a 97177->97318 97324 8aa4a1 97177->97324 97332 8a3ff7 97177->97332 97346 9095ad 42 API calls _wcslen 97177->97346 97181 8a6b67 _wcslen 97180->97181 97182 8e4ba1 97180->97182 97185 8a6b7d 97181->97185 97186 8a6ba2 97181->97186 97183 8a93b2 22 API calls 97182->97183 97184 8e4baa 97183->97184 97184->97184 97985 8a6f34 97185->97985 97188 8bfddb 22 API calls 97186->97188 97190 8a6bae 97188->97190 97189 8a6b85 __fread_nolock 97189->97118 97191 8bfe0b 22 API calls 97190->97191 97191->97189 97193 8a3aaf GetFullPathNameW 97192->97193 97193->97125 97193->97126 97195 8a37ae 97194->97195 97204 8a93b2 97195->97204 97197 8a2e12 97197->97132 97199 8aa6dd 97198->97199 97200 8aa6d0 97198->97200 97201 8bfddb 22 API calls 97199->97201 97200->97129 97202 8aa6e7 97201->97202 97203 8bfe0b 22 API calls 97202->97203 97203->97200 97205 8a93c9 __fread_nolock 97204->97205 97206 8a93c0 97204->97206 97205->97197 97206->97205 97208 8aaec9 97206->97208 97209 8aaedc 97208->97209 97213 8aaed9 __fread_nolock 97208->97213 97214 8bfddb 97209->97214 97211 8aaee7 97224 8bfe0b 97211->97224 97213->97205 97217 8bfde0 97214->97217 97216 8bfdfa 97216->97211 97217->97216 97220 8bfdfc 97217->97220 97234 8cea0c 97217->97234 97241 8c4ead 7 API calls 2 library calls 97217->97241 97219 8c066d 97243 8c32a4 RaiseException 97219->97243 97220->97219 97242 8c32a4 RaiseException 97220->97242 97223 8c068a 97223->97211 97226 8bfddb 97224->97226 97225 8cea0c ___std_exception_copy 21 API calls 97225->97226 97226->97225 97227 8bfdfa 97226->97227 97230 8bfdfc 97226->97230 97246 8c4ead 7 API calls 2 library calls 97226->97246 97227->97213 97229 8c066d 97248 8c32a4 RaiseException 97229->97248 97230->97229 97247 8c32a4 RaiseException 97230->97247 97233 8c068a 97233->97213 97240 8d3820 _abort 97234->97240 97235 8d385e 97245 8cf2d9 20 API calls _abort 97235->97245 97236 8d3849 RtlAllocateHeap 97238 8d385c 97236->97238 97236->97240 97238->97217 97240->97235 97240->97236 97244 8c4ead 7 API calls 2 library calls 97240->97244 97241->97217 97242->97219 97243->97223 97244->97240 97245->97238 97246->97226 97247->97229 97248->97233 97250 8bfe0b 22 API calls 97249->97250 97251 8aa976 97250->97251 97252 8bfddb 22 API calls 97251->97252 97253 8a35aa 97252->97253 97253->97140 97255 8a516e 97254->97255 97259 8a518f __fread_nolock 97254->97259 97257 8bfe0b 22 API calls 97255->97257 97256 8bfddb 22 API calls 97258 8a35cc 97256->97258 97257->97259 97260 8a35f3 97258->97260 97259->97256 97261 8a3605 97260->97261 97265 8a3624 __fread_nolock 97260->97265 97263 8bfe0b 22 API calls 97261->97263 97262 8bfddb 22 API calls 97264 8a363b 97262->97264 97263->97265 97264->97149 97265->97262 97266->97142 97348 8a4e90 LoadLibraryA 97267->97348 97272 8e3ccf 97274 8a4f39 68 API calls 97272->97274 97273 8a4ef6 LoadLibraryExW 97356 8a4e59 LoadLibraryA 97273->97356 97276 8e3cd6 97274->97276 97278 8a4e59 3 API calls 97276->97278 97281 8e3cde 97278->97281 97280 8a4f20 97280->97281 97282 8a4f2c 97280->97282 97378 8a50f5 97281->97378 97283 8a4f39 68 API calls 97282->97283 97285 8a44cd 97283->97285 97285->97153 97285->97155 97288 8e3d05 97290 912d15 97289->97290 97291 8a511f 64 API calls 97290->97291 97292 912d29 97291->97292 97649 912e66 97292->97649 97295 912d3f 97295->97157 97296 8a50f5 40 API calls 97297 912d56 97296->97297 97298 8a50f5 40 API calls 97297->97298 97299 912d66 97298->97299 97300 8a50f5 40 API calls 97299->97300 97301 912d81 97300->97301 97302 8a50f5 40 API calls 97301->97302 97303 912d9c 97302->97303 97304 8a511f 64 API calls 97303->97304 97305 912db3 97304->97305 97306 8cea0c ___std_exception_copy 21 API calls 97305->97306 97307 912dba 97306->97307 97308 8cea0c ___std_exception_copy 21 API calls 97307->97308 97309 912dc4 97308->97309 97310 8a50f5 40 API calls 97309->97310 97311 912dd8 97310->97311 97312 9128fe 27 API calls 97311->97312 97313 912dee 97312->97313 97313->97295 97655 9122ce 97313->97655 97316 8bfe0b 22 API calls 97315->97316 97317 9096ae __fread_nolock 97316->97317 97317->97177 97319 910b65 97318->97319 97320 8bfddb 22 API calls 97319->97320 97321 910b7c 97320->97321 97979 8a9cb3 97321->97979 97325 8aa52b 97324->97325 97331 8aa4b1 __fread_nolock 97324->97331 97328 8bfe0b 22 API calls 97325->97328 97326 8bfddb 22 API calls 97327 8aa4b8 97326->97327 97329 8aa4d6 97327->97329 97330 8bfddb 22 API calls 97327->97330 97328->97331 97329->97177 97330->97329 97331->97326 97333 8a400a 97332->97333 97336 8a40ae 97332->97336 97334 8bfe0b 22 API calls 97333->97334 97335 8a403c 97333->97335 97334->97335 97335->97336 97337 8bfddb 22 API calls 97335->97337 97336->97177 97337->97335 97338->97167 97340 8a4f43 97339->97340 97342 8a4f4a 97339->97342 97341 8ce678 67 API calls 97340->97341 97341->97342 97343 8a4f6a FreeLibrary 97342->97343 97344 8a4f59 97342->97344 97343->97344 97344->97161 97345->97168 97346->97177 97347->97174 97349 8a4ea8 GetProcAddress 97348->97349 97350 8a4ec6 97348->97350 97351 8a4eb8 97349->97351 97353 8ce5eb 97350->97353 97351->97350 97352 8a4ebf FreeLibrary 97351->97352 97352->97350 97386 8ce52a 97353->97386 97355 8a4eea 97355->97272 97355->97273 97357 8a4e6e GetProcAddress 97356->97357 97358 8a4e8d 97356->97358 97359 8a4e7e 97357->97359 97361 8a4f80 97358->97361 97359->97358 97360 8a4e86 FreeLibrary 97359->97360 97360->97358 97362 8bfe0b 22 API calls 97361->97362 97363 8a4f95 97362->97363 97454 8a5722 97363->97454 97365 8a4fa1 __fread_nolock 97366 8e3d1d 97365->97366 97367 8a50a5 97365->97367 97376 8a4fdc 97365->97376 97468 91304d 74 API calls 97366->97468 97457 8a42a2 CreateStreamOnHGlobal 97367->97457 97370 8e3d22 97372 8a511f 64 API calls 97370->97372 97371 8a50f5 40 API calls 97371->97376 97373 8e3d45 97372->97373 97374 8a50f5 40 API calls 97373->97374 97377 8a506e ISource 97374->97377 97376->97370 97376->97371 97376->97377 97463 8a511f 97376->97463 97377->97280 97379 8a5107 97378->97379 97380 8e3d70 97378->97380 97490 8ce8c4 97379->97490 97383 9128fe 97632 91274e 97383->97632 97385 912919 97385->97288 97389 8ce536 __FrameHandler3::FrameUnwindToState 97386->97389 97387 8ce544 97411 8cf2d9 20 API calls _abort 97387->97411 97389->97387 97391 8ce574 97389->97391 97390 8ce549 97412 8d27ec 26 API calls _abort 97390->97412 97393 8ce579 97391->97393 97394 8ce586 97391->97394 97413 8cf2d9 20 API calls _abort 97393->97413 97403 8d8061 97394->97403 97397 8ce58f 97398 8ce595 97397->97398 97401 8ce5a2 97397->97401 97414 8cf2d9 20 API calls _abort 97398->97414 97400 8ce554 __wsopen_s 97400->97355 97415 8ce5d4 LeaveCriticalSection __fread_nolock 97401->97415 97404 8d806d __FrameHandler3::FrameUnwindToState 97403->97404 97416 8d2f5e EnterCriticalSection 97404->97416 97406 8d807b 97417 8d80fb 97406->97417 97410 8d80ac __wsopen_s 97410->97397 97411->97390 97412->97400 97413->97400 97414->97400 97415->97400 97416->97406 97425 8d811e 97417->97425 97418 8d8177 97435 8d4c7d 97418->97435 97423 8d8189 97429 8d8088 97423->97429 97448 8d3405 11 API calls 2 library calls 97423->97448 97425->97418 97425->97429 97433 8c918d EnterCriticalSection 97425->97433 97434 8c91a1 LeaveCriticalSection 97425->97434 97426 8d81a8 97449 8c918d EnterCriticalSection 97426->97449 97430 8d80b7 97429->97430 97453 8d2fa6 LeaveCriticalSection 97430->97453 97432 8d80be 97432->97410 97433->97425 97434->97425 97440 8d4c8a _abort 97435->97440 97436 8d4cca 97451 8cf2d9 20 API calls _abort 97436->97451 97437 8d4cb5 RtlAllocateHeap 97439 8d4cc8 97437->97439 97437->97440 97442 8d29c8 97439->97442 97440->97436 97440->97437 97450 8c4ead 7 API calls 2 library calls 97440->97450 97443 8d29fc __dosmaperr 97442->97443 97444 8d29d3 RtlFreeHeap 97442->97444 97443->97423 97444->97443 97445 8d29e8 97444->97445 97452 8cf2d9 20 API calls _abort 97445->97452 97447 8d29ee GetLastError 97447->97443 97448->97426 97449->97429 97450->97440 97451->97439 97452->97447 97453->97432 97455 8bfddb 22 API calls 97454->97455 97456 8a5734 97455->97456 97456->97365 97458 8a42bc FindResourceExW 97457->97458 97462 8a42d9 97457->97462 97459 8e35ba LoadResource 97458->97459 97458->97462 97460 8e35cf SizeofResource 97459->97460 97459->97462 97461 8e35e3 LockResource 97460->97461 97460->97462 97461->97462 97462->97376 97464 8a512e 97463->97464 97465 8e3d90 97463->97465 97469 8cece3 97464->97469 97468->97370 97472 8ceaaa 97469->97472 97471 8a513c 97471->97376 97475 8ceab6 __FrameHandler3::FrameUnwindToState 97472->97475 97473 8ceac2 97485 8cf2d9 20 API calls _abort 97473->97485 97475->97473 97476 8ceae8 97475->97476 97487 8c918d EnterCriticalSection 97476->97487 97478 8ceac7 97486 8d27ec 26 API calls _abort 97478->97486 97479 8ceaf4 97488 8cec0a 62 API calls 2 library calls 97479->97488 97482 8ceb08 97489 8ceb27 LeaveCriticalSection __fread_nolock 97482->97489 97484 8cead2 __wsopen_s 97484->97471 97485->97478 97486->97484 97487->97479 97488->97482 97489->97484 97493 8ce8e1 97490->97493 97492 8a5118 97492->97383 97494 8ce8ed __FrameHandler3::FrameUnwindToState 97493->97494 97495 8ce92d 97494->97495 97496 8ce925 __wsopen_s 97494->97496 97498 8ce900 ___scrt_fastfail 97494->97498 97506 8c918d EnterCriticalSection 97495->97506 97496->97492 97520 8cf2d9 20 API calls _abort 97498->97520 97500 8ce937 97507 8ce6f8 97500->97507 97501 8ce91a 97521 8d27ec 26 API calls _abort 97501->97521 97506->97500 97511 8ce70a ___scrt_fastfail 97507->97511 97513 8ce727 97507->97513 97508 8ce717 97595 8cf2d9 20 API calls _abort 97508->97595 97510 8ce71c 97596 8d27ec 26 API calls _abort 97510->97596 97511->97508 97511->97513 97518 8ce76a __fread_nolock 97511->97518 97522 8ce96c LeaveCriticalSection __fread_nolock 97513->97522 97514 8ce886 ___scrt_fastfail 97598 8cf2d9 20 API calls _abort 97514->97598 97518->97513 97518->97514 97523 8cd955 97518->97523 97530 8d8d45 97518->97530 97597 8ccf78 26 API calls 4 library calls 97518->97597 97520->97501 97521->97496 97522->97496 97524 8cd976 97523->97524 97525 8cd961 97523->97525 97524->97518 97599 8cf2d9 20 API calls _abort 97525->97599 97527 8cd966 97600 8d27ec 26 API calls _abort 97527->97600 97529 8cd971 97529->97518 97531 8d8d6f 97530->97531 97532 8d8d57 97530->97532 97534 8d90d9 97531->97534 97539 8d8db4 97531->97539 97610 8cf2c6 20 API calls _abort 97532->97610 97626 8cf2c6 20 API calls _abort 97534->97626 97535 8d8d5c 97611 8cf2d9 20 API calls _abort 97535->97611 97538 8d90de 97627 8cf2d9 20 API calls _abort 97538->97627 97540 8d8d64 97539->97540 97542 8d8dbf 97539->97542 97547 8d8def 97539->97547 97540->97518 97612 8cf2c6 20 API calls _abort 97542->97612 97543 8d8dcc 97628 8d27ec 26 API calls _abort 97543->97628 97545 8d8dc4 97613 8cf2d9 20 API calls _abort 97545->97613 97549 8d8e08 97547->97549 97550 8d8e2e 97547->97550 97551 8d8e4a 97547->97551 97549->97550 97583 8d8e15 97549->97583 97614 8cf2c6 20 API calls _abort 97550->97614 97617 8d3820 21 API calls 2 library calls 97551->97617 97554 8d8e33 97615 8cf2d9 20 API calls _abort 97554->97615 97555 8d8e61 97558 8d29c8 _free 20 API calls 97555->97558 97561 8d8e6a 97558->97561 97559 8d8fb3 97562 8d9029 97559->97562 97564 8d8fcc GetConsoleMode 97559->97564 97560 8d8e3a 97616 8d27ec 26 API calls _abort 97560->97616 97565 8d29c8 _free 20 API calls 97561->97565 97566 8d902d ReadFile 97562->97566 97564->97562 97567 8d8fdd 97564->97567 97568 8d8e71 97565->97568 97569 8d9047 97566->97569 97570 8d90a1 GetLastError 97566->97570 97567->97566 97571 8d8fe3 ReadConsoleW 97567->97571 97572 8d8e7b 97568->97572 97573 8d8e96 97568->97573 97569->97570 97576 8d901e 97569->97576 97574 8d90ae 97570->97574 97578 8d9005 97570->97578 97571->97576 97577 8d8fff GetLastError 97571->97577 97618 8cf2d9 20 API calls _abort 97572->97618 97620 8d9424 28 API calls __wsopen_s 97573->97620 97624 8cf2d9 20 API calls _abort 97574->97624 97587 8d906c 97576->97587 97588 8d9083 97576->97588 97592 8d8e45 __fread_nolock 97576->97592 97577->97578 97578->97592 97621 8cf2a3 20 API calls __dosmaperr 97578->97621 97579 8d29c8 _free 20 API calls 97579->97540 97582 8d90b3 97625 8cf2c6 20 API calls _abort 97582->97625 97601 8df89b 97583->97601 97585 8d8e80 97619 8cf2c6 20 API calls _abort 97585->97619 97622 8d8a61 31 API calls 3 library calls 97587->97622 97591 8d909a 97588->97591 97588->97592 97623 8d88a1 29 API calls __wsopen_s 97591->97623 97592->97579 97594 8d909f 97594->97592 97595->97510 97596->97513 97597->97518 97598->97510 97599->97527 97600->97529 97602 8df8a8 97601->97602 97603 8df8b5 97601->97603 97629 8cf2d9 20 API calls _abort 97602->97629 97606 8df8c1 97603->97606 97630 8cf2d9 20 API calls _abort 97603->97630 97605 8df8ad 97605->97559 97606->97559 97608 8df8e2 97631 8d27ec 26 API calls _abort 97608->97631 97610->97535 97611->97540 97612->97545 97613->97543 97614->97554 97615->97560 97616->97592 97617->97555 97618->97585 97619->97592 97620->97583 97621->97592 97622->97592 97623->97594 97624->97582 97625->97592 97626->97538 97627->97543 97628->97540 97629->97605 97630->97608 97631->97605 97635 8ce4e8 97632->97635 97634 91275d 97634->97385 97638 8ce469 97635->97638 97637 8ce505 97637->97634 97639 8ce48c 97638->97639 97640 8ce478 97638->97640 97645 8ce488 __alldvrm 97639->97645 97648 8d333f 11 API calls 2 library calls 97639->97648 97646 8cf2d9 20 API calls _abort 97640->97646 97642 8ce47d 97647 8d27ec 26 API calls _abort 97642->97647 97645->97637 97646->97642 97647->97645 97648->97645 97652 912e7a 97649->97652 97650 8a50f5 40 API calls 97650->97652 97651 9128fe 27 API calls 97651->97652 97652->97650 97652->97651 97653 912d3b 97652->97653 97654 8a511f 64 API calls 97652->97654 97653->97295 97653->97296 97654->97652 97656 9122d9 97655->97656 97657 9122e7 97655->97657 97658 8ce5eb 29 API calls 97656->97658 97659 91232c 97657->97659 97660 8ce5eb 29 API calls 97657->97660 97683 9122f0 97657->97683 97658->97657 97684 912557 97659->97684 97661 912311 97660->97661 97661->97659 97663 91231a 97661->97663 97666 8ce678 67 API calls 97663->97666 97663->97683 97664 912370 97665 912395 97664->97665 97668 912374 97664->97668 97688 912171 97665->97688 97666->97683 97669 8ce678 67 API calls 97668->97669 97670 912381 97668->97670 97669->97670 97672 8ce678 67 API calls 97670->97672 97670->97683 97671 91239d 97673 9123c3 97671->97673 97674 9123a3 97671->97674 97672->97683 97695 9123f3 97673->97695 97676 9123b0 97674->97676 97677 8ce678 67 API calls 97674->97677 97678 8ce678 67 API calls 97676->97678 97676->97683 97677->97676 97678->97683 97679 9123ca 97680 9123de 97679->97680 97703 8ce678 97679->97703 97682 8ce678 67 API calls 97680->97682 97680->97683 97682->97683 97683->97295 97685 91257c 97684->97685 97687 912565 __fread_nolock 97684->97687 97686 8ce8c4 __fread_nolock 40 API calls 97685->97686 97686->97687 97687->97664 97689 8cea0c ___std_exception_copy 21 API calls 97688->97689 97690 91217f 97689->97690 97691 8cea0c ___std_exception_copy 21 API calls 97690->97691 97692 912190 97691->97692 97693 8cea0c ___std_exception_copy 21 API calls 97692->97693 97694 91219c 97693->97694 97694->97671 97702 912408 97695->97702 97696 9124c0 97720 912724 97696->97720 97697 9121cc 40 API calls 97697->97702 97699 9124c7 97699->97679 97702->97696 97702->97697 97702->97699 97716 912606 97702->97716 97724 912269 40 API calls 97702->97724 97704 8ce684 __FrameHandler3::FrameUnwindToState 97703->97704 97705 8ce6aa 97704->97705 97706 8ce695 97704->97706 97715 8ce6a5 __wsopen_s 97705->97715 97760 8c918d EnterCriticalSection 97705->97760 97777 8cf2d9 20 API calls _abort 97706->97777 97708 8ce69a 97778 8d27ec 26 API calls _abort 97708->97778 97711 8ce6c6 97761 8ce602 97711->97761 97713 8ce6d1 97779 8ce6ee LeaveCriticalSection __fread_nolock 97713->97779 97715->97680 97717 912617 97716->97717 97718 91261d 97716->97718 97717->97718 97725 9126d7 97717->97725 97718->97702 97721 912731 97720->97721 97722 912742 97720->97722 97723 8cdbb3 65 API calls 97721->97723 97722->97699 97723->97722 97724->97702 97726 912703 97725->97726 97728 912714 97725->97728 97729 8cdbb3 97726->97729 97728->97717 97730 8cdbc1 97729->97730 97736 8cdbdd 97729->97736 97731 8cdbcd 97730->97731 97732 8cdbe3 97730->97732 97730->97736 97741 8cf2d9 20 API calls _abort 97731->97741 97738 8cd9cc 97732->97738 97735 8cdbd2 97742 8d27ec 26 API calls _abort 97735->97742 97736->97728 97743 8cd97b 97738->97743 97740 8cd9f0 97740->97736 97741->97735 97742->97736 97744 8cd987 __FrameHandler3::FrameUnwindToState 97743->97744 97751 8c918d EnterCriticalSection 97744->97751 97746 8cd995 97752 8cd9f4 97746->97752 97750 8cd9b3 __wsopen_s 97750->97740 97751->97746 97753 8d49a1 27 API calls 97752->97753 97754 8cda09 97753->97754 97755 8cda3a 62 API calls 97754->97755 97756 8cda24 97755->97756 97757 8d4a56 62 API calls 97756->97757 97758 8cd9a2 97757->97758 97759 8cd9c0 LeaveCriticalSection __fread_nolock 97758->97759 97759->97750 97760->97711 97762 8ce60f 97761->97762 97763 8ce624 97761->97763 97805 8cf2d9 20 API calls _abort 97762->97805 97769 8ce61f 97763->97769 97780 8cdc0b 97763->97780 97765 8ce614 97806 8d27ec 26 API calls _abort 97765->97806 97769->97713 97772 8cd955 __fread_nolock 26 API calls 97773 8ce646 97772->97773 97790 8d862f 97773->97790 97776 8d29c8 _free 20 API calls 97776->97769 97777->97708 97778->97715 97779->97715 97781 8cdc1f 97780->97781 97782 8cdc23 97780->97782 97786 8d4d7a 97781->97786 97782->97781 97783 8cd955 __fread_nolock 26 API calls 97782->97783 97784 8cdc43 97783->97784 97807 8d59be 97784->97807 97787 8ce640 97786->97787 97788 8d4d90 97786->97788 97787->97772 97788->97787 97789 8d29c8 _free 20 API calls 97788->97789 97789->97787 97791 8d863e 97790->97791 97792 8d8653 97790->97792 97930 8cf2c6 20 API calls _abort 97791->97930 97794 8d868e 97792->97794 97799 8d867a 97792->97799 97932 8cf2c6 20 API calls _abort 97794->97932 97796 8d8643 97931 8cf2d9 20 API calls _abort 97796->97931 97797 8d8693 97933 8cf2d9 20 API calls _abort 97797->97933 97927 8d8607 97799->97927 97802 8ce64c 97802->97769 97802->97776 97803 8d869b 97934 8d27ec 26 API calls _abort 97803->97934 97805->97765 97806->97769 97808 8d59ca __FrameHandler3::FrameUnwindToState 97807->97808 97809 8d59ea 97808->97809 97810 8d59d2 97808->97810 97812 8d5a88 97809->97812 97817 8d5a1f 97809->97817 97886 8cf2c6 20 API calls _abort 97810->97886 97891 8cf2c6 20 API calls _abort 97812->97891 97813 8d59d7 97887 8cf2d9 20 API calls _abort 97813->97887 97816 8d5a8d 97892 8cf2d9 20 API calls _abort 97816->97892 97832 8d5147 EnterCriticalSection 97817->97832 97818 8d59df __wsopen_s 97818->97781 97821 8d5a95 97893 8d27ec 26 API calls _abort 97821->97893 97822 8d5a25 97824 8d5a56 97822->97824 97825 8d5a41 97822->97825 97833 8d5aa9 97824->97833 97888 8cf2d9 20 API calls _abort 97825->97888 97828 8d5a46 97889 8cf2c6 20 API calls _abort 97828->97889 97829 8d5a51 97890 8d5a80 LeaveCriticalSection __wsopen_s 97829->97890 97832->97822 97834 8d5ad7 97833->97834 97835 8d5ad0 97833->97835 97836 8d5adb 97834->97836 97837 8d5afa 97834->97837 97918 8c0a8c 97835->97918 97901 8cf2c6 20 API calls _abort 97836->97901 97840 8d5b4b 97837->97840 97841 8d5b2e 97837->97841 97845 8d5b61 97840->97845 97907 8d9424 28 API calls __wsopen_s 97840->97907 97904 8cf2c6 20 API calls _abort 97841->97904 97842 8d5cb1 97842->97829 97843 8d5ae0 97902 8cf2d9 20 API calls _abort 97843->97902 97894 8d564e 97845->97894 97848 8d5ae7 97903 8d27ec 26 API calls _abort 97848->97903 97850 8d5b33 97905 8cf2d9 20 API calls _abort 97850->97905 97854 8d5b6f 97857 8d5b95 97854->97857 97858 8d5b73 97854->97858 97855 8d5ba8 97860 8d5bbc 97855->97860 97861 8d5c02 WriteFile 97855->97861 97856 8d5b3b 97906 8d27ec 26 API calls _abort 97856->97906 97909 8d542e 45 API calls 3 library calls 97857->97909 97870 8d5c69 97858->97870 97908 8d55e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 97858->97908 97862 8d5bc4 97860->97862 97863 8d5bf2 97860->97863 97865 8d5c25 GetLastError 97861->97865 97875 8d5b8b 97861->97875 97866 8d5bc9 97862->97866 97867 8d5be2 97862->97867 97912 8d56c4 7 API calls 2 library calls 97863->97912 97865->97875 97866->97870 97870->97835 97916 8cf2d9 20 API calls _abort 97870->97916 97873 8d5be0 97873->97875 97875->97835 97875->97870 97876 8d5c45 97875->97876 97880 8d5c4c 97876->97880 97881 8d5c60 97876->97881 97886->97813 97887->97818 97888->97828 97889->97829 97890->97818 97891->97816 97892->97821 97893->97818 97895 8df89b __fread_nolock 26 API calls 97894->97895 97896 8d565e 97895->97896 97897 8d5663 97896->97897 97925 8d2d74 38 API calls 2 library calls 97896->97925 97897->97854 97897->97855 97899 8d5686 97899->97897 97900 8d56a4 GetConsoleMode 97899->97900 97900->97897 97901->97843 97902->97848 97903->97835 97904->97850 97905->97856 97906->97835 97907->97845 97908->97875 97909->97875 97912->97873 97919 8c0a95 97918->97919 97920 8c0a97 IsProcessorFeaturePresent 97918->97920 97919->97842 97922 8c0c5d 97920->97922 97926 8c0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97922->97926 97924 8c0d40 97924->97842 97925->97899 97926->97924 97935 8d8585 97927->97935 97929 8d862b 97929->97802 97930->97796 97931->97802 97932->97797 97933->97803 97934->97802 97936 8d8591 __FrameHandler3::FrameUnwindToState 97935->97936 97946 8d5147 EnterCriticalSection 97936->97946 97938 8d859f 97939 8d85c6 97938->97939 97940 8d85d1 97938->97940 97947 8d86ae 97939->97947 97962 8cf2d9 20 API calls _abort 97940->97962 97943 8d85cc 97963 8d85fb LeaveCriticalSection __wsopen_s 97943->97963 97945 8d85ee __wsopen_s 97945->97929 97946->97938 97964 8d53c4 97947->97964 97949 8d86c4 97977 8d5333 21 API calls 2 library calls 97949->97977 97951 8d86be 97951->97949 97953 8d53c4 __wsopen_s 26 API calls 97951->97953 97961 8d86f6 97951->97961 97952 8d871c 97955 8d873e 97952->97955 97978 8cf2a3 20 API calls __dosmaperr 97952->97978 97956 8d86ed 97953->97956 97954 8d53c4 __wsopen_s 26 API calls 97957 8d8702 CloseHandle 97954->97957 97955->97943 97960 8d53c4 __wsopen_s 26 API calls 97956->97960 97957->97949 97958 8d870e GetLastError 97957->97958 97958->97949 97960->97961 97961->97949 97961->97954 97962->97943 97963->97945 97965 8d53e6 97964->97965 97966 8d53d1 97964->97966 97969 8cf2c6 __dosmaperr 20 API calls 97965->97969 97971 8d540b 97965->97971 97967 8cf2c6 __dosmaperr 20 API calls 97966->97967 97968 8d53d6 97967->97968 97970 8cf2d9 __dosmaperr 20 API calls 97968->97970 97972 8d5416 97969->97972 97974 8d53de 97970->97974 97971->97951 97973 8cf2d9 __dosmaperr 20 API calls 97972->97973 97975 8d541e 97973->97975 97974->97951 97976 8d27ec _abort 26 API calls 97975->97976 97976->97974 97977->97952 97978->97955 97980 8a9cc2 _wcslen 97979->97980 97981 8bfe0b 22 API calls 97980->97981 97982 8a9cea __fread_nolock 97981->97982 97983 8bfddb 22 API calls 97982->97983 97984 8a9d00 97983->97984 97984->97177 97986 8a6f46 97985->97986 97987 8a6f4c 97985->97987 97986->97189 97988 8bfe0b 22 API calls 97987->97988 97988->97986 97989 8e2ba5 97990 8e2baf 97989->97990 97991 8a2b25 97989->97991 98032 8a3a5a 97990->98032 98017 8a2b83 7 API calls 97991->98017 97995 8e2bb8 97997 8a9cb3 22 API calls 97995->97997 97999 8e2bc6 97997->97999 97998 8a2b2f 98008 8a2b44 97998->98008 98021 8a3837 97998->98021 98000 8e2bce 97999->98000 98001 8e2bf5 97999->98001 98039 8a33c6 98000->98039 98002 8a33c6 22 API calls 98001->98002 98005 8e2bf1 GetForegroundWindow ShellExecuteW 98002->98005 98011 8e2c26 98005->98011 98009 8a2b5f 98008->98009 98031 8a30f2 Shell_NotifyIconW ___scrt_fastfail 98008->98031 98014 8a2b66 SetCurrentDirectoryW 98009->98014 98011->98009 98016 8a2b7a 98014->98016 98015 8a33c6 22 API calls 98015->98005 98057 8a2cd4 7 API calls 98017->98057 98019 8a2b2a 98020 8a2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98019->98020 98020->97998 98022 8a3862 ___scrt_fastfail 98021->98022 98058 8a4212 98022->98058 98025 8a38e8 98027 8e3386 Shell_NotifyIconW 98025->98027 98028 8a3906 Shell_NotifyIconW 98025->98028 98062 8a3923 98028->98062 98030 8a391c 98030->98008 98031->98009 98033 8e1f50 __wsopen_s 98032->98033 98034 8a3a67 GetModuleFileNameW 98033->98034 98035 8a9cb3 22 API calls 98034->98035 98036 8a3a8d 98035->98036 98037 8a3aa2 23 API calls 98036->98037 98038 8a3a97 98037->98038 98038->97995 98040 8e30bb 98039->98040 98041 8a33dd 98039->98041 98043 8bfddb 22 API calls 98040->98043 98094 8a33ee 98041->98094 98045 8e30c5 _wcslen 98043->98045 98044 8a33e8 98048 8a6350 98044->98048 98046 8bfe0b 22 API calls 98045->98046 98047 8e30fe __fread_nolock 98046->98047 98049 8a6362 98048->98049 98050 8e4a51 98048->98050 98109 8a6373 98049->98109 98119 8a4a88 22 API calls __fread_nolock 98050->98119 98053 8a636e 98053->98015 98054 8e4a5b 98055 8e4a67 98054->98055 98056 8aa8c7 22 API calls 98054->98056 98056->98055 98057->98019 98059 8e35a4 98058->98059 98060 8a38b7 98058->98060 98059->98060 98061 8e35ad DestroyIcon 98059->98061 98060->98025 98084 90c874 42 API calls _strftime 98060->98084 98061->98060 98063 8a393f 98062->98063 98082 8a3a13 98062->98082 98085 8a6270 98063->98085 98066 8a395a 98068 8a6b57 22 API calls 98066->98068 98067 8e3393 LoadStringW 98069 8e33ad 98067->98069 98070 8a396f 98068->98070 98078 8a3994 ___scrt_fastfail 98069->98078 98090 8aa8c7 98069->98090 98071 8a397c 98070->98071 98072 8e33c9 98070->98072 98071->98069 98074 8a3986 98071->98074 98075 8a6350 22 API calls 98072->98075 98076 8a6350 22 API calls 98074->98076 98077 8e33d7 98075->98077 98076->98078 98077->98078 98080 8a33c6 22 API calls 98077->98080 98079 8a39f9 Shell_NotifyIconW 98078->98079 98079->98082 98081 8e33f9 98080->98081 98083 8a33c6 22 API calls 98081->98083 98082->98030 98083->98078 98084->98025 98086 8bfe0b 22 API calls 98085->98086 98087 8a6295 98086->98087 98088 8bfddb 22 API calls 98087->98088 98089 8a394d 98088->98089 98089->98066 98089->98067 98091 8aa8db 98090->98091 98093 8aa8ea __fread_nolock 98090->98093 98092 8bfe0b 22 API calls 98091->98092 98091->98093 98092->98093 98093->98078 98095 8a33fe _wcslen 98094->98095 98096 8e311d 98095->98096 98097 8a3411 98095->98097 98099 8bfddb 22 API calls 98096->98099 98104 8aa587 98097->98104 98100 8e3127 98099->98100 98102 8bfe0b 22 API calls 98100->98102 98101 8a341e __fread_nolock 98101->98044 98103 8e3157 __fread_nolock 98102->98103 98105 8aa59d 98104->98105 98108 8aa598 __fread_nolock 98104->98108 98106 8ef80f 98105->98106 98107 8bfe0b 22 API calls 98105->98107 98107->98108 98108->98101 98110 8a6382 98109->98110 98115 8a63b6 __fread_nolock 98109->98115 98111 8e4a82 98110->98111 98112 8a63a9 98110->98112 98110->98115 98114 8bfddb 22 API calls 98111->98114 98113 8aa587 22 API calls 98112->98113 98113->98115 98116 8e4a91 98114->98116 98115->98053 98117 8bfe0b 22 API calls 98116->98117 98118 8e4ac5 __fread_nolock 98117->98118 98119->98054 98120 8a6a26 98121 8bfddb 22 API calls 98120->98121 98122 8a6a33 98121->98122 98123 8a1044 98128 8a10f3 98123->98128 98125 8a104a 98164 8c00a3 29 API calls __onexit 98125->98164 98127 8a1054 98165 8a1398 98128->98165 98132 8a116a 98133 8aa961 22 API calls 98132->98133 98134 8a1174 98133->98134 98135 8aa961 22 API calls 98134->98135 98136 8a117e 98135->98136 98137 8aa961 22 API calls 98136->98137 98138 8a1188 98137->98138 98139 8aa961 22 API calls 98138->98139 98140 8a11c6 98139->98140 98141 8aa961 22 API calls 98140->98141 98142 8a1292 98141->98142 98175 8a171c 98142->98175 98146 8a12c4 98147 8aa961 22 API calls 98146->98147 98148 8a12ce 98147->98148 98196 8b1940 98148->98196 98150 8a12f9 98206 8a1aab 98150->98206 98152 8a1315 98153 8a1325 GetStdHandle 98152->98153 98154 8a137a 98153->98154 98155 8e2485 98153->98155 98158 8a1387 OleInitialize 98154->98158 98155->98154 98156 8e248e 98155->98156 98157 8bfddb 22 API calls 98156->98157 98159 8e2495 98157->98159 98158->98125 98213 91011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 98159->98213 98161 8e249e 98214 910944 CreateThread 98161->98214 98163 8e24aa CloseHandle 98163->98154 98164->98127 98215 8a13f1 98165->98215 98168 8a13f1 22 API calls 98169 8a13d0 98168->98169 98170 8aa961 22 API calls 98169->98170 98171 8a13dc 98170->98171 98172 8a6b57 22 API calls 98171->98172 98173 8a1129 98172->98173 98174 8a1bc3 6 API calls 98173->98174 98174->98132 98176 8aa961 22 API calls 98175->98176 98177 8a172c 98176->98177 98178 8aa961 22 API calls 98177->98178 98179 8a1734 98178->98179 98180 8aa961 22 API calls 98179->98180 98181 8a174f 98180->98181 98182 8bfddb 22 API calls 98181->98182 98183 8a129c 98182->98183 98184 8a1b4a 98183->98184 98185 8a1b58 98184->98185 98186 8aa961 22 API calls 98185->98186 98187 8a1b63 98186->98187 98188 8aa961 22 API calls 98187->98188 98189 8a1b6e 98188->98189 98190 8aa961 22 API calls 98189->98190 98191 8a1b79 98190->98191 98192 8aa961 22 API calls 98191->98192 98193 8a1b84 98192->98193 98194 8bfddb 22 API calls 98193->98194 98195 8a1b96 RegisterWindowMessageW 98194->98195 98195->98146 98197 8b1981 98196->98197 98204 8b195d 98196->98204 98222 8c0242 5 API calls __Init_thread_wait 98197->98222 98198 8b196e 98198->98150 98200 8b198b 98200->98204 98223 8c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98200->98223 98202 8b8727 98202->98198 98225 8c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98202->98225 98204->98198 98224 8c0242 5 API calls __Init_thread_wait 98204->98224 98207 8a1abb 98206->98207 98208 8e272d 98206->98208 98209 8bfddb 22 API calls 98207->98209 98226 913209 23 API calls 98208->98226 98212 8a1ac3 98209->98212 98211 8e2738 98212->98152 98213->98161 98214->98163 98227 91092a 28 API calls 98214->98227 98216 8aa961 22 API calls 98215->98216 98217 8a13fc 98216->98217 98218 8aa961 22 API calls 98217->98218 98219 8a1404 98218->98219 98220 8aa961 22 API calls 98219->98220 98221 8a13c6 98220->98221 98221->98168 98222->98200 98223->98204 98224->98202 98225->98198 98226->98211 98228 8f3a41 98232 9110c0 98228->98232 98230 8f3a4c 98231 9110c0 53 API calls 98230->98231 98231->98230 98233 9110cd 98232->98233 98242 9110fa 98232->98242 98234 9110fc 98233->98234 98236 911101 98233->98236 98240 9110f4 98233->98240 98233->98242 98267 8bfa11 53 API calls 98234->98267 98243 8a7510 98236->98243 98239 8a6350 22 API calls 98239->98242 98266 8ab270 39 API calls 98240->98266 98242->98230 98244 8a7525 98243->98244 98261 8a7522 98243->98261 98245 8a755b 98244->98245 98246 8a752d 98244->98246 98248 8e50f6 98245->98248 98251 8a756d 98245->98251 98256 8e500f 98245->98256 98268 8c51c6 26 API calls 98246->98268 98271 8c5183 26 API calls 98248->98271 98249 8a753d 98255 8bfddb 22 API calls 98249->98255 98269 8bfb21 51 API calls 98251->98269 98252 8e510e 98252->98252 98257 8a7547 98255->98257 98258 8e5088 98256->98258 98260 8bfe0b 22 API calls 98256->98260 98259 8a9cb3 22 API calls 98257->98259 98270 8bfb21 51 API calls 98258->98270 98259->98261 98262 8e5058 98260->98262 98261->98239 98263 8bfddb 22 API calls 98262->98263 98264 8e507f 98263->98264 98265 8a9cb3 22 API calls 98264->98265 98265->98258 98266->98242 98267->98236 98268->98249 98269->98249 98270->98248 98271->98252 98272 8f2a00 98287 8ad7b0 ISource 98272->98287 98273 8adb11 PeekMessageW 98273->98287 98274 8ad807 GetInputState 98274->98273 98274->98287 98275 8f1cbe TranslateAcceleratorW 98275->98287 98277 8adb8f PeekMessageW 98277->98287 98278 8ada04 timeGetTime 98278->98287 98279 8adb73 TranslateMessage DispatchMessageW 98279->98277 98280 8adbaf Sleep 98297 8adbc0 98280->98297 98281 8f2b74 Sleep 98281->98297 98282 8be551 timeGetTime 98282->98297 98283 8f1dda timeGetTime 98454 8be300 23 API calls 98283->98454 98286 8f2c0b GetExitCodeProcess 98290 8f2c37 CloseHandle 98286->98290 98291 8f2c21 WaitForSingleObject 98286->98291 98287->98273 98287->98274 98287->98275 98287->98277 98287->98278 98287->98279 98287->98280 98287->98281 98287->98283 98293 8ad9d5 98287->98293 98304 8adfd0 98287->98304 98332 8b1310 98287->98332 98390 8bedf6 98287->98390 98395 8add50 235 API calls 98287->98395 98396 8abf40 98287->98396 98455 913a2a 23 API calls 98287->98455 98456 8aec40 98287->98456 98480 91359c 82 API calls __wsopen_s 98287->98480 98288 9329bf GetForegroundWindow 98288->98297 98290->98297 98291->98287 98291->98290 98292 8f2a31 98292->98293 98294 8f2ca9 Sleep 98294->98287 98297->98282 98297->98286 98297->98287 98297->98288 98297->98292 98297->98293 98297->98294 98481 925658 23 API calls 98297->98481 98482 90e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98297->98482 98483 90d4dc 47 API calls 98297->98483 98305 8ae010 98304->98305 98306 8f2f7a 98305->98306 98308 8ae075 98305->98308 98307 8aec40 235 API calls 98306->98307 98309 8f2f8c 98307->98309 98328 8ae0dc ISource 98308->98328 98487 8c0242 5 API calls __Init_thread_wait 98308->98487 98309->98328 98486 91359c 82 API calls __wsopen_s 98309->98486 98313 8f2fca 98315 8aa961 22 API calls 98313->98315 98313->98328 98314 8aa961 22 API calls 98314->98328 98316 8f2fe4 98315->98316 98488 8c00a3 29 API calls __onexit 98316->98488 98320 8f2fee 98489 8c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98320->98489 98323 8aec40 235 API calls 98323->98328 98325 8aa8c7 22 API calls 98325->98328 98326 8ae3e1 98326->98287 98327 8b04f0 22 API calls 98327->98328 98328->98314 98328->98323 98328->98325 98328->98326 98328->98327 98330 91359c 82 API calls 98328->98330 98484 8aa81b 41 API calls 98328->98484 98485 8ba308 235 API calls 98328->98485 98490 8c0242 5 API calls __Init_thread_wait 98328->98490 98491 8c00a3 29 API calls __onexit 98328->98491 98492 8c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98328->98492 98493 9247d4 235 API calls 98328->98493 98494 9268c1 235 API calls 98328->98494 98330->98328 98333 8b17b0 98332->98333 98334 8b1376 98332->98334 98607 8c0242 5 API calls __Init_thread_wait 98333->98607 98335 8b1390 98334->98335 98336 8f6331 98334->98336 98338 8b1940 9 API calls 98335->98338 98339 8f633d 98336->98339 98612 92709c 235 API calls 98336->98612 98342 8b13a0 98338->98342 98339->98287 98341 8b17ba 98343 8b17fb 98341->98343 98345 8a9cb3 22 API calls 98341->98345 98344 8b1940 9 API calls 98342->98344 98347 8f6346 98343->98347 98349 8b182c 98343->98349 98346 8b13b6 98344->98346 98352 8b17d4 98345->98352 98346->98343 98348 8b13ec 98346->98348 98613 91359c 82 API calls __wsopen_s 98347->98613 98348->98347 98372 8b1408 __fread_nolock 98348->98372 98609 8aaceb 23 API calls ISource 98349->98609 98608 8c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98352->98608 98353 8b1839 98610 8bd217 235 API calls 98353->98610 98356 8f636e 98614 91359c 82 API calls __wsopen_s 98356->98614 98357 8b152f 98359 8b153c 98357->98359 98360 8f63d1 98357->98360 98362 8b1940 9 API calls 98359->98362 98616 925745 54 API calls _wcslen 98360->98616 98363 8b1549 98362->98363 98367 8f64fa 98363->98367 98369 8b1940 9 API calls 98363->98369 98364 8bfddb 22 API calls 98364->98372 98365 8b1872 98611 8bfaeb 23 API calls 98365->98611 98366 8bfe0b 22 API calls 98366->98372 98376 8f6369 98367->98376 98617 91359c 82 API calls __wsopen_s 98367->98617 98374 8b1563 98369->98374 98371 8aec40 235 API calls 98371->98372 98372->98353 98372->98356 98372->98357 98372->98364 98372->98366 98372->98371 98373 8f63b2 98372->98373 98372->98376 98615 91359c 82 API calls __wsopen_s 98373->98615 98374->98367 98377 8aa8c7 22 API calls 98374->98377 98379 8b15c7 ISource 98374->98379 98376->98287 98377->98379 98378 8b1940 9 API calls 98378->98379 98379->98365 98379->98367 98379->98376 98379->98378 98381 8b167b ISource 98379->98381 98384 8a4f39 68 API calls 98379->98384 98495 916ef1 98379->98495 98575 92e505 98379->98575 98588 91f0ec 98379->98588 98597 92958b 98379->98597 98600 90d4ce 98379->98600 98603 92959f 98379->98603 98380 8b171d 98380->98287 98381->98380 98606 8bce17 22 API calls ISource 98381->98606 98384->98379 98391 8bee09 98390->98391 98392 8bee12 98390->98392 98391->98287 98392->98391 98393 8bee36 IsDialogMessageW 98392->98393 98394 8fefaf GetClassLongW 98392->98394 98393->98391 98393->98392 98394->98392 98394->98393 98395->98287 98936 8aadf0 98396->98936 98398 8abf9d 98399 8abfa9 98398->98399 98400 8f04b6 98398->98400 98402 8f04c6 98399->98402 98403 8ac01e 98399->98403 98955 91359c 82 API calls __wsopen_s 98400->98955 98956 91359c 82 API calls __wsopen_s 98402->98956 98941 8aac91 98403->98941 98406 8f04f5 98419 8f055a 98406->98419 98957 8bd217 235 API calls 98406->98957 98407 8ac7da 98412 8bfe0b 22 API calls 98407->98412 98409 8ac039 ISource __fread_nolock 98409->98406 98409->98407 98416 8ac808 __fread_nolock 98409->98416 98417 907120 22 API calls 98409->98417 98418 8f091a 98409->98418 98409->98419 98421 8aaf8a 22 API calls 98409->98421 98422 8bfddb 22 API calls 98409->98422 98425 8aec40 235 API calls 98409->98425 98426 8f08a5 98409->98426 98430 8f0591 98409->98430 98431 8f08f6 98409->98431 98436 8ac237 98409->98436 98440 8ac603 98409->98440 98446 8f09bf 98409->98446 98449 8abbe0 40 API calls 98409->98449 98452 8bfe0b 22 API calls 98409->98452 98945 8aad81 98409->98945 98960 907099 22 API calls __fread_nolock 98409->98960 98961 925745 54 API calls _wcslen 98409->98961 98962 8baa42 22 API calls ISource 98409->98962 98963 90f05c 40 API calls 98409->98963 98964 8aa993 41 API calls 98409->98964 98965 8aaceb 23 API calls ISource 98409->98965 98412->98416 98420 8bfe0b 22 API calls 98416->98420 98417->98409 98968 913209 23 API calls 98418->98968 98419->98440 98958 91359c 82 API calls __wsopen_s 98419->98958 98451 8ac350 ISource __fread_nolock 98420->98451 98421->98409 98422->98409 98425->98409 98427 8aec40 235 API calls 98426->98427 98429 8f08cf 98427->98429 98429->98440 98966 8aa81b 41 API calls 98429->98966 98959 91359c 82 API calls __wsopen_s 98430->98959 98967 91359c 82 API calls __wsopen_s 98431->98967 98438 8ac253 98436->98438 98439 8aa8c7 22 API calls 98436->98439 98441 8f0976 98438->98441 98444 8ac297 ISource 98438->98444 98439->98438 98440->98287 98969 8aaceb 23 API calls ISource 98441->98969 98444->98446 98952 8aaceb 23 API calls ISource 98444->98952 98446->98440 98970 91359c 82 API calls __wsopen_s 98446->98970 98447 8ac335 98447->98446 98448 8ac342 98447->98448 98953 8aa704 22 API calls ISource 98448->98953 98449->98409 98453 8ac3ac 98451->98453 98954 8bce17 22 API calls ISource 98451->98954 98452->98409 98453->98287 98454->98287 98455->98287 98458 8aec76 ISource 98456->98458 98457 8c00a3 29 API calls pre_c_initialization 98457->98458 98458->98457 98459 8afef7 98458->98459 98462 8bfddb 22 API calls 98458->98462 98463 8f4600 98458->98463 98464 8f4b0b 98458->98464 98468 8aa8c7 22 API calls 98458->98468 98471 8c0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98458->98471 98472 8aed9d ISource 98458->98472 98473 8afbe3 98458->98473 98474 8aa961 22 API calls 98458->98474 98477 8f4beb 98458->98477 98478 8c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98458->98478 98479 8af3ae ISource 98458->98479 98979 8b01e0 235 API calls 2 library calls 98458->98979 98980 8b06a0 41 API calls ISource 98458->98980 98466 8aa8c7 22 API calls 98459->98466 98459->98472 98462->98458 98469 8aa8c7 22 API calls 98463->98469 98463->98472 98982 91359c 82 API calls __wsopen_s 98464->98982 98466->98472 98468->98458 98469->98472 98471->98458 98472->98287 98473->98472 98475 8f4bdc 98473->98475 98473->98479 98474->98458 98983 91359c 82 API calls __wsopen_s 98475->98983 98984 91359c 82 API calls __wsopen_s 98477->98984 98478->98458 98479->98472 98981 91359c 82 API calls __wsopen_s 98479->98981 98480->98287 98481->98297 98482->98297 98483->98297 98484->98328 98485->98328 98486->98328 98487->98313 98488->98320 98489->98328 98490->98328 98491->98328 98492->98328 98493->98328 98494->98328 98496 8aa961 22 API calls 98495->98496 98497 916f1d 98496->98497 98498 8aa961 22 API calls 98497->98498 98499 916f26 98498->98499 98500 916f3a 98499->98500 98772 8ab567 98499->98772 98502 8a7510 53 API calls 98500->98502 98507 916f57 _wcslen 98502->98507 98503 916fbc 98505 8a7510 53 API calls 98503->98505 98504 9170bf 98506 8a4ecb 94 API calls 98504->98506 98508 916fc8 98505->98508 98509 9170d0 98506->98509 98507->98503 98507->98504 98515 9170e9 98507->98515 98513 8aa8c7 22 API calls 98508->98513 98518 916fdb 98508->98518 98510 9170e5 98509->98510 98511 8a4ecb 94 API calls 98509->98511 98512 8aa961 22 API calls 98510->98512 98510->98515 98511->98510 98514 91711a 98512->98514 98513->98518 98516 8aa961 22 API calls 98514->98516 98515->98379 98520 917126 98516->98520 98517 917027 98519 8a7510 53 API calls 98517->98519 98518->98517 98521 917005 98518->98521 98522 8aa8c7 22 API calls 98518->98522 98524 917034 98519->98524 98525 8aa961 22 API calls 98520->98525 98523 8a33c6 22 API calls 98521->98523 98522->98521 98526 91700f 98523->98526 98527 917047 98524->98527 98528 91703d 98524->98528 98529 91712f 98525->98529 98530 8a7510 53 API calls 98526->98530 98777 90e199 GetFileAttributesW 98527->98777 98531 8aa8c7 22 API calls 98528->98531 98533 8aa961 22 API calls 98529->98533 98534 91701b 98530->98534 98531->98527 98536 917138 98533->98536 98538 8a6350 22 API calls 98534->98538 98535 917050 98539 917063 98535->98539 98540 8a4c6d 22 API calls 98535->98540 98537 8a7510 53 API calls 98536->98537 98541 917145 98537->98541 98538->98517 98542 8a7510 53 API calls 98539->98542 98548 917069 98539->98548 98540->98539 98618 8a525f 98541->98618 98544 9170a0 98542->98544 98778 90d076 57 API calls 98544->98778 98545 917166 98660 8a4c6d 98545->98660 98548->98515 98550 9171a9 98552 8aa8c7 22 API calls 98550->98552 98551 8a4c6d 22 API calls 98553 917186 98551->98553 98554 9171ba 98552->98554 98553->98550 98557 8a6b57 22 API calls 98553->98557 98555 8a6350 22 API calls 98554->98555 98556 9171c8 98555->98556 98558 8a6350 22 API calls 98556->98558 98559 91719b 98557->98559 98560 9171d6 98558->98560 98561 8a6b57 22 API calls 98559->98561 98562 8a6350 22 API calls 98560->98562 98561->98550 98563 9171e4 98562->98563 98564 8a7510 53 API calls 98563->98564 98565 9171f0 98564->98565 98663 90d7bc 98565->98663 98567 917201 98568 90d4ce 4 API calls 98567->98568 98569 91720b 98568->98569 98570 8a7510 53 API calls 98569->98570 98573 917239 98569->98573 98571 917229 98570->98571 98717 912947 98571->98717 98574 8a4f39 68 API calls 98573->98574 98574->98515 98576 8a7510 53 API calls 98575->98576 98577 92e51d 98576->98577 98578 8aa961 22 API calls 98577->98578 98579 92e52b 98578->98579 98580 8ab567 39 API calls 98579->98580 98581 92e536 98580->98581 98582 92e560 98581->98582 98584 8a7510 53 API calls 98581->98584 98802 8a62b5 22 API calls 98582->98802 98586 92e551 98584->98586 98585 92e56c 98585->98379 98587 8a6d25 22 API calls 98586->98587 98587->98582 98589 8a7510 53 API calls 98588->98589 98590 91f126 98589->98590 98803 8a9e90 98590->98803 98592 91f136 98593 91f15b 98592->98593 98594 8aec40 235 API calls 98592->98594 98596 91f15f 98593->98596 98831 8a9c6e 22 API calls 98593->98831 98594->98593 98596->98379 98839 927f59 98597->98839 98599 92959b 98599->98379 98931 90dbbe lstrlenW 98600->98931 98604 927f59 120 API calls 98603->98604 98605 9295af 98604->98605 98605->98379 98606->98381 98607->98341 98608->98343 98609->98353 98610->98365 98611->98365 98612->98339 98613->98376 98614->98376 98615->98376 98616->98374 98617->98376 98619 8aa961 22 API calls 98618->98619 98620 8a5275 98619->98620 98621 8aa961 22 API calls 98620->98621 98622 8a527d 98621->98622 98623 8aa961 22 API calls 98622->98623 98624 8a5285 98623->98624 98625 8aa961 22 API calls 98624->98625 98626 8a528d 98625->98626 98627 8e3df5 98626->98627 98628 8a52c1 98626->98628 98629 8aa8c7 22 API calls 98627->98629 98630 8a6d25 22 API calls 98628->98630 98631 8e3dfe 98629->98631 98632 8a52cf 98630->98632 98633 8aa6c3 22 API calls 98631->98633 98634 8a93b2 22 API calls 98632->98634 98638 8a5304 98633->98638 98635 8a52d9 98634->98635 98636 8a6d25 22 API calls 98635->98636 98635->98638 98640 8a52fa 98636->98640 98637 8a5349 98779 8a6d25 98637->98779 98638->98637 98641 8a5325 98638->98641 98646 8e3e20 98638->98646 98643 8a93b2 22 API calls 98640->98643 98641->98637 98645 8a4c6d 22 API calls 98641->98645 98642 8a535a 98644 8a5370 98642->98644 98650 8aa8c7 22 API calls 98642->98650 98643->98638 98647 8a5384 98644->98647 98652 8aa8c7 22 API calls 98644->98652 98648 8a5332 98645->98648 98649 8a6b57 22 API calls 98646->98649 98651 8a538f 98647->98651 98654 8aa8c7 22 API calls 98647->98654 98648->98637 98653 8a6d25 22 API calls 98648->98653 98656 8e3ee0 98649->98656 98650->98644 98655 8aa8c7 22 API calls 98651->98655 98658 8a539a 98651->98658 98652->98647 98653->98637 98654->98651 98655->98658 98656->98637 98657 8a4c6d 22 API calls 98656->98657 98792 8a49bd 22 API calls __fread_nolock 98656->98792 98657->98656 98658->98545 98661 8aaec9 22 API calls 98660->98661 98662 8a4c78 98661->98662 98662->98550 98662->98551 98664 90d7d8 98663->98664 98665 90d7f3 98664->98665 98666 90d7dd 98664->98666 98667 8aa961 22 API calls 98665->98667 98669 8aa8c7 22 API calls 98666->98669 98716 90d7ee 98666->98716 98668 90d7fb 98667->98668 98670 8aa961 22 API calls 98668->98670 98669->98716 98671 90d803 98670->98671 98672 8aa961 22 API calls 98671->98672 98673 90d80e 98672->98673 98674 8aa961 22 API calls 98673->98674 98675 90d816 98674->98675 98676 8aa961 22 API calls 98675->98676 98677 90d81e 98676->98677 98678 8aa961 22 API calls 98677->98678 98679 90d826 98678->98679 98680 8aa961 22 API calls 98679->98680 98681 90d82e 98680->98681 98682 8aa961 22 API calls 98681->98682 98683 90d836 98682->98683 98684 8a525f 22 API calls 98683->98684 98685 90d84d 98684->98685 98686 8a525f 22 API calls 98685->98686 98687 90d866 98686->98687 98688 8a4c6d 22 API calls 98687->98688 98689 90d872 98688->98689 98690 90d885 98689->98690 98691 8a93b2 22 API calls 98689->98691 98692 8a4c6d 22 API calls 98690->98692 98691->98690 98693 90d88e 98692->98693 98694 90d89e 98693->98694 98695 8a93b2 22 API calls 98693->98695 98696 90d8b0 98694->98696 98698 8aa8c7 22 API calls 98694->98698 98695->98694 98697 8a6350 22 API calls 98696->98697 98699 90d8bb 98697->98699 98698->98696 98793 90d978 22 API calls 98699->98793 98701 90d8ca 98794 90d978 22 API calls 98701->98794 98703 90d8dd 98704 8a4c6d 22 API calls 98703->98704 98705 90d8e7 98704->98705 98706 90d8ec 98705->98706 98707 90d8fe 98705->98707 98708 8a33c6 22 API calls 98706->98708 98709 8a4c6d 22 API calls 98707->98709 98710 90d8f9 98708->98710 98711 90d907 98709->98711 98714 8a6350 22 API calls 98710->98714 98712 90d925 98711->98712 98713 8a33c6 22 API calls 98711->98713 98715 8a6350 22 API calls 98712->98715 98713->98710 98714->98712 98715->98716 98716->98567 98718 912954 __wsopen_s 98717->98718 98719 8bfe0b 22 API calls 98718->98719 98720 912971 98719->98720 98721 8a5722 22 API calls 98720->98721 98722 91297b 98721->98722 98723 91274e 27 API calls 98722->98723 98724 912986 98723->98724 98725 8a511f 64 API calls 98724->98725 98726 91299b 98725->98726 98727 912a6c 98726->98727 98728 9129bf 98726->98728 98729 912e66 75 API calls 98727->98729 98730 912e66 75 API calls 98728->98730 98731 912a38 98729->98731 98732 9129c4 98730->98732 98734 8a50f5 40 API calls 98731->98734 98766 912a75 ISource 98731->98766 98732->98766 98799 8cd583 26 API calls 98732->98799 98735 912a91 98734->98735 98736 8a50f5 40 API calls 98735->98736 98738 912aa1 98736->98738 98737 9129ed 98800 8cd583 26 API calls 98737->98800 98739 8a50f5 40 API calls 98738->98739 98741 912abc 98739->98741 98742 8a50f5 40 API calls 98741->98742 98743 912acc 98742->98743 98744 8a50f5 40 API calls 98743->98744 98745 912ae7 98744->98745 98746 8a50f5 40 API calls 98745->98746 98747 912af7 98746->98747 98748 8a50f5 40 API calls 98747->98748 98749 912b07 98748->98749 98750 8a50f5 40 API calls 98749->98750 98751 912b17 98750->98751 98795 913017 GetTempPathW GetTempFileNameW 98751->98795 98753 912b22 98754 8ce5eb 29 API calls 98753->98754 98765 912b33 98754->98765 98755 912bed 98756 8ce678 67 API calls 98755->98756 98757 912bf8 98756->98757 98759 912c12 98757->98759 98760 912bfe DeleteFileW 98757->98760 98758 8a50f5 40 API calls 98758->98765 98761 912c91 CopyFileW 98759->98761 98768 912c18 98759->98768 98760->98766 98762 912ca7 DeleteFileW 98761->98762 98763 912cb9 DeleteFileW 98761->98763 98762->98766 98796 912fd8 CreateFileW 98763->98796 98765->98755 98765->98758 98765->98766 98767 8cdbb3 65 API calls 98765->98767 98766->98573 98767->98765 98769 9122ce 79 API calls 98768->98769 98770 912c7c 98769->98770 98770->98763 98771 912c80 DeleteFileW 98770->98771 98771->98766 98773 8ab578 98772->98773 98774 8ab57f 98772->98774 98773->98774 98801 8c62d1 39 API calls _strftime 98773->98801 98774->98500 98776 8ab5c2 98776->98500 98777->98535 98778->98548 98780 8a6d91 98779->98780 98781 8a6d34 98779->98781 98782 8a93b2 22 API calls 98780->98782 98781->98780 98783 8a6d3f 98781->98783 98789 8a6d62 __fread_nolock 98782->98789 98784 8a6d5a 98783->98784 98785 8e4c9d 98783->98785 98787 8a6f34 22 API calls 98784->98787 98786 8bfddb 22 API calls 98785->98786 98788 8e4ca7 98786->98788 98787->98789 98790 8bfe0b 22 API calls 98788->98790 98789->98642 98791 8e4cda 98790->98791 98792->98656 98793->98701 98794->98703 98795->98753 98797 913013 98796->98797 98798 912fff SetFileTime CloseHandle 98796->98798 98797->98766 98798->98797 98799->98737 98800->98731 98801->98776 98802->98585 98804 8a6270 22 API calls 98803->98804 98805 8a9eb5 98804->98805 98806 8a9fd2 98805->98806 98811 8ef7c4 98805->98811 98812 8ef699 98805->98812 98813 8aa6c3 22 API calls 98805->98813 98814 8aa405 98805->98814 98824 8aa12c __fread_nolock 98805->98824 98826 8aa587 22 API calls 98805->98826 98827 8aaec9 22 API calls 98805->98827 98830 8aa4a1 22 API calls 98805->98830 98832 8a4573 41 API calls _wcslen 98805->98832 98834 8a48c8 23 API calls 98805->98834 98835 8a49bd 22 API calls __fread_nolock 98805->98835 98836 8aa673 22 API calls 98805->98836 98807 8aa4a1 22 API calls 98806->98807 98808 8a9fec 98807->98808 98808->98592 98837 9096e2 84 API calls __wsopen_s 98811->98837 98819 8bfddb 22 API calls 98812->98819 98813->98805 98814->98808 98838 9096e2 84 API calls __wsopen_s 98814->98838 98818 8ef7d2 98820 8aa4a1 22 API calls 98818->98820 98821 8ef754 98819->98821 98822 8ef7e8 98820->98822 98823 8bfe0b 22 API calls 98821->98823 98822->98808 98823->98824 98824->98811 98824->98814 98826->98805 98828 8aa0db CharUpperBuffW 98827->98828 98833 8aa673 22 API calls 98828->98833 98830->98805 98831->98596 98832->98805 98833->98805 98834->98805 98835->98805 98836->98805 98837->98818 98838->98808 98840 8a7510 53 API calls 98839->98840 98841 927f90 98840->98841 98864 927fd5 ISource 98841->98864 98877 928cd3 98841->98877 98843 928281 98844 92844f 98843->98844 98848 92828f 98843->98848 98918 928ee4 60 API calls 98844->98918 98847 92845e 98847->98848 98849 92846a 98847->98849 98890 927e86 98848->98890 98849->98864 98850 8a7510 53 API calls 98869 928049 98850->98869 98855 9282c8 98905 8bfc70 98855->98905 98858 928302 98912 8a63eb 22 API calls 98858->98912 98859 9282e8 98911 91359c 82 API calls __wsopen_s 98859->98911 98862 9282f3 GetCurrentProcess TerminateProcess 98862->98858 98863 928311 98913 8a6a50 22 API calls 98863->98913 98864->98599 98866 92832a 98876 928352 98866->98876 98914 8b04f0 22 API calls 98866->98914 98868 9284c5 98868->98864 98873 9284d9 FreeLibrary 98868->98873 98869->98843 98869->98850 98869->98864 98909 90417d 22 API calls __fread_nolock 98869->98909 98910 92851d 42 API calls _strftime 98869->98910 98870 928341 98915 928b7b 75 API calls 98870->98915 98873->98864 98876->98868 98916 8b04f0 22 API calls 98876->98916 98917 8aaceb 23 API calls ISource 98876->98917 98919 928b7b 75 API calls 98876->98919 98878 8aaec9 22 API calls 98877->98878 98879 928cee CharLowerBuffW 98878->98879 98920 908e54 98879->98920 98883 8aa961 22 API calls 98884 928d2a 98883->98884 98885 8a6d25 22 API calls 98884->98885 98886 928d3e 98885->98886 98887 8a93b2 22 API calls 98886->98887 98889 928d48 _wcslen 98887->98889 98888 928e5e _wcslen 98888->98869 98889->98888 98927 92851d 42 API calls _strftime 98889->98927 98891 927ea1 98890->98891 98895 927eec 98890->98895 98892 8bfe0b 22 API calls 98891->98892 98893 927ec3 98892->98893 98894 8bfddb 22 API calls 98893->98894 98893->98895 98894->98893 98896 929096 98895->98896 98897 9292ab ISource 98896->98897 98904 9290ba _strcat _wcslen 98896->98904 98897->98855 98898 8ab6b5 39 API calls 98898->98904 98899 8ab38f 39 API calls 98899->98904 98900 8ab567 39 API calls 98900->98904 98901 8a7510 53 API calls 98901->98904 98902 8cea0c 21 API calls ___std_exception_copy 98902->98904 98904->98897 98904->98898 98904->98899 98904->98900 98904->98901 98904->98902 98930 90efae 24 API calls _wcslen 98904->98930 98906 8bfc85 98905->98906 98907 8bfd1d VirtualProtect 98906->98907 98908 8bfceb 98906->98908 98907->98908 98908->98858 98908->98859 98909->98869 98910->98869 98911->98862 98912->98863 98913->98866 98914->98870 98915->98876 98916->98876 98917->98876 98918->98847 98919->98876 98922 908e74 _wcslen 98920->98922 98921 908f63 98921->98883 98921->98889 98922->98921 98924 908ea9 98922->98924 98926 908f68 98922->98926 98924->98921 98928 8bce60 41 API calls 98924->98928 98926->98921 98929 8bce60 41 API calls 98926->98929 98927->98888 98928->98924 98929->98926 98930->98904 98932 90d4d5 98931->98932 98933 90dbdc GetFileAttributesW 98931->98933 98932->98379 98933->98932 98934 90dbe8 FindFirstFileW 98933->98934 98934->98932 98935 90dbf9 FindClose 98934->98935 98935->98932 98937 8aae01 98936->98937 98940 8aae1c ISource 98936->98940 98938 8aaec9 22 API calls 98937->98938 98939 8aae09 CharUpperBuffW 98938->98939 98939->98940 98940->98398 98942 8aacae 98941->98942 98943 8aacd1 98942->98943 98971 91359c 82 API calls __wsopen_s 98942->98971 98943->98409 98946 8efadb 98945->98946 98947 8aad92 98945->98947 98948 8bfddb 22 API calls 98947->98948 98949 8aad99 98948->98949 98972 8aadcd 98949->98972 98952->98447 98953->98451 98954->98451 98955->98402 98956->98440 98957->98419 98958->98440 98959->98440 98960->98409 98961->98409 98962->98409 98963->98409 98964->98409 98965->98409 98966->98431 98967->98440 98968->98436 98969->98446 98970->98440 98971->98943 98975 8aaddd 98972->98975 98973 8aadb6 98973->98409 98974 8bfddb 22 API calls 98974->98975 98975->98973 98975->98974 98976 8aa961 22 API calls 98975->98976 98977 8aa8c7 22 API calls 98975->98977 98978 8aadcd 22 API calls 98975->98978 98976->98975 98977->98975 98978->98975 98979->98458 98980->98458 98981->98472 98982->98472 98983->98477 98984->98472 98985 8d8402 98990 8d81be 98985->98990 98988 8d842a 98995 8d81ef try_get_first_available_module 98990->98995 98992 8d83ee 99009 8d27ec 26 API calls _abort 98992->99009 98994 8d8343 98994->98988 99002 8e0984 98994->99002 99001 8d8338 98995->99001 99005 8c8e0b 40 API calls 2 library calls 98995->99005 98997 8d838c 98997->99001 99006 8c8e0b 40 API calls 2 library calls 98997->99006 98999 8d83ab 98999->99001 99007 8c8e0b 40 API calls 2 library calls 98999->99007 99001->98994 99008 8cf2d9 20 API calls _abort 99001->99008 99010 8e0081 99002->99010 99004 8e099f 99004->98988 99005->98997 99006->98999 99007->99001 99008->98992 99009->98994 99011 8e008d __FrameHandler3::FrameUnwindToState 99010->99011 99012 8e009b 99011->99012 99015 8e00d4 99011->99015 99068 8cf2d9 20 API calls _abort 99012->99068 99014 8e00a0 99069 8d27ec 26 API calls _abort 99014->99069 99021 8e065b 99015->99021 99020 8e00aa __wsopen_s 99020->99004 99071 8e042f 99021->99071 99024 8e068d 99103 8cf2c6 20 API calls _abort 99024->99103 99025 8e06a6 99089 8d5221 99025->99089 99028 8e06ab 99029 8e06cb 99028->99029 99030 8e06b4 99028->99030 99102 8e039a CreateFileW 99029->99102 99105 8cf2c6 20 API calls _abort 99030->99105 99034 8e06b9 99106 8cf2d9 20 API calls _abort 99034->99106 99035 8e0781 GetFileType 99040 8e078c GetLastError 99035->99040 99041 8e07d3 99035->99041 99036 8e00f8 99070 8e0121 LeaveCriticalSection __wsopen_s 99036->99070 99038 8e0756 GetLastError 99108 8cf2a3 20 API calls __dosmaperr 99038->99108 99039 8e0704 99039->99035 99039->99038 99107 8e039a CreateFileW 99039->99107 99109 8cf2a3 20 API calls __dosmaperr 99040->99109 99111 8d516a 21 API calls 2 library calls 99041->99111 99042 8e0692 99104 8cf2d9 20 API calls _abort 99042->99104 99046 8e079a CloseHandle 99046->99042 99049 8e07c3 99046->99049 99048 8e0749 99048->99035 99048->99038 99110 8cf2d9 20 API calls _abort 99049->99110 99051 8e07f4 99053 8e0840 99051->99053 99112 8e05ab 72 API calls 3 library calls 99051->99112 99052 8e07c8 99052->99042 99057 8e086d 99053->99057 99113 8e014d 72 API calls 4 library calls 99053->99113 99056 8e0866 99056->99057 99058 8e087e 99056->99058 99059 8d86ae __wsopen_s 29 API calls 99057->99059 99058->99036 99060 8e08fc CloseHandle 99058->99060 99059->99036 99114 8e039a CreateFileW 99060->99114 99062 8e0927 99063 8e095d 99062->99063 99064 8e0931 GetLastError 99062->99064 99063->99036 99115 8cf2a3 20 API calls __dosmaperr 99064->99115 99066 8e093d 99116 8d5333 21 API calls 2 library calls 99066->99116 99068->99014 99069->99020 99070->99020 99072 8e046a 99071->99072 99073 8e0450 99071->99073 99117 8e03bf 99072->99117 99073->99072 99124 8cf2d9 20 API calls _abort 99073->99124 99076 8e045f 99125 8d27ec 26 API calls _abort 99076->99125 99078 8e04a2 99079 8e04d1 99078->99079 99126 8cf2d9 20 API calls _abort 99078->99126 99083 8e0524 99079->99083 99128 8cd70d 26 API calls 2 library calls 99079->99128 99082 8e04c6 99127 8d27ec 26 API calls _abort 99082->99127 99083->99024 99083->99025 99084 8e051f 99084->99083 99085 8e059e 99084->99085 99129 8d27fc 11 API calls _abort 99085->99129 99088 8e05aa 99090 8d522d __FrameHandler3::FrameUnwindToState 99089->99090 99132 8d2f5e EnterCriticalSection 99090->99132 99092 8d5234 99093 8d5259 99092->99093 99098 8d52c7 EnterCriticalSection 99092->99098 99099 8d527b 99092->99099 99136 8d5000 99093->99136 99096 8d52a4 __wsopen_s 99096->99028 99098->99099 99100 8d52d4 LeaveCriticalSection 99098->99100 99133 8d532a 99099->99133 99100->99092 99102->99039 99103->99042 99104->99036 99105->99034 99106->99042 99107->99048 99108->99042 99109->99046 99110->99052 99111->99051 99112->99053 99113->99056 99114->99062 99115->99066 99116->99063 99120 8e03d7 99117->99120 99118 8e03f2 99118->99078 99120->99118 99130 8cf2d9 20 API calls _abort 99120->99130 99121 8e0416 99131 8d27ec 26 API calls _abort 99121->99131 99123 8e0421 99123->99078 99124->99076 99125->99072 99126->99082 99127->99079 99128->99084 99129->99088 99130->99121 99131->99123 99132->99092 99144 8d2fa6 LeaveCriticalSection 99133->99144 99135 8d5331 99135->99096 99137 8d4c7d _abort 20 API calls 99136->99137 99139 8d5012 99137->99139 99138 8d501f 99140 8d29c8 _free 20 API calls 99138->99140 99139->99138 99145 8d3405 11 API calls 2 library calls 99139->99145 99142 8d5071 99140->99142 99142->99099 99143 8d5147 EnterCriticalSection 99142->99143 99143->99099 99144->99135 99145->99139 99146 8a105b 99151 8a344d 99146->99151 99148 8a106a 99182 8c00a3 29 API calls __onexit 99148->99182 99150 8a1074 99152 8a345d __wsopen_s 99151->99152 99153 8aa961 22 API calls 99152->99153 99154 8a3513 99153->99154 99155 8a3a5a 24 API calls 99154->99155 99156 8a351c 99155->99156 99183 8a3357 99156->99183 99159 8a33c6 22 API calls 99160 8a3535 99159->99160 99161 8a515f 22 API calls 99160->99161 99162 8a3544 99161->99162 99163 8aa961 22 API calls 99162->99163 99164 8a354d 99163->99164 99165 8aa6c3 22 API calls 99164->99165 99166 8a3556 RegOpenKeyExW 99165->99166 99167 8e3176 RegQueryValueExW 99166->99167 99171 8a3578 99166->99171 99168 8e320c RegCloseKey 99167->99168 99169 8e3193 99167->99169 99168->99171 99181 8e321e _wcslen 99168->99181 99170 8bfe0b 22 API calls 99169->99170 99172 8e31ac 99170->99172 99171->99148 99173 8a5722 22 API calls 99172->99173 99174 8e31b7 RegQueryValueExW 99173->99174 99176 8e31d4 99174->99176 99178 8e31ee ISource 99174->99178 99175 8a4c6d 22 API calls 99175->99181 99177 8a6b57 22 API calls 99176->99177 99177->99178 99178->99168 99179 8a9cb3 22 API calls 99179->99181 99180 8a515f 22 API calls 99180->99181 99181->99171 99181->99175 99181->99179 99181->99180 99182->99150 99184 8e1f50 __wsopen_s 99183->99184 99185 8a3364 GetFullPathNameW 99184->99185 99186 8a3386 99185->99186 99187 8a6b57 22 API calls 99186->99187 99188 8a33a4 99187->99188 99188->99159 99189 8a1098 99194 8a42de 99189->99194 99193 8a10a7 99195 8aa961 22 API calls 99194->99195 99196 8a42f5 GetVersionExW 99195->99196 99197 8a6b57 22 API calls 99196->99197 99198 8a4342 99197->99198 99199 8a93b2 22 API calls 99198->99199 99213 8a4378 99198->99213 99200 8a436c 99199->99200 99201 8a37a0 22 API calls 99200->99201 99201->99213 99202 8a441b GetCurrentProcess IsWow64Process 99203 8a4437 99202->99203 99204 8a444f LoadLibraryA 99203->99204 99205 8e3824 GetSystemInfo 99203->99205 99206 8a449c GetSystemInfo 99204->99206 99207 8a4460 GetProcAddress 99204->99207 99208 8a4476 99206->99208 99207->99206 99210 8a4470 GetNativeSystemInfo 99207->99210 99211 8a447a FreeLibrary 99208->99211 99212 8a109d 99208->99212 99209 8e37df 99210->99208 99211->99212 99214 8c00a3 29 API calls __onexit 99212->99214 99213->99202 99213->99209 99214->99193 99215 8af7bf 99216 8af7d3 99215->99216 99217 8afcb6 99215->99217 99219 8afcc2 99216->99219 99220 8bfddb 22 API calls 99216->99220 99252 8aaceb 23 API calls ISource 99217->99252 99253 8aaceb 23 API calls ISource 99219->99253 99222 8af7e5 99220->99222 99222->99219 99223 8af83e 99222->99223 99224 8afd3d 99222->99224 99226 8b1310 235 API calls 99223->99226 99242 8aed9d ISource 99223->99242 99254 911155 22 API calls 99224->99254 99233 8aec76 ISource 99226->99233 99227 8bfddb 22 API calls 99227->99233 99228 8f4beb 99258 91359c 82 API calls __wsopen_s 99228->99258 99229 8afef7 99236 8aa8c7 22 API calls 99229->99236 99229->99242 99232 8f4600 99238 8aa8c7 22 API calls 99232->99238 99232->99242 99233->99227 99233->99228 99233->99229 99233->99232 99234 8f4b0b 99233->99234 99240 8c0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 99233->99240 99241 8aa8c7 22 API calls 99233->99241 99233->99242 99243 8afbe3 99233->99243 99244 8aa961 22 API calls 99233->99244 99246 8c00a3 29 API calls pre_c_initialization 99233->99246 99248 8c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 99233->99248 99249 8af3ae ISource 99233->99249 99250 8b01e0 235 API calls 2 library calls 99233->99250 99251 8b06a0 41 API calls ISource 99233->99251 99256 91359c 82 API calls __wsopen_s 99234->99256 99236->99242 99238->99242 99240->99233 99241->99233 99243->99242 99245 8f4bdc 99243->99245 99243->99249 99244->99233 99257 91359c 82 API calls __wsopen_s 99245->99257 99246->99233 99248->99233 99249->99242 99255 91359c 82 API calls __wsopen_s 99249->99255 99250->99233 99251->99233 99252->99219 99253->99224 99254->99242 99255->99242 99256->99242 99257->99228 99258->99242 99259 8d90fa 99260 8d9107 99259->99260 99263 8d911f 99259->99263 99309 8cf2d9 20 API calls _abort 99260->99309 99262 8d910c 99310 8d27ec 26 API calls _abort 99262->99310 99265 8d917a 99263->99265 99273 8d9117 99263->99273 99311 8dfdc4 21 API calls 2 library calls 99263->99311 99267 8cd955 __fread_nolock 26 API calls 99265->99267 99268 8d9192 99267->99268 99279 8d8c32 99268->99279 99270 8d9199 99271 8cd955 __fread_nolock 26 API calls 99270->99271 99270->99273 99272 8d91c5 99271->99272 99272->99273 99274 8cd955 __fread_nolock 26 API calls 99272->99274 99275 8d91d3 99274->99275 99275->99273 99276 8cd955 __fread_nolock 26 API calls 99275->99276 99277 8d91e3 99276->99277 99278 8cd955 __fread_nolock 26 API calls 99277->99278 99278->99273 99280 8d8c3e __FrameHandler3::FrameUnwindToState 99279->99280 99281 8d8c5e 99280->99281 99282 8d8c46 99280->99282 99284 8d8d24 99281->99284 99289 8d8c97 99281->99289 99313 8cf2c6 20 API calls _abort 99282->99313 99320 8cf2c6 20 API calls _abort 99284->99320 99286 8d8c4b 99314 8cf2d9 20 API calls _abort 99286->99314 99287 8d8d29 99321 8cf2d9 20 API calls _abort 99287->99321 99291 8d8cbb 99289->99291 99292 8d8ca6 99289->99292 99312 8d5147 EnterCriticalSection 99291->99312 99315 8cf2c6 20 API calls _abort 99292->99315 99294 8d8cb3 99322 8d27ec 26 API calls _abort 99294->99322 99296 8d8cc1 99299 8d8cdd 99296->99299 99300 8d8cf2 99296->99300 99297 8d8cab 99316 8cf2d9 20 API calls _abort 99297->99316 99317 8cf2d9 20 API calls _abort 99299->99317 99304 8d8d45 __fread_nolock 38 API calls 99300->99304 99302 8d8c53 __wsopen_s 99302->99270 99306 8d8ced 99304->99306 99305 8d8ce2 99318 8cf2c6 20 API calls _abort 99305->99318 99319 8d8d1c LeaveCriticalSection __wsopen_s 99306->99319 99309->99262 99310->99273 99311->99265 99312->99296 99313->99286 99314->99302 99315->99297 99316->99294 99317->99305 99318->99306 99319->99302 99320->99287 99321->99294 99322->99302 99323 8c03fb 99324 8c0407 __FrameHandler3::FrameUnwindToState 99323->99324 99352 8bfeb1 99324->99352 99326 8c040e 99327 8c0561 99326->99327 99330 8c0438 99326->99330 99379 8c083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 99327->99379 99329 8c0568 99380 8c4e52 28 API calls _abort 99329->99380 99338 8c0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 99330->99338 99363 8d247d 99330->99363 99332 8c056e 99381 8c4e04 28 API calls _abort 99332->99381 99336 8c0576 99337 8c0457 99340 8c04d8 99338->99340 99375 8c4e1a 38 API calls 2 library calls 99338->99375 99371 8c0959 99340->99371 99343 8c04de 99344 8c04f3 99343->99344 99376 8c0992 GetModuleHandleW 99344->99376 99346 8c04fa 99346->99329 99347 8c04fe 99346->99347 99348 8c0507 99347->99348 99377 8c4df5 28 API calls _abort 99347->99377 99378 8c0040 13 API calls 2 library calls 99348->99378 99351 8c050f 99351->99337 99353 8bfeba 99352->99353 99382 8c0698 IsProcessorFeaturePresent 99353->99382 99355 8bfec6 99383 8c2c94 10 API calls 3 library calls 99355->99383 99357 8bfecb 99358 8bfecf 99357->99358 99384 8d2317 99357->99384 99358->99326 99361 8bfee6 99361->99326 99366 8d2494 99363->99366 99364 8c0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 99365 8c0451 99364->99365 99365->99337 99367 8d2421 99365->99367 99366->99364 99368 8d2450 99367->99368 99369 8c0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 99368->99369 99370 8d2479 99369->99370 99370->99338 99427 8c2340 99371->99427 99374 8c097f 99374->99343 99375->99340 99376->99346 99377->99348 99378->99351 99379->99329 99380->99332 99381->99336 99382->99355 99383->99357 99388 8dd1f6 99384->99388 99387 8c2cbd 8 API calls 3 library calls 99387->99358 99391 8dd213 99388->99391 99392 8dd20f 99388->99392 99389 8c0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 99390 8bfed8 99389->99390 99390->99361 99390->99387 99391->99392 99394 8d4bfb 99391->99394 99392->99389 99395 8d4c07 __FrameHandler3::FrameUnwindToState 99394->99395 99406 8d2f5e EnterCriticalSection 99395->99406 99397 8d4c0e 99407 8d50af 99397->99407 99399 8d4c1d 99404 8d4c2c 99399->99404 99420 8d4a8f 29 API calls 99399->99420 99402 8d4c27 99421 8d4b45 GetStdHandle GetFileType 99402->99421 99422 8d4c48 LeaveCriticalSection _abort 99404->99422 99405 8d4c3d __wsopen_s 99405->99391 99406->99397 99408 8d50bb __FrameHandler3::FrameUnwindToState 99407->99408 99409 8d50df 99408->99409 99410 8d50c8 99408->99410 99423 8d2f5e EnterCriticalSection 99409->99423 99424 8cf2d9 20 API calls _abort 99410->99424 99413 8d50eb 99418 8d5000 __wsopen_s 21 API calls 99413->99418 99419 8d5117 99413->99419 99414 8d50cd 99425 8d27ec 26 API calls _abort 99414->99425 99417 8d50d7 __wsopen_s 99417->99399 99418->99413 99426 8d513e LeaveCriticalSection _abort 99419->99426 99420->99402 99421->99404 99422->99405 99423->99413 99424->99414 99425->99417 99426->99417 99428 8c096c GetStartupInfoW 99427->99428 99428->99374 99429 8a1033 99434 8a4c91 99429->99434 99433 8a1042 99435 8aa961 22 API calls 99434->99435 99436 8a4cff 99435->99436 99442 8a3af0 99436->99442 99439 8a4d9c 99440 8a1038 99439->99440 99445 8a51f7 22 API calls __fread_nolock 99439->99445 99441 8c00a3 29 API calls __onexit 99440->99441 99441->99433 99446 8a3b1c 99442->99446 99445->99439 99447 8a3b0f 99446->99447 99448 8a3b29 99446->99448 99447->99439 99448->99447 99449 8a3b30 RegOpenKeyExW 99448->99449 99449->99447 99450 8a3b4a RegQueryValueExW 99449->99450 99451 8a3b6b 99450->99451 99452 8a3b80 RegCloseKey 99450->99452 99451->99452 99452->99447 99453 19120c8 99467 190fd18 99453->99467 99455 19121c0 99470 1911fb8 99455->99470 99473 19131e8 GetPEB 99467->99473 99469 19103a3 99469->99455 99471 1911fc1 Sleep 99470->99471 99472 1911fcf 99471->99472 99474 1913212 99473->99474 99474->99469 99475 8f3f75 99486 8bceb1 99475->99486 99477 8f3f8b 99478 8f4006 99477->99478 99495 8be300 23 API calls 99477->99495 99480 8abf40 235 API calls 99478->99480 99482 8f4052 99480->99482 99481 8f3fe6 99481->99482 99496 911abf 22 API calls 99481->99496 99484 8f4a88 99482->99484 99497 91359c 82 API calls __wsopen_s 99482->99497 99487 8bcebf 99486->99487 99488 8bced2 99486->99488 99498 8aaceb 23 API calls ISource 99487->99498 99490 8bced7 99488->99490 99491 8bcf05 99488->99491 99492 8bfddb 22 API calls 99490->99492 99499 8aaceb 23 API calls ISource 99491->99499 99494 8bcec9 99492->99494 99494->99477 99495->99481 99496->99478 99497->99484 99498->99494 99499->99494 99500 8a3156 99503 8a3170 99500->99503 99504 8a3187 99503->99504 99505 8a31eb 99504->99505 99506 8a318c 99504->99506 99544 8a31e9 99504->99544 99508 8e2dfb 99505->99508 99509 8a31f1 99505->99509 99510 8a3199 99506->99510 99511 8a3265 PostQuitMessage 99506->99511 99507 8a31d0 DefWindowProcW 99532 8a316a 99507->99532 99559 8a18e2 10 API calls 99508->99559 99514 8a31f8 99509->99514 99515 8a321d SetTimer RegisterWindowMessageW 99509->99515 99512 8e2e7c 99510->99512 99513 8a31a4 99510->99513 99511->99532 99563 90bf30 34 API calls ___scrt_fastfail 99512->99563 99518 8a31ae 99513->99518 99519 8e2e68 99513->99519 99522 8e2d9c 99514->99522 99523 8a3201 KillTimer 99514->99523 99520 8a3246 CreatePopupMenu I_RpcFreeBuffer 99515->99520 99515->99532 99517 8e2e1c 99560 8be499 42 API calls 99517->99560 99525 8a31b9 99518->99525 99537 8e2e4d 99518->99537 99548 90c161 99519->99548 99526 8a3253 99520->99526 99528 8e2dd7 MoveWindow 99522->99528 99529 8e2da1 99522->99529 99555 8a30f2 Shell_NotifyIconW ___scrt_fastfail 99523->99555 99525->99526 99533 8a31c4 99525->99533 99557 8a326f 44 API calls ___scrt_fastfail 99526->99557 99527 8e2e8e 99527->99507 99527->99532 99528->99532 99535 8e2dc6 SetFocus 99529->99535 99536 8e2da7 99529->99536 99533->99507 99561 8a30f2 Shell_NotifyIconW ___scrt_fastfail 99533->99561 99535->99532 99536->99533 99540 8e2db0 99536->99540 99537->99507 99562 900ad7 22 API calls 99537->99562 99538 8a3214 99556 8a3c50 DeleteObject DestroyWindow 99538->99556 99539 8a3263 99539->99532 99558 8a18e2 10 API calls 99540->99558 99544->99507 99546 8e2e41 99547 8a3837 49 API calls 99546->99547 99547->99544 99549 90c276 99548->99549 99550 90c179 ___scrt_fastfail 99548->99550 99549->99532 99551 8a3923 24 API calls 99550->99551 99553 90c1a0 99551->99553 99552 90c25f KillTimer SetTimer 99552->99549 99553->99552 99554 90c251 Shell_NotifyIconW 99553->99554 99554->99552 99555->99538 99556->99532 99557->99539 99558->99532 99559->99517 99560->99533 99561->99546 99562->99544 99563->99527 99564 8a2e37 99565 8aa961 22 API calls 99564->99565 99566 8a2e4d 99565->99566 99643 8a4ae3 99566->99643 99568 8a2e6b 99569 8a3a5a 24 API calls 99568->99569 99570 8a2e7f 99569->99570 99571 8a9cb3 22 API calls 99570->99571 99572 8a2e8c 99571->99572 99573 8a4ecb 94 API calls 99572->99573 99574 8a2ea5 99573->99574 99575 8e2cb0 99574->99575 99577 8a2ead 99574->99577 99576 912cf9 80 API calls 99575->99576 99578 8e2cc3 99576->99578 99580 8aa8c7 22 API calls 99577->99580 99579 8e2ccf 99578->99579 99581 8a4f39 68 API calls 99578->99581 99584 8a4f39 68 API calls 99579->99584 99582 8a2ec3 99580->99582 99581->99579 99657 8a6f88 22 API calls 99582->99657 99586 8e2ce5 99584->99586 99585 8a2ecf 99587 8a9cb3 22 API calls 99585->99587 99673 8a3084 22 API calls 99586->99673 99588 8a2edc 99587->99588 99658 8aa81b 41 API calls 99588->99658 99590 8a2eec 99593 8a9cb3 22 API calls 99590->99593 99592 8e2d02 99674 8a3084 22 API calls 99592->99674 99594 8a2f12 99593->99594 99659 8aa81b 41 API calls 99594->99659 99596 8e2d1e 99598 8a3a5a 24 API calls 99596->99598 99599 8e2d44 99598->99599 99675 8a3084 22 API calls 99599->99675 99600 8a2f21 99603 8aa961 22 API calls 99600->99603 99602 8e2d50 99604 8aa8c7 22 API calls 99602->99604 99605 8a2f3f 99603->99605 99606 8e2d5e 99604->99606 99660 8a3084 22 API calls 99605->99660 99676 8a3084 22 API calls 99606->99676 99609 8a2f4b 99661 8c4a28 40 API calls 3 library calls 99609->99661 99610 8e2d6d 99615 8aa8c7 22 API calls 99610->99615 99612 8a2f59 99612->99586 99613 8a2f63 99612->99613 99662 8c4a28 40 API calls 3 library calls 99613->99662 99617 8e2d83 99615->99617 99616 8a2f6e 99616->99592 99618 8a2f78 99616->99618 99677 8a3084 22 API calls 99617->99677 99663 8c4a28 40 API calls 3 library calls 99618->99663 99620 8e2d90 99622 8a2f83 99622->99596 99623 8a2f8d 99622->99623 99664 8c4a28 40 API calls 3 library calls 99623->99664 99625 8a2f98 99626 8a2fdc 99625->99626 99665 8a3084 22 API calls 99625->99665 99626->99610 99627 8a2fe8 99626->99627 99627->99620 99667 8a63eb 22 API calls 99627->99667 99630 8a2fbf 99632 8aa8c7 22 API calls 99630->99632 99631 8a2ff8 99668 8a6a50 22 API calls 99631->99668 99633 8a2fcd 99632->99633 99666 8a3084 22 API calls 99633->99666 99636 8a3006 99669 8a70b0 23 API calls 99636->99669 99640 8a3021 99641 8a3065 99640->99641 99670 8a6f88 22 API calls 99640->99670 99671 8a70b0 23 API calls 99640->99671 99672 8a3084 22 API calls 99640->99672 99644 8a4af0 __wsopen_s 99643->99644 99645 8a6b57 22 API calls 99644->99645 99646 8a4b22 99644->99646 99645->99646 99647 8a4c6d 22 API calls 99646->99647 99651 8a4b58 99646->99651 99647->99646 99648 8a9cb3 22 API calls 99650 8a4c52 99648->99650 99649 8a9cb3 22 API calls 99649->99651 99652 8a515f 22 API calls 99650->99652 99651->99649 99654 8a515f 22 API calls 99651->99654 99655 8a4c29 99651->99655 99656 8a4c6d 22 API calls 99651->99656 99653 8a4c5e 99652->99653 99653->99568 99654->99651 99655->99648 99655->99653 99656->99651 99657->99585 99658->99590 99659->99600 99660->99609 99661->99612 99662->99616 99663->99622 99664->99625 99665->99630 99666->99626 99667->99631 99668->99636 99669->99640 99670->99640 99671->99640 99672->99640 99673->99592 99674->99596 99675->99602 99676->99610 99677->99620

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 234 8a42de-8a434d call 8aa961 GetVersionExW call 8a6b57 239 8e3617-8e362a 234->239 240 8a4353 234->240 241 8e362b-8e362f 239->241 242 8a4355-8a4357 240->242 243 8e3632-8e363e 241->243 244 8e3631 241->244 245 8a435d-8a43bc call 8a93b2 call 8a37a0 242->245 246 8e3656 242->246 243->241 247 8e3640-8e3642 243->247 244->243 262 8e37df-8e37e6 245->262 263 8a43c2-8a43c4 245->263 251 8e365d-8e3660 246->251 247->242 250 8e3648-8e364f 247->250 250->239 253 8e3651 250->253 254 8a441b-8a4435 GetCurrentProcess IsWow64Process 251->254 255 8e3666-8e36a8 251->255 253->246 258 8a4437 254->258 259 8a4494-8a449a 254->259 255->254 256 8e36ae-8e36b1 255->256 260 8e36db-8e36e5 256->260 261 8e36b3-8e36bd 256->261 264 8a443d-8a4449 258->264 259->264 268 8e36f8-8e3702 260->268 269 8e36e7-8e36f3 260->269 265 8e36bf-8e36c5 261->265 266 8e36ca-8e36d6 261->266 270 8e37e8 262->270 271 8e3806-8e3809 262->271 263->251 267 8a43ca-8a43dd 263->267 272 8a444f-8a445e LoadLibraryA 264->272 273 8e3824-8e3828 GetSystemInfo 264->273 265->254 266->254 274 8e3726-8e372f 267->274 275 8a43e3-8a43e5 267->275 277 8e3704-8e3710 268->277 278 8e3715-8e3721 268->278 269->254 276 8e37ee 270->276 279 8e380b-8e381a 271->279 280 8e37f4-8e37fc 271->280 281 8a449c-8a44a6 GetSystemInfo 272->281 282 8a4460-8a446e GetProcAddress 272->282 286 8e373c-8e3748 274->286 287 8e3731-8e3737 274->287 284 8a43eb-8a43ee 275->284 285 8e374d-8e3762 275->285 276->280 277->254 278->254 279->276 288 8e381c-8e3822 279->288 280->271 283 8a4476-8a4478 281->283 282->281 289 8a4470-8a4474 GetNativeSystemInfo 282->289 290 8a447a-8a447b FreeLibrary 283->290 291 8a4481-8a4493 283->291 292 8a43f4-8a440f 284->292 293 8e3791-8e3794 284->293 294 8e376f-8e377b 285->294 295 8e3764-8e376a 285->295 286->254 287->254 288->280 289->283 290->291 297 8e3780-8e378c 292->297 298 8a4415 292->298 293->254 296 8e379a-8e37c1 293->296 294->254 295->254 299 8e37ce-8e37da 296->299 300 8e37c3-8e37c9 296->300 297->254 298->254 299->254 300->254
                                                        APIs
                                                        • GetVersionExW.KERNEL32(?), ref: 008A430D
                                                          • Part of subcall function 008A6B57: _wcslen.LIBCMT ref: 008A6B6A
                                                        • GetCurrentProcess.KERNEL32(?,0093CB64,00000000,?,?), ref: 008A4422
                                                        • IsWow64Process.KERNEL32(00000000,?,?), ref: 008A4429
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 008A4454
                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 008A4466
                                                        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 008A4474
                                                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 008A447B
                                                        • GetSystemInfo.KERNEL32(?,?,?), ref: 008A44A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                        • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                        • API String ID: 3290436268-3101561225
                                                        • Opcode ID: 794d1495c881c396c87b0e7d50999da0e225f83d8ad261feb4a2688160d11a09
                                                        • Instruction ID: 34c6d4b4d64ff018d3b2c154c86b6efde23abbfb5f5cb840d979eaeddb6654e8
                                                        • Opcode Fuzzy Hash: 794d1495c881c396c87b0e7d50999da0e225f83d8ad261feb4a2688160d11a09
                                                        • Instruction Fuzzy Hash: B2A1C16393F2C4CFDB11CB7D7C451957FA4BB67304B0858A9E08DE3A62D2604988FB25

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 661 8a42a2-8a42ba CreateStreamOnHGlobal 662 8a42da-8a42dd 661->662 663 8a42bc-8a42d3 FindResourceExW 661->663 664 8a42d9 663->664 665 8e35ba-8e35c9 LoadResource 663->665 664->662 665->664 666 8e35cf-8e35dd SizeofResource 665->666 666->664 667 8e35e3-8e35ee LockResource 666->667 667->664 668 8e35f4-8e3612 667->668 668->664
                                                        APIs
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,008A50AA,?,?,00000000,00000000), ref: 008A42B2
                                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,008A50AA,?,?,00000000,00000000), ref: 008A42C9
                                                        • LoadResource.KERNEL32(?,00000000,?,?,008A50AA,?,?,00000000,00000000,?,?,?,?,?,?,008A4F20), ref: 008E35BE
                                                        • SizeofResource.KERNEL32(?,00000000,?,?,008A50AA,?,?,00000000,00000000,?,?,?,?,?,?,008A4F20), ref: 008E35D3
                                                        • LockResource.KERNEL32(008A50AA,?,?,008A50AA,?,?,00000000,00000000,?,?,?,?,?,?,008A4F20,?), ref: 008E35E6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                        • String ID: SCRIPT
                                                        • API String ID: 3051347437-3967369404
                                                        • Opcode ID: 0c187d2bd7ac2d78adcdb4eaffe42c267372cee87725a9c5bddee3076656fd66
                                                        • Instruction ID: 4e89bad700c7b2ea6c3cdd28a981bae32a6f817ccec0cdf9e2effeb5b867cd05
                                                        • Opcode Fuzzy Hash: 0c187d2bd7ac2d78adcdb4eaffe42c267372cee87725a9c5bddee3076656fd66
                                                        • Instruction Fuzzy Hash: 64118EB1240B01BFEB218B65DC48F277BB9FBC6B51F104169F412E6650DBB2DC009B20

                                                        Control-flow Graph

                                                        APIs
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 008A2B6B
                                                          • Part of subcall function 008A3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00971418,?,008A2E7F,?,?,?,00000000), ref: 008A3A78
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                        • GetForegroundWindow.USER32(runas,?,?,?,?,?,00962224), ref: 008E2C10
                                                        • ShellExecuteW.SHELL32(00000000,?,?,00962224), ref: 008E2C17
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                        • String ID: runas
                                                        • API String ID: 448630720-4000483414
                                                        • Opcode ID: 4491c13a9f9d095ea97bededdf23294d7ed124c5d57b3588a01e55ecf9a15eb3
                                                        • Instruction ID: f6f8bdc262a9ef7c06530b6c8f3691bb9061aa5a3531814e2b0e197e0bef7e31
                                                        • Opcode Fuzzy Hash: 4491c13a9f9d095ea97bededdf23294d7ed124c5d57b3588a01e55ecf9a15eb3
                                                        • Instruction Fuzzy Hash: A911A23210C345ABE724FF6CE8519BE77A4FB93350F44542DF186D25A2CF20864A9713
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,008E5222), ref: 0090DBCE
                                                        • GetFileAttributesW.KERNELBASE(?), ref: 0090DBDD
                                                        • FindFirstFileW.KERNELBASE(?,?), ref: 0090DBEE
                                                        • FindClose.KERNEL32(00000000), ref: 0090DBFA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirstlstrlen
                                                        • String ID:
                                                        • API String ID: 2695905019-0
                                                        • Opcode ID: f86c6d6d568ca98761d01c884ced6213696d7e5bb4423738f1127132d7a70f73
                                                        • Instruction ID: 87f01e4b61461f32e0ae807371badf4dc1ce89bb2f9de3c32f2f719ab70db620
                                                        • Opcode Fuzzy Hash: f86c6d6d568ca98761d01c884ced6213696d7e5bb4423738f1127132d7a70f73
                                                        • Instruction Fuzzy Hash: D5F0A0718299305BD2206BB8AC0D8AB3BAC9E01334B104702F8B6D20E0EBB099549AD5
                                                        APIs
                                                        • GetInputState.USER32 ref: 008AD807
                                                        • timeGetTime.WINMM ref: 008ADA07
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008ADB28
                                                        • TranslateMessage.USER32(?), ref: 008ADB7B
                                                        • DispatchMessageW.USER32(?), ref: 008ADB89
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008ADB9F
                                                        • Sleep.KERNEL32(0000000A), ref: 008ADBB1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                        • String ID:
                                                        • API String ID: 2189390790-0
                                                        • Opcode ID: 1103dc529689f706285660c13897ee740ad2f924cce10738fd403e8778f2be27
                                                        • Instruction ID: d07e2b6211c0c383ffa0e9bad99d82c12a026b30aa7108b8c45102aac3e3a762
                                                        • Opcode Fuzzy Hash: 1103dc529689f706285660c13897ee740ad2f924cce10738fd403e8778f2be27
                                                        • Instruction Fuzzy Hash: 2142D170608749DFE728CF28C844BBABBE0FF46314F184559E596C7AA1D770E884DB92

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 008A2D07
                                                        • RegisterClassExW.USER32(00000030), ref: 008A2D31
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008A2D42
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 008A2D5F
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008A2D6F
                                                        • LoadIconW.USER32(000000A9), ref: 008A2D85
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 008A2D94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: dc56582a461ae5ad0a389d4140b895260494a467d45d2a0cf4d066839c6c8c6a
                                                        • Instruction ID: a37f747113f53d07f78b38ec784b9e85f509cf75d948de71e464f399af61351a
                                                        • Opcode Fuzzy Hash: dc56582a461ae5ad0a389d4140b895260494a467d45d2a0cf4d066839c6c8c6a
                                                        • Instruction Fuzzy Hash: 6921E5B6925308AFDB00DFA8E849BDDBBB4FB08700F00411AFA15B62A0D7B14584DF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 302 8e065b-8e068b call 8e042f 305 8e068d-8e0698 call 8cf2c6 302->305 306 8e06a6-8e06b2 call 8d5221 302->306 311 8e069a-8e06a1 call 8cf2d9 305->311 312 8e06cb-8e0714 call 8e039a 306->312 313 8e06b4-8e06c9 call 8cf2c6 call 8cf2d9 306->313 322 8e097d-8e0983 311->322 320 8e0716-8e071f 312->320 321 8e0781-8e078a GetFileType 312->321 313->311 324 8e0756-8e077c GetLastError call 8cf2a3 320->324 325 8e0721-8e0725 320->325 326 8e078c-8e07bd GetLastError call 8cf2a3 CloseHandle 321->326 327 8e07d3-8e07d6 321->327 324->311 325->324 331 8e0727-8e0754 call 8e039a 325->331 326->311 341 8e07c3-8e07ce call 8cf2d9 326->341 329 8e07df-8e07e5 327->329 330 8e07d8-8e07dd 327->330 334 8e07e9-8e0837 call 8d516a 329->334 335 8e07e7 329->335 330->334 331->321 331->324 345 8e0839-8e0845 call 8e05ab 334->345 346 8e0847-8e086b call 8e014d 334->346 335->334 341->311 345->346 351 8e086f-8e0879 call 8d86ae 345->351 352 8e087e-8e08c1 346->352 353 8e086d 346->353 351->322 355 8e08e2-8e08f0 352->355 356 8e08c3-8e08c7 352->356 353->351 359 8e097b 355->359 360 8e08f6-8e08fa 355->360 356->355 358 8e08c9-8e08dd 356->358 358->355 359->322 360->359 361 8e08fc-8e092f CloseHandle call 8e039a 360->361 364 8e0963-8e0977 361->364 365 8e0931-8e095d GetLastError call 8cf2a3 call 8d5333 361->365 364->359 365->364
                                                        APIs
                                                          • Part of subcall function 008E039A: CreateFileW.KERNELBASE(00000000,00000000,?,008E0704,?,?,00000000,?,008E0704,00000000,0000000C), ref: 008E03B7
                                                        • GetLastError.KERNEL32 ref: 008E076F
                                                        • __dosmaperr.LIBCMT ref: 008E0776
                                                        • GetFileType.KERNELBASE(00000000), ref: 008E0782
                                                        • GetLastError.KERNEL32 ref: 008E078C
                                                        • __dosmaperr.LIBCMT ref: 008E0795
                                                        • CloseHandle.KERNEL32(00000000), ref: 008E07B5
                                                        • CloseHandle.KERNEL32(?), ref: 008E08FF
                                                        • GetLastError.KERNEL32 ref: 008E0931
                                                        • __dosmaperr.LIBCMT ref: 008E0938
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                        • String ID: H
                                                        • API String ID: 4237864984-2852464175
                                                        • Opcode ID: de1085bf407ff838a3cbf20ea49d0c017254c2cd9324bfa0cd4ce4e80205b4cc
                                                        • Instruction ID: c580bf0209528ce911001f83992f5a6b904aeb51b771a49e380c538aa9337c3c
                                                        • Opcode Fuzzy Hash: de1085bf407ff838a3cbf20ea49d0c017254c2cd9324bfa0cd4ce4e80205b4cc
                                                        • Instruction Fuzzy Hash: ECA11332A141888FDF19AF68DC51BAE3BA1FB46324F14015DF815EB392C7719892DF92

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 008A3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00971418,?,008A2E7F,?,?,?,00000000), ref: 008A3A78
                                                          • Part of subcall function 008A3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 008A3379
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 008A356A
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 008E318D
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 008E31CE
                                                        • RegCloseKey.ADVAPI32(?), ref: 008E3210
                                                        • _wcslen.LIBCMT ref: 008E3277
                                                        • _wcslen.LIBCMT ref: 008E3286
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                        • API String ID: 98802146-2727554177
                                                        • Opcode ID: 43a8dd05be9dd19f5de3f4b82380b6c928a23b6aee565807869aff3c28f217ec
                                                        • Instruction ID: 0868ee465603e562c74e826b9f0d0b2c80f7f4df1ddb0997e75ccee1a981f8c7
                                                        • Opcode Fuzzy Hash: 43a8dd05be9dd19f5de3f4b82380b6c928a23b6aee565807869aff3c28f217ec
                                                        • Instruction Fuzzy Hash: B57192724283019ED714DF29DC8696BBBF8FF86B40F40442DF589D71A0EB749A88DB52

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 008A2B8E
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 008A2B9D
                                                        • LoadIconW.USER32(00000063), ref: 008A2BB3
                                                        • LoadIconW.USER32(000000A4), ref: 008A2BC5
                                                        • LoadIconW.USER32(000000A2), ref: 008A2BD7
                                                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 008A2BEF
                                                        • RegisterClassExW.USER32(?), ref: 008A2C40
                                                          • Part of subcall function 008A2CD4: GetSysColorBrush.USER32(0000000F), ref: 008A2D07
                                                          • Part of subcall function 008A2CD4: RegisterClassExW.USER32(00000030), ref: 008A2D31
                                                          • Part of subcall function 008A2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008A2D42
                                                          • Part of subcall function 008A2CD4: InitCommonControlsEx.COMCTL32(?), ref: 008A2D5F
                                                          • Part of subcall function 008A2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008A2D6F
                                                          • Part of subcall function 008A2CD4: LoadIconW.USER32(000000A9), ref: 008A2D85
                                                          • Part of subcall function 008A2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 008A2D94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                        • String ID: #$0$AutoIt v3
                                                        • API String ID: 423443420-4155596026
                                                        • Opcode ID: ea752a0876ffa23cb562fb371d847641a875192406ecf7dd72241e4b8395d134
                                                        • Instruction ID: eeb1064cdc56fbcabc186672a7cf09d456364ffc12fcabceaaba49da084db606
                                                        • Opcode Fuzzy Hash: ea752a0876ffa23cb562fb371d847641a875192406ecf7dd72241e4b8395d134
                                                        • Instruction Fuzzy Hash: 43214FB6E28314AFDB109FA9EC55B9D7FB4FB48B50F00401AF509B66A0D7B14584EF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 443 8a3170-8a3185 444 8a3187-8a318a 443->444 445 8a31e5-8a31e7 443->445 447 8a31eb 444->447 448 8a318c-8a3193 444->448 445->444 446 8a31e9 445->446 449 8a31d0-8a31d8 DefWindowProcW 446->449 450 8e2dfb-8e2e23 call 8a18e2 call 8be499 447->450 451 8a31f1-8a31f6 447->451 452 8a3199-8a319e 448->452 453 8a3265-8a326d PostQuitMessage 448->453 456 8a31de-8a31e4 449->456 486 8e2e28-8e2e2f 450->486 458 8a31f8-8a31fb 451->458 459 8a321d-8a3244 SetTimer RegisterWindowMessageW 451->459 454 8e2e7c-8e2e90 call 90bf30 452->454 455 8a31a4-8a31a8 452->455 457 8a3219-8a321b 453->457 454->457 481 8e2e96 454->481 462 8a31ae-8a31b3 455->462 463 8e2e68-8e2e72 call 90c161 455->463 457->456 466 8e2d9c-8e2d9f 458->466 467 8a3201-8a3214 KillTimer call 8a30f2 call 8a3c50 458->467 459->457 464 8a3246-8a3251 CreatePopupMenu I_RpcFreeBuffer 459->464 469 8e2e4d-8e2e54 462->469 470 8a31b9-8a31be 462->470 477 8e2e77 463->477 471 8a3253-8a3263 call 8a326f 464->471 473 8e2dd7-8e2df6 MoveWindow 466->473 474 8e2da1-8e2da5 466->474 467->457 469->449 484 8e2e5a-8e2e63 call 900ad7 469->484 470->471 479 8a31c4-8a31ca 470->479 471->457 473->457 482 8e2dc6-8e2dd2 SetFocus 474->482 483 8e2da7-8e2daa 474->483 477->457 479->449 479->486 481->449 482->457 483->479 488 8e2db0-8e2dc1 call 8a18e2 483->488 484->449 486->449 491 8e2e35-8e2e48 call 8a30f2 call 8a3837 486->491 488->457 491->449
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,008A316A,?,?), ref: 008A31D8
                                                        • KillTimer.USER32(?,00000001,?,?,?,?,?,008A316A,?,?), ref: 008A3204
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 008A3227
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,008A316A,?,?), ref: 008A3232
                                                        • CreatePopupMenu.USER32 ref: 008A3246
                                                        • PostQuitMessage.USER32(00000000), ref: 008A3267
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                        • String ID: TaskbarCreated
                                                        • API String ID: 129472671-2362178303
                                                        • Opcode ID: 779a9d64cce9756c7aca9339a95d26023965e315fbb7540bbf2d054f4f175392
                                                        • Instruction ID: 40b7dfde508125f67e83528208606e3c16f7c6ae2373fa31768824d79ab12dcc
                                                        • Opcode Fuzzy Hash: 779a9d64cce9756c7aca9339a95d26023965e315fbb7540bbf2d054f4f175392
                                                        • Instruction Fuzzy Hash: 78415D72368208ABFF251B7CDC0EB793659F747345F044125FA0AD6AE1D7718E40ABA2

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 499 8d8d45-8d8d55 500 8d8d6f-8d8d71 499->500 501 8d8d57-8d8d6a call 8cf2c6 call 8cf2d9 499->501 503 8d90d9-8d90e6 call 8cf2c6 call 8cf2d9 500->503 504 8d8d77-8d8d7d 500->504 517 8d90f1 501->517 522 8d90ec call 8d27ec 503->522 504->503 507 8d8d83-8d8dae 504->507 507->503 510 8d8db4-8d8dbd 507->510 513 8d8dbf-8d8dd2 call 8cf2c6 call 8cf2d9 510->513 514 8d8dd7-8d8dd9 510->514 513->522 515 8d8ddf-8d8de3 514->515 516 8d90d5-8d90d7 514->516 515->516 520 8d8de9-8d8ded 515->520 521 8d90f4-8d90f9 516->521 517->521 520->513 525 8d8def-8d8e06 520->525 522->517 528 8d8e08-8d8e0b 525->528 529 8d8e23-8d8e2c 525->529 530 8d8e0d-8d8e13 528->530 531 8d8e15-8d8e1e 528->531 532 8d8e2e-8d8e45 call 8cf2c6 call 8cf2d9 call 8d27ec 529->532 533 8d8e4a-8d8e54 529->533 530->531 530->532 536 8d8ebf-8d8ed9 531->536 561 8d900c 532->561 534 8d8e5b-8d8e79 call 8d3820 call 8d29c8 * 2 533->534 535 8d8e56-8d8e58 533->535 569 8d8e7b-8d8e91 call 8cf2d9 call 8cf2c6 534->569 570 8d8e96-8d8ebc call 8d9424 534->570 535->534 538 8d8fad-8d8fb6 call 8df89b 536->538 539 8d8edf-8d8eef 536->539 552 8d9029 538->552 553 8d8fb8-8d8fca 538->553 539->538 542 8d8ef5-8d8ef7 539->542 542->538 546 8d8efd-8d8f23 542->546 546->538 550 8d8f29-8d8f3c 546->550 550->538 557 8d8f3e-8d8f40 550->557 559 8d902d-8d9045 ReadFile 552->559 553->552 555 8d8fcc-8d8fdb GetConsoleMode 553->555 555->552 560 8d8fdd-8d8fe1 555->560 557->538 562 8d8f42-8d8f6d 557->562 564 8d9047-8d904d 559->564 565 8d90a1-8d90ac GetLastError 559->565 560->559 566 8d8fe3-8d8ffd ReadConsoleW 560->566 567 8d900f-8d9019 call 8d29c8 561->567 562->538 568 8d8f6f-8d8f82 562->568 564->565 573 8d904f 564->573 571 8d90ae-8d90c0 call 8cf2d9 call 8cf2c6 565->571 572 8d90c5-8d90c8 565->572 576 8d8fff GetLastError 566->576 577 8d901e-8d9027 566->577 567->521 568->538 581 8d8f84-8d8f86 568->581 569->561 570->536 571->561 578 8d90ce-8d90d0 572->578 579 8d9005-8d900b call 8cf2a3 572->579 575 8d9052-8d9064 573->575 575->567 586 8d9066-8d906a 575->586 576->579 577->575 578->567 579->561 581->538 589 8d8f88-8d8fa8 581->589 592 8d906c-8d907c call 8d8a61 586->592 593 8d9083-8d908e 586->593 589->538 604 8d907f-8d9081 592->604 598 8d909a-8d909f call 8d88a1 593->598 599 8d9090 call 8d8bb1 593->599 605 8d9095-8d9098 598->605 599->605 604->567 605->604
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4a5719bf0f45040d96fe0d2ceae5115eb6d2ce4b096c318df5b5ac732a1d4dba
                                                        • Instruction ID: 6cdb25067f9b6e6ae582cfea465676cb85eab184fff78f7808dc396aa74cc7a1
                                                        • Opcode Fuzzy Hash: 4a5719bf0f45040d96fe0d2ceae5115eb6d2ce4b096c318df5b5ac732a1d4dba
                                                        • Instruction Fuzzy Hash: 3BC1DE75A04249EFDB11AFACD841BADBBB5FF09310F04429AE958E7392CB309D41DB61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 607 1912338-19123e6 call 190fd18 610 19123ed-1912413 call 1913248 CreateFileW 607->610 613 1912415 610->613 614 191241a-191242a 610->614 615 1912565-1912569 613->615 622 1912431-191244b VirtualAlloc 614->622 623 191242c 614->623 616 19125ab-19125ae 615->616 617 191256b-191256f 615->617 619 19125b1-19125b8 616->619 620 1912571-1912574 617->620 621 191257b-191257f 617->621 624 19125ba-19125c5 619->624 625 191260d-1912622 619->625 620->621 626 1912581-191258b 621->626 627 191258f-1912593 621->627 628 1912452-1912469 ReadFile 622->628 629 191244d 622->629 623->615 632 19125c7 624->632 633 19125c9-19125d5 624->633 634 1912632-191263a 625->634 635 1912624-191262f VirtualFree 625->635 626->627 636 19125a3 627->636 637 1912595-191259f 627->637 630 1912470-19124b0 VirtualAlloc 628->630 631 191246b 628->631 629->615 638 19124b2 630->638 639 19124b7-19124d2 call 1913498 630->639 631->615 632->625 640 19125d7-19125e7 633->640 641 19125e9-19125f5 633->641 635->634 636->616 637->636 638->615 647 19124dd-19124e7 639->647 643 191260b 640->643 644 1912602-1912608 641->644 645 19125f7-1912600 641->645 643->619 644->643 645->643 648 19124e9-1912518 call 1913498 647->648 649 191251a-191252e call 19132a8 647->649 648->647 655 1912530 649->655 656 1912532-1912536 649->656 655->615 657 1912542-1912546 656->657 658 1912538-191253c CloseHandle 656->658 659 1912556-191255f 657->659 660 1912548-1912553 VirtualFree 657->660 658->657 659->610 659->615 660->659
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01912409
                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0191262F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1318997148.000000000190F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0190F000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_190f000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CreateFileFreeVirtual
                                                        • String ID:
                                                        • API String ID: 204039940-0
                                                        • Opcode ID: c69e8af538ca099f1199ea1a41374fe769c00d7324591793f5319154b009097c
                                                        • Instruction ID: 957896c438454629284eae614c8bccbaf4f57be31d81522dd2b77c1d1e60350c
                                                        • Opcode Fuzzy Hash: c69e8af538ca099f1199ea1a41374fe769c00d7324591793f5319154b009097c
                                                        • Instruction Fuzzy Hash: 3EA12870E0020DEBDB14DFA4C894BEEBBB5BF48705F208559E609BB284D7759A81CF54

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 671 8a2c63-8a2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 008A2C91
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 008A2CB2
                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,008A1CAD,?), ref: 008A2CC6
                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,008A1CAD,?), ref: 008A2CCF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$edit
                                                        • API String ID: 1584632944-3779509399
                                                        • Opcode ID: 73ab4d942ea2aa239c8efbb5ed2956fcec79caa113d007102b1440ab4d2a6dd2
                                                        • Instruction ID: c2ef3384ed1ca060ed0ffcb9456ae9ca997dcc37db48dda685e5f62640ae4c37
                                                        • Opcode Fuzzy Hash: 73ab4d942ea2aa239c8efbb5ed2956fcec79caa113d007102b1440ab4d2a6dd2
                                                        • Instruction Fuzzy Hash: 26F0DAB65643907BEB31172BAC09E773EBDD7C6F50F01405AF908A25A0C6611890EEB4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 786 19120c8-1912239 call 190fd18 call 1911fb8 CreateFileW 793 1912240-1912250 786->793 794 191223b 786->794 797 1912252 793->797 798 1912257-1912271 VirtualAlloc 793->798 795 19122f0-19122f5 794->795 797->795 799 1912273 798->799 800 1912275-191228c ReadFile 798->800 799->795 801 1912290-19122ca call 1911ff8 call 1910fb8 800->801 802 191228e 800->802 807 19122e6-19122ee ExitProcess 801->807 808 19122cc-19122e1 call 1912048 801->808 802->795 807->795 808->807
                                                        APIs
                                                          • Part of subcall function 01911FB8: Sleep.KERNELBASE(000001F4), ref: 01911FC9
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0191222C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1318997148.000000000190F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0190F000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_190f000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CreateFileSleep
                                                        • String ID: H5AVRTBWATBCMRJGPNAWOHHNM2
                                                        • API String ID: 2694422964-4207844716
                                                        • Opcode ID: f70bb03aff5e46c64ddd9fb7b531a842af9b96347ba0e84583de5197f1f32d4c
                                                        • Instruction ID: bcc8857e6e5f3f7ec3c59b72bfdb6e994f07b2cbc10e6982c62c077073825e47
                                                        • Opcode Fuzzy Hash: f70bb03aff5e46c64ddd9fb7b531a842af9b96347ba0e84583de5197f1f32d4c
                                                        • Instruction Fuzzy Hash: 2961A430D0428DDAEF11DBB4C844BEEBB75AF55304F104598E648BB2C1D7BA0B88CB66

                                                        Control-flow Graph

                                                        APIs
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00912C05
                                                        • DeleteFileW.KERNEL32(?), ref: 00912C87
                                                        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00912C9D
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00912CAE
                                                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00912CC0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: File$Delete$Copy
                                                        • String ID:
                                                        • API String ID: 3226157194-0
                                                        • Opcode ID: 90df6064a5d9760d0010d0b2c3d22643b0bbf6ea07bc24abbc2473e783c6ba2a
                                                        • Instruction ID: 9c79c063707db302606e37c81796f064f865f78e90316edd0c2ed1fef4e0f229
                                                        • Opcode Fuzzy Hash: 90df6064a5d9760d0010d0b2c3d22643b0bbf6ea07bc24abbc2473e783c6ba2a
                                                        • Instruction Fuzzy Hash: D9B12D71A0011DABDF11EBA4CC85EDEB7BDFF49350F1040AAF609E6151EA34DA948FA1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 952 8a3b1c-8a3b27 953 8a3b99-8a3b9b 952->953 954 8a3b29-8a3b2e 952->954 955 8a3b8c-8a3b8f 953->955 954->953 956 8a3b30-8a3b48 RegOpenKeyExW 954->956 956->953 957 8a3b4a-8a3b69 RegQueryValueExW 956->957 958 8a3b6b-8a3b76 957->958 959 8a3b80-8a3b8b RegCloseKey 957->959 960 8a3b78-8a3b7a 958->960 961 8a3b90-8a3b97 958->961 959->955 962 8a3b7e 960->962 961->962 962->959
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,008A3B0F,SwapMouseButtons,00000004,?), ref: 008A3B40
                                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,008A3B0F,SwapMouseButtons,00000004,?), ref: 008A3B61
                                                        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,008A3B0F,SwapMouseButtons,00000004,?), ref: 008A3B83
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID: Control Panel\Mouse
                                                        • API String ID: 3677997916-824357125
                                                        • Opcode ID: c3753dc48b0237132d0c6786f33efa689e36a1ce504f6a23f1b43fc2fbf49cc5
                                                        • Instruction ID: 579bdf0caaaaf684088d53217d414835a44c24a6ea969d6221412de810c87f3c
                                                        • Opcode Fuzzy Hash: c3753dc48b0237132d0c6786f33efa689e36a1ce504f6a23f1b43fc2fbf49cc5
                                                        • Instruction Fuzzy Hash: C6112AB5521608FFEB208FA5DC85AAEB7B9FF06754B104459F805E7110D3319E41AB60
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 019117E5
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01911809
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0191182B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1318997148.000000000190F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0190F000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_190f000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: d21c280c783bbae91a429f84d87e257f256d4475b71677e5b67df5fe47b3db5a
                                                        • Instruction ID: c7251609f14e1a979f572ecbab384ac60701640d9165c24f0954d70ac64aa05b
                                                        • Opcode Fuzzy Hash: d21c280c783bbae91a429f84d87e257f256d4475b71677e5b67df5fe47b3db5a
                                                        • Instruction Fuzzy Hash: 2A62FA30A142589BEB24DFA4C840BDEB776FF58301F1091A9D20DEB394E7759E81CB59
                                                        Strings
                                                        • Variable must be of type 'Object'., xrefs: 008F32B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Variable must be of type 'Object'.
                                                        • API String ID: 0-109567571
                                                        • Opcode ID: 25bf3192b6ffc2ca2b5c8447417438a8ba234770bf4f282e572df4f73aa8c0b8
                                                        • Instruction ID: 31f04d30764634e2e56ccda0a5db07c713ed3c2d2647723be92ecb063484384c
                                                        • Opcode Fuzzy Hash: 25bf3192b6ffc2ca2b5c8447417438a8ba234770bf4f282e572df4f73aa8c0b8
                                                        • Instruction Fuzzy Hash: 06C2BE71A00219CFEB24CF68C880AADB7B1FF5A314F248969EA05EB791D375ED41CB51
                                                        APIs
                                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 008E33A2
                                                          • Part of subcall function 008A6B57: _wcslen.LIBCMT ref: 008A6B6A
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 008A3A04
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String_wcslen
                                                        • String ID: Line:
                                                        • API String ID: 2289894680-1585850449
                                                        • Opcode ID: f73ff5b12692f43d51fda72758c7cfd000ff1ebefa04ce4ae5333a214e4632de
                                                        • Instruction ID: 69bcef50f29e4522d7c7c450f7385a56b9b8f54841ccc391a17a30bfc3fdb0fd
                                                        • Opcode Fuzzy Hash: f73ff5b12692f43d51fda72758c7cfd000ff1ebefa04ce4ae5333a214e4632de
                                                        • Instruction Fuzzy Hash: 3131D271418314ABE725EB28DC46BDBB7E8FB42314F04452AF599D3591EB709A48C7C3
                                                        APIs
                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 008C0668
                                                          • Part of subcall function 008C32A4: RaiseException.KERNEL32(?,?,?,008C068A,?,00971444,?,?,?,?,?,?,008C068A,008A1129,00968738,008A1129), ref: 008C3304
                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 008C0685
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$ExceptionRaise
                                                        • String ID: Unknown exception
                                                        • API String ID: 3476068407-410509341
                                                        • Opcode ID: b0a328c3fc8ff4a6b9f1086a59ed74bc1bb6d508e33167311b69a4988dcd308e
                                                        • Instruction ID: b9fe535d71caac1e1912a609bf7b77cfc4528359641730693f5781d2a351ed9f
                                                        • Opcode Fuzzy Hash: b0a328c3fc8ff4a6b9f1086a59ed74bc1bb6d508e33167311b69a4988dcd308e
                                                        • Instruction Fuzzy Hash: 4AF0C83490030DB78F00BAA8DC46E9E777CFE50354B608539B924D5592EF71DB56CD82
                                                        APIs
                                                        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0091302F
                                                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00913044
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Temp$FileNamePath
                                                        • String ID: aut
                                                        • API String ID: 3285503233-3010740371
                                                        • Opcode ID: 840704b63688cbe6611b419dcd9de26a36a73c3bf031082a2d206122b8b15e4a
                                                        • Instruction ID: d78dbda188d22da1f27fa6e79b74d7428df5184ae23da52094efeaf441340d92
                                                        • Opcode Fuzzy Hash: 840704b63688cbe6611b419dcd9de26a36a73c3bf031082a2d206122b8b15e4a
                                                        • Instruction Fuzzy Hash: D2D05EB250032877DA20A7A4AC0EFCB3A6CDB04750F4002A1BA65E2095DAB0D984CFD0
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 009282F5
                                                        • TerminateProcess.KERNEL32(00000000), ref: 009282FC
                                                        • FreeLibrary.KERNEL32(?,?,?,?), ref: 009284DD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentFreeLibraryTerminate
                                                        • String ID:
                                                        • API String ID: 146820519-0
                                                        • Opcode ID: a21a336f62df7aa264ec04235f6d83fd1f389b379afe119e138909a8dfe9afc7
                                                        • Instruction ID: 9890d1292246e5a7c724f4512e840757b079f5ac94ec1e1af3935b8eab97051f
                                                        • Opcode Fuzzy Hash: a21a336f62df7aa264ec04235f6d83fd1f389b379afe119e138909a8dfe9afc7
                                                        • Instruction Fuzzy Hash: DE128971A083119FD724DF28D484B6ABBE5FF89318F04895DE8998B356CB30E945CF92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 81616f76ea923d8a557db4721a53f8974fff0d23e5bcc8ae113f8380aa645846
                                                        • Instruction ID: b958ffc891aafbcab5d87d98ba8a7705513d382aabccc324655867b0ea448a03
                                                        • Opcode Fuzzy Hash: 81616f76ea923d8a557db4721a53f8974fff0d23e5bcc8ae113f8380aa645846
                                                        • Instruction Fuzzy Hash: 2051BE71910A09AFDB209FA9C845FAEBBB8FF45324F14025BF405E7392D7719A01DB62
                                                        APIs
                                                          • Part of subcall function 008A1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 008A1BF4
                                                          • Part of subcall function 008A1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 008A1BFC
                                                          • Part of subcall function 008A1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 008A1C07
                                                          • Part of subcall function 008A1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 008A1C12
                                                          • Part of subcall function 008A1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 008A1C1A
                                                          • Part of subcall function 008A1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 008A1C22
                                                          • Part of subcall function 008A1B4A: RegisterWindowMessageW.USER32(00000004,?,008A12C4), ref: 008A1BA2
                                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 008A136A
                                                        • OleInitialize.OLE32 ref: 008A1388
                                                        • CloseHandle.KERNEL32(00000000,00000000), ref: 008E24AB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                        • String ID:
                                                        • API String ID: 1986988660-0
                                                        • Opcode ID: 58745bea0023a067aadbc3bc1c3cabb9bea7d7cd82720bd8eeaed3be14d637a9
                                                        • Instruction ID: 8a2408c5e16636e1b5e5bc675ceae59d821c7595fc7762e6141e7f535f27b7ea
                                                        • Opcode Fuzzy Hash: 58745bea0023a067aadbc3bc1c3cabb9bea7d7cd82720bd8eeaed3be14d637a9
                                                        • Instruction Fuzzy Hash: CA71ACB69393008FD798EF7DA8466953AE4FB89344B54822AE01ED7371EB304480EF56
                                                        APIs
                                                          • Part of subcall function 008A3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 008A3A04
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0090C259
                                                        • KillTimer.USER32(?,00000001,?,?), ref: 0090C261
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0090C270
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_Timer$Kill
                                                        • String ID:
                                                        • API String ID: 3500052701-0
                                                        • Opcode ID: 082cd7ca44af97369aa9753fec347f3e217baf90ce9f3179bb971a8799fdb8fa
                                                        • Instruction ID: 896247d01eb6f700618601432408d83115fa78a76b0b2a1b89ea5ed033e7beca
                                                        • Opcode Fuzzy Hash: 082cd7ca44af97369aa9753fec347f3e217baf90ce9f3179bb971a8799fdb8fa
                                                        • Instruction Fuzzy Hash: 173198B1904744AFEB229F688855BD7BBEC9F06304F04049DD5EAA7281C7746A84DB51
                                                        APIs
                                                        • CloseHandle.KERNELBASE(00000000,00000000,?,?,008D85CC,?,00968CC8,0000000C), ref: 008D8704
                                                        • GetLastError.KERNEL32(?,008D85CC,?,00968CC8,0000000C), ref: 008D870E
                                                        • __dosmaperr.LIBCMT ref: 008D8739
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CloseErrorHandleLast__dosmaperr
                                                        • String ID:
                                                        • API String ID: 2583163307-0
                                                        • Opcode ID: 1a1531efdc65dd1700282605a2be001a555168059d1fc0cbcdbfb36e67e9d4cf
                                                        • Instruction ID: cdba69dce46b2230a4eb971465d7bfa23ce833e9ab027b0326929b3a48b4e481
                                                        • Opcode Fuzzy Hash: 1a1531efdc65dd1700282605a2be001a555168059d1fc0cbcdbfb36e67e9d4cf
                                                        • Instruction Fuzzy Hash: 8A012F33605560A6D62876387849B7E6B45FB92774F35031BF814DB3D2DE60CC819151
                                                        APIs
                                                        • TranslateMessage.USER32(?), ref: 008ADB7B
                                                        • DispatchMessageW.USER32(?), ref: 008ADB89
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008ADB9F
                                                        • Sleep.KERNEL32(0000000A), ref: 008ADBB1
                                                        • TranslateAcceleratorW.USER32(?,?,?), ref: 008F1CC9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                        • String ID:
                                                        • API String ID: 3288985973-0
                                                        • Opcode ID: b7e0217dacd7d02bdb0eb64ebb69c4c619ab5c60bf2f1692243f6fafc3ea6cbf
                                                        • Instruction ID: 645709c67a7636974a5aeb7b2bb97c298d99d1b33ed22ec5a765632c7c27be8b
                                                        • Opcode Fuzzy Hash: b7e0217dacd7d02bdb0eb64ebb69c4c619ab5c60bf2f1692243f6fafc3ea6cbf
                                                        • Instruction Fuzzy Hash: EAF05E716183449BEB30CB748C49FEA73A8FB45310F104918F65AD34C0DB30A4889F26
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00912CD4,?,?,?,00000004,00000001), ref: 00912FF2
                                                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00912CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00913006
                                                        • CloseHandle.KERNEL32(00000000,?,00912CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0091300D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleTime
                                                        • String ID:
                                                        • API String ID: 3397143404-0
                                                        • Opcode ID: d2e78654d2b9f00b0ff7446e327f79abf349e30476d2fac0eec97229a8b550d4
                                                        • Instruction ID: 313008bde825503e8112885a651733e6b679aeb9179b86caeda4f43aa9c5e43e
                                                        • Opcode Fuzzy Hash: d2e78654d2b9f00b0ff7446e327f79abf349e30476d2fac0eec97229a8b550d4
                                                        • Instruction Fuzzy Hash: 4FE0867229461477D2301755BC0DFCB3A5CD78AB71F104210F719751D046A0650167A8
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 008B17F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: CALL
                                                        • API String ID: 1385522511-4196123274
                                                        • Opcode ID: 80190692b44d364bb0d82097bda2498fd40a93a469022e59c5eb095ac4956f82
                                                        • Instruction ID: d1869057e4c948fb0fe891bb662fcf828880027f7e3602bbd29cad4ea17a3250
                                                        • Opcode Fuzzy Hash: 80190692b44d364bb0d82097bda2498fd40a93a469022e59c5eb095ac4956f82
                                                        • Instruction Fuzzy Hash: 33228B706082059FCB24DF28C498A6ABBF1FF89314F54892DF596CB362D731E855CB92
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00916F6B
                                                          • Part of subcall function 008A4ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00971418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 008A4EFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad_wcslen
                                                        • String ID: >>>AUTOIT SCRIPT<<<
                                                        • API String ID: 3312870042-2806939583
                                                        • Opcode ID: a3f2b5c9f6cb396ef62d626f2b0428cf66c9bf095d42f6177d1f00c5efae3fac
                                                        • Instruction ID: 960a1938595a260654c106a1cdb2506d8f5e527cdcab20b210ac38c6ec1ab342
                                                        • Opcode Fuzzy Hash: a3f2b5c9f6cb396ef62d626f2b0428cf66c9bf095d42f6177d1f00c5efae3fac
                                                        • Instruction Fuzzy Hash: A4B193316082058FDB14EF64C4919AEB7E5FF95310F04881DF496C76A1EB30ED89CB92
                                                        APIs
                                                        • GetOpenFileNameW.COMDLG32(?), ref: 008E2C8C
                                                          • Part of subcall function 008A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,008A3A97,?,?,008A2E7F,?,?,?,00000000), ref: 008A3AC2
                                                          • Part of subcall function 008A2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 008A2DC4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Name$Path$FileFullLongOpen
                                                        • String ID: X
                                                        • API String ID: 779396738-3081909835
                                                        • Opcode ID: aefb170aeaa8ec84cf02968e8ea80604dfa930c4e3270432cd1e9fad9328fd1e
                                                        • Instruction ID: d589f4e5a562390aa10204a87ae65bb1198e3c1958da32c877f0b70dba777273
                                                        • Opcode Fuzzy Hash: aefb170aeaa8ec84cf02968e8ea80604dfa930c4e3270432cd1e9fad9328fd1e
                                                        • Instruction Fuzzy Hash: 13218171A102989BDB159F98C845BEE7BFCFF4A314F004059E405E7241DBB89A89CBA2
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock
                                                        • String ID: EA06
                                                        • API String ID: 2638373210-3962188686
                                                        • Opcode ID: 09a3961bf2adc3093adcbb8bb90635350dccb4b21ad24c8cc808c20dd4a8a2e9
                                                        • Instruction ID: 53c80fb84b69ac1e1482a437c0ed20fa25d7992d97b25845b9e7e2f2fd147cdc
                                                        • Opcode Fuzzy Hash: 09a3961bf2adc3093adcbb8bb90635350dccb4b21ad24c8cc808c20dd4a8a2e9
                                                        • Instruction Fuzzy Hash: 7F01B5729442587EDF28D7A8C856FEEBBF8DB05305F00455EF152D2181E5B4E6188B60
                                                        APIs
                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 008A3908
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_
                                                        • String ID:
                                                        • API String ID: 1144537725-0
                                                        • Opcode ID: f406f5309e365501c567c3d1dafe497ed25234be86ab392984236321335a4ac1
                                                        • Instruction ID: 3ab8742334ed6afdeddf792d24919d079a0cf991e8195eaaac720cef5b0e140d
                                                        • Opcode Fuzzy Hash: f406f5309e365501c567c3d1dafe497ed25234be86ab392984236321335a4ac1
                                                        • Instruction Fuzzy Hash: B33193B1508701DFE720DF28D885797BBE8FB4A708F00092EF599D3650E775AA44DB52
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 019117E5
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01911809
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0191182B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1318997148.000000000190F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0190F000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_190f000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: 7bc2eb71131a5ca0d961fb64b4ce1da28befc4a8e94ed8bda1bc50d134690387
                                                        • Instruction ID: a2501e008df81760808b4f11d0e42bcf9de0afd0bf070f3afe216038d1e0a11e
                                                        • Opcode Fuzzy Hash: 7bc2eb71131a5ca0d961fb64b4ce1da28befc4a8e94ed8bda1bc50d134690387
                                                        • Instruction Fuzzy Hash: F412CC24E24658C6EB24DF64D8507DEB232FF68300F1094E9910DEB7A5E77A4F81CB5A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction ID: bfb4eee2879cd77f1f4f6c19ce5b14f4f8e7818d7f8d0a7c75155749ed8a9c4e
                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction Fuzzy Hash: 5131E475A0010ADBD718CF59D890AA9FBA5FF49304B2886A5E909CF756D731EEC1CBC0
                                                        APIs
                                                          • Part of subcall function 008A4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,008A4EDD,?,00971418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 008A4E9C
                                                          • Part of subcall function 008A4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 008A4EAE
                                                          • Part of subcall function 008A4E90: FreeLibrary.KERNEL32(00000000,?,?,008A4EDD,?,00971418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 008A4EC0
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00971418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 008A4EFD
                                                          • Part of subcall function 008A4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,008E3CDE,?,00971418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 008A4E62
                                                          • Part of subcall function 008A4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 008A4E74
                                                          • Part of subcall function 008A4E59: FreeLibrary.KERNEL32(00000000,?,?,008E3CDE,?,00971418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 008A4E87
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Library$Load$AddressFreeProc
                                                        • String ID:
                                                        • API String ID: 2632591731-0
                                                        • Opcode ID: 3ff9d0d2d1efe583f98d0f1bc7d16aaaf185bfc199d1592e09e11df841dd2a48
                                                        • Instruction ID: 84ba239294e38345d6c9d51afe7ad75790c1b065bc6fdd9abbe3a7baa57f2e00
                                                        • Opcode Fuzzy Hash: 3ff9d0d2d1efe583f98d0f1bc7d16aaaf185bfc199d1592e09e11df841dd2a48
                                                        • Instruction Fuzzy Hash: 7C110132610205AAEF10AB68D802FAD77A4FF81B10F20942DF452E65C1EEB0EE549B52
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: __wsopen_s
                                                        • String ID:
                                                        • API String ID: 3347428461-0
                                                        • Opcode ID: b5b8377b6b5a7d1952eae7a37ccf93db223b52ac9b462b5bf4e513d9808f3e36
                                                        • Instruction ID: a202974ee1fd9e2073df72748336ec5eed1420351a644ce7b86d77a23a76d586
                                                        • Opcode Fuzzy Hash: b5b8377b6b5a7d1952eae7a37ccf93db223b52ac9b462b5bf4e513d9808f3e36
                                                        • Instruction Fuzzy Hash: 2411067590410AEFCF05DF58E941A9A7BF9FF49314F10415AF808EB312DA31EA118BA5
                                                        APIs
                                                          • Part of subcall function 008D4C7D: RtlAllocateHeap.NTDLL(00000008,008A1129,00000000,?,008D2E29,00000001,00000364,?,?,?,008CF2DE,008D3863,00971444,?,008BFDF5,?), ref: 008D4CBE
                                                        • _free.LIBCMT ref: 008D506C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap_free
                                                        • String ID:
                                                        • API String ID: 614378929-0
                                                        • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                        • Instruction ID: 11bfbb45f235386c2ab8dbd240aed79b56f8a3732df6cd371cd678f3f8f67cbb
                                                        • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                        • Instruction Fuzzy Hash: 29012672204B046BE321CE699881A5AFBEDFB89370F25061FE184C3380EA30AC05C6B5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                        • Instruction ID: 17bf0c624508e8695c9fe6bb14d8a107d6b8874f88645e47c5d7a132950afbcf
                                                        • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                        • Instruction Fuzzy Hash: A1F0D132521A14A7D6313A7D9C05F5A37ACFF72334F10072EF421D22D2DA74E801C6A6
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID:
                                                        • API String ID: 176396367-0
                                                        • Opcode ID: 98ad5ad2a30495acd569bab0290c22198dc8be697418d8b11e2c8fcba327d5f9
                                                        • Instruction ID: 4b3f928df1e5adf1bf93a6c72ddace5cd3739139a9f94bd6f5c886f3bb8cd8c1
                                                        • Opcode Fuzzy Hash: 98ad5ad2a30495acd569bab0290c22198dc8be697418d8b11e2c8fcba327d5f9
                                                        • Instruction Fuzzy Hash: ACF0A4B26006046ED7249F2CDC06FA6BBA8FB44760F10852AF619CB2D1DB31E5548AA0
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000008,008A1129,00000000,?,008D2E29,00000001,00000364,?,?,?,008CF2DE,008D3863,00971444,?,008BFDF5,?), ref: 008D4CBE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: a233b905661469658735fa0e9bc096fe32d45613cbfc8f8cdd1ddfc2dde59d85
                                                        • Instruction ID: 4ed82e906b34fd9ad764945383db1f83d8b376dae4a4465ea54c9fbf592878f5
                                                        • Opcode Fuzzy Hash: a233b905661469658735fa0e9bc096fe32d45613cbfc8f8cdd1ddfc2dde59d85
                                                        • Instruction Fuzzy Hash: 49F0593122622467DB202F669C05F5A3798FF403B0B04A317F809EA380CBB0D80096E0
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000000,?,00971444,?,008BFDF5,?,?,008AA976,00000010,00971440,008A13FC,?,008A13C6,?,008A1129), ref: 008D3852
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 111691db35c2b24a74c02d94fb0be7b593d275b2663e8d464caa11a153b57b9f
                                                        • Instruction ID: bf5b873ef48edf59926a9145dfdcac60a15a3fd139297befaa38078846b31b6d
                                                        • Opcode Fuzzy Hash: 111691db35c2b24a74c02d94fb0be7b593d275b2663e8d464caa11a153b57b9f
                                                        • Instruction Fuzzy Hash: 64E0E53110422457E621266A9C00F9A375AFB427B0F090236BC14D6791CBA0DE01B2E3
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,?,00971418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 008A4F6D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: d5e25d328a72cac2f824a48472265501fdffe2871a1caee1dd5da2576a2ae77f
                                                        • Instruction ID: c9a47f692c0b8ca48bc107d1a729fad3e5acd55582d93f5cbd43af256301ac6f
                                                        • Opcode Fuzzy Hash: d5e25d328a72cac2f824a48472265501fdffe2871a1caee1dd5da2576a2ae77f
                                                        • Instruction Fuzzy Hash: A5F01C71105751CFEB349F64D490812B7E4FF55319320B96EE1DAC2A11CBB19844EF51
                                                        APIs
                                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 008A2DC4
                                                          • Part of subcall function 008A6B57: _wcslen.LIBCMT ref: 008A6B6A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: LongNamePath_wcslen
                                                        • String ID:
                                                        • API String ID: 541455249-0
                                                        • Opcode ID: d227b82c201a68b97fadabb98253d0e9b347f2d7af84886c011e00be0a70d53e
                                                        • Instruction ID: 318f00777a2e192c3099bf043fdc6cc54e6e9f2204b8e78dcbfdc104e2772490
                                                        • Opcode Fuzzy Hash: d227b82c201a68b97fadabb98253d0e9b347f2d7af84886c011e00be0a70d53e
                                                        • Instruction Fuzzy Hash: D4E0CD726041245BCB11925C9C05FDA77DDEFC9790F040071FD09E7248D970ED808691
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock
                                                        • String ID:
                                                        • API String ID: 2638373210-0
                                                        • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                        • Instruction ID: bac64bf44b454bc8b240ff971a500ceee895f52345979a36b243e19335abf096
                                                        • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                        • Instruction Fuzzy Hash: 0DE04FB0609B005FDF396B28A851BF677E8DF49340F00086EF6ABC2252E57268958A4D
                                                        APIs
                                                          • Part of subcall function 008A3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 008A3908
                                                          • Part of subcall function 008AD730: GetInputState.USER32 ref: 008AD807
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 008A2B6B
                                                          • Part of subcall function 008A30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 008A314E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                        • String ID:
                                                        • API String ID: 3667716007-0
                                                        • Opcode ID: 80249c83884c6241db41b48e7c1c2b977e6b07c9d8445abb93a06823579bb9fb
                                                        • Instruction ID: 79c08903131ea6acc092a9f1eb21e9816c2cc0cd8f2e210da7e170ee4dce9d35
                                                        • Opcode Fuzzy Hash: 80249c83884c6241db41b48e7c1c2b977e6b07c9d8445abb93a06823579bb9fb
                                                        • Instruction Fuzzy Hash: 06E0262230820407E608BB3CA81247DA349FBD3351F00143EF047C3972CE2445454313
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,00000000,?,008E0704,?,?,00000000,?,008E0704,00000000,0000000C), ref: 008E03B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: 8b6a8a04179ce557dd97d449ad1fdf7b20494da15997cfb99d6aef954fa11254
                                                        • Instruction ID: 5807395c72c428752dc90111eadc4526b9d397182d3b7fdeb30c00eb1d420fdb
                                                        • Opcode Fuzzy Hash: 8b6a8a04179ce557dd97d449ad1fdf7b20494da15997cfb99d6aef954fa11254
                                                        • Instruction Fuzzy Hash: 48D06C3205410DBBDF028F84DD06EDA3BAAFB48714F014000BE1866020C732E821AB90
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 008A1CBC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: InfoParametersSystem
                                                        • String ID:
                                                        • API String ID: 3098949447-0
                                                        • Opcode ID: 6113cdf4cadb2ad2667b5ff74f451267730438d6219f2145437aed5de76b3507
                                                        • Instruction ID: 3112bf99af7940860b43e9068efc9648c24182018aaf42995164260ec926076d
                                                        • Opcode Fuzzy Hash: 6113cdf4cadb2ad2667b5ff74f451267730438d6219f2145437aed5de76b3507
                                                        • Instruction Fuzzy Hash: ECC048372A8304ABE2148B94AC4AF107764A348B00F048001F64DA96E383A228A0BA60
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 01911FC9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1318997148.000000000190F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0190F000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_190f000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction ID: 7e35b712ffc35243457607c5d08ba48b16f7749b84688f334e9741b7997d37b1
                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction Fuzzy Hash: 3EE0E67494510EEFDB00DFF4D6496DD7BB4EF04301F100165FD05D2280D7309D508A62
                                                        APIs
                                                          • Part of subcall function 008B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 008B9BB2
                                                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0093961A
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0093965B
                                                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0093969F
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 009396C9
                                                        • SendMessageW.USER32 ref: 009396F2
                                                        • GetKeyState.USER32(00000011), ref: 0093978B
                                                        • GetKeyState.USER32(00000009), ref: 00939798
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 009397AE
                                                        • GetKeyState.USER32(00000010), ref: 009397B8
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 009397E9
                                                        • SendMessageW.USER32 ref: 00939810
                                                        • SendMessageW.USER32(?,00001030,?,00937E95), ref: 00939918
                                                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0093992E
                                                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00939941
                                                        • SetCapture.USER32(?), ref: 0093994A
                                                        • ClientToScreen.USER32(?,?), ref: 009399AF
                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 009399BC
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 009399D6
                                                        • ReleaseCapture.USER32 ref: 009399E1
                                                        • GetCursorPos.USER32(?), ref: 00939A19
                                                        • ScreenToClient.USER32(?,?), ref: 00939A26
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00939A80
                                                        • SendMessageW.USER32 ref: 00939AAE
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00939AEB
                                                        • SendMessageW.USER32 ref: 00939B1A
                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00939B3B
                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00939B4A
                                                        • GetCursorPos.USER32(?), ref: 00939B68
                                                        • ScreenToClient.USER32(?,?), ref: 00939B75
                                                        • GetParent.USER32(?), ref: 00939B93
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00939BFA
                                                        • SendMessageW.USER32 ref: 00939C2B
                                                        • ClientToScreen.USER32(?,?), ref: 00939C84
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00939CB4
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00939CDE
                                                        • SendMessageW.USER32 ref: 00939D01
                                                        • ClientToScreen.USER32(?,?), ref: 00939D4E
                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00939D82
                                                          • Part of subcall function 008B9944: GetWindowLongW.USER32(?,000000EB), ref: 008B9952
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00939E05
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                        • String ID: @GUI_DRAGID$F
                                                        • API String ID: 3429851547-4164748364
                                                        • Opcode ID: 9b4d4d9a67fc37ddd416aeba835e89e1985d6a72585e81d32ec9e142d21c6fe3
                                                        • Instruction ID: 4089d7433eab0eee1122f87dab27055c99b435a41a99eb489d2b9cd0a1d3d026
                                                        • Opcode Fuzzy Hash: 9b4d4d9a67fc37ddd416aeba835e89e1985d6a72585e81d32ec9e142d21c6fe3
                                                        • Instruction Fuzzy Hash: 2D42CF75209201AFD724CF28CC45FAABBE9FF49318F100A19F699972A1D7B1E850DF52
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 009348F3
                                                        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00934908
                                                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00934927
                                                        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0093494B
                                                        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0093495C
                                                        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0093497B
                                                        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 009349AE
                                                        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 009349D4
                                                        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00934A0F
                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00934A56
                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00934A7E
                                                        • IsMenu.USER32(?), ref: 00934A97
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00934AF2
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00934B20
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00934B94
                                                        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00934BE3
                                                        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00934C82
                                                        • wsprintfW.USER32 ref: 00934CAE
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00934CC9
                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00934CF1
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00934D13
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00934D33
                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00934D5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                        • String ID: %d/%02d/%02d
                                                        • API String ID: 4054740463-328681919
                                                        • Opcode ID: 9612209455e7e9410b8541365e5945a15001f7ea32ef397a8a72ba96957f8368
                                                        • Instruction ID: a732747a39bf44a1e830c29174fd85f281e66b969dc15971c6d20a58c1a9dbea
                                                        • Opcode Fuzzy Hash: 9612209455e7e9410b8541365e5945a15001f7ea32ef397a8a72ba96957f8368
                                                        • Instruction Fuzzy Hash: 3312FC71600218ABEB248F28CC4AFAE7BF9EF45710F154529F516EA2E1DB78A941CF50
                                                        APIs
                                                        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 008BF998
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008FF474
                                                        • IsIconic.USER32(00000000), ref: 008FF47D
                                                        • ShowWindow.USER32(00000000,00000009), ref: 008FF48A
                                                        • SetForegroundWindow.USER32(00000000), ref: 008FF494
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 008FF4AA
                                                        • GetCurrentThreadId.KERNEL32 ref: 008FF4B1
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 008FF4BD
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 008FF4CE
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 008FF4D6
                                                        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 008FF4DE
                                                        • SetForegroundWindow.USER32(00000000), ref: 008FF4E1
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 008FF4F6
                                                        • keybd_event.USER32(00000012,00000000), ref: 008FF501
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 008FF50B
                                                        • keybd_event.USER32(00000012,00000000), ref: 008FF510
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 008FF519
                                                        • keybd_event.USER32(00000012,00000000), ref: 008FF51E
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 008FF528
                                                        • keybd_event.USER32(00000012,00000000), ref: 008FF52D
                                                        • SetForegroundWindow.USER32(00000000), ref: 008FF530
                                                        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 008FF557
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 4125248594-2988720461
                                                        • Opcode ID: b3b2512468567dcf041dd546504066855ff31234e84b73b4a1daa91650b8a896
                                                        • Instruction ID: a8b9536f95cf2e626c3b86cab02e790d88740b643704c7ac535b624d4dad7b4e
                                                        • Opcode Fuzzy Hash: b3b2512468567dcf041dd546504066855ff31234e84b73b4a1daa91650b8a896
                                                        • Instruction Fuzzy Hash: 26313CB1A5421CBAEB206BB55C4AFBF7E6CFB48B50F100025FB01F6191D6A19910BFA0
                                                        APIs
                                                          • Part of subcall function 009016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0090170D
                                                          • Part of subcall function 009016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0090173A
                                                          • Part of subcall function 009016C3: GetLastError.KERNEL32 ref: 0090174A
                                                        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00901286
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 009012A8
                                                        • CloseHandle.KERNEL32(?), ref: 009012B9
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 009012D1
                                                        • GetProcessWindowStation.USER32 ref: 009012EA
                                                        • SetProcessWindowStation.USER32(00000000), ref: 009012F4
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00901310
                                                          • Part of subcall function 009010BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,009011FC), ref: 009010D4
                                                          • Part of subcall function 009010BF: CloseHandle.KERNEL32(?,?,009011FC), ref: 009010E9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                        • String ID: $default$winsta0
                                                        • API String ID: 22674027-1027155976
                                                        • Opcode ID: 509b32523152abceb4665dbf3b45fa5da3857334337f244e08ce6ac95f706ecb
                                                        • Instruction ID: c833a75dc1bb559d5130827ff24e968255d7519c8474d755bde3f72bdff8979b
                                                        • Opcode Fuzzy Hash: 509b32523152abceb4665dbf3b45fa5da3857334337f244e08ce6ac95f706ecb
                                                        • Instruction Fuzzy Hash: 208177B1904209AFDF219FA8DC49BEE7BBDEF04704F144129FA11B62B0C7758A54DB25
                                                        APIs
                                                          • Part of subcall function 009010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00901114
                                                          • Part of subcall function 009010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00900B9B,?,?,?), ref: 00901120
                                                          • Part of subcall function 009010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00900B9B,?,?,?), ref: 0090112F
                                                          • Part of subcall function 009010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00900B9B,?,?,?), ref: 00901136
                                                          • Part of subcall function 009010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0090114D
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00900BCC
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00900C00
                                                        • GetLengthSid.ADVAPI32(?), ref: 00900C17
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00900C51
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00900C6D
                                                        • GetLengthSid.ADVAPI32(?), ref: 00900C84
                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00900C8C
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00900C93
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00900CB4
                                                        • CopySid.ADVAPI32(00000000), ref: 00900CBB
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00900CEA
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00900D0C
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00900D1E
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00900D45
                                                        • HeapFree.KERNEL32(00000000), ref: 00900D4C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00900D55
                                                        • HeapFree.KERNEL32(00000000), ref: 00900D5C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00900D65
                                                        • HeapFree.KERNEL32(00000000), ref: 00900D6C
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00900D78
                                                        • HeapFree.KERNEL32(00000000), ref: 00900D7F
                                                          • Part of subcall function 00901193: GetProcessHeap.KERNEL32(00000008,00900BB1,?,00000000,?,00900BB1,?), ref: 009011A1
                                                          • Part of subcall function 00901193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00900BB1,?), ref: 009011A8
                                                          • Part of subcall function 00901193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00900BB1,?), ref: 009011B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                        • String ID:
                                                        • API String ID: 4175595110-0
                                                        • Opcode ID: 9f68ef7c7d4cb6347fa18eb94c6991622658cb814711d451243c2889dcca99bf
                                                        • Instruction ID: b8f26af6aa4dd79b785524469598e3868d6dc298bdd26dfa3579322ae24fef24
                                                        • Opcode Fuzzy Hash: 9f68ef7c7d4cb6347fa18eb94c6991622658cb814711d451243c2889dcca99bf
                                                        • Instruction Fuzzy Hash: CB7146B290421AAFDF109FE4DC49BAEBBBCBF44300F044615E914A72D1D771AA05EFA0
                                                        APIs
                                                        • OpenClipboard.USER32(0093CC08), ref: 0091EB29
                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0091EB37
                                                        • GetClipboardData.USER32(0000000D), ref: 0091EB43
                                                        • CloseClipboard.USER32 ref: 0091EB4F
                                                        • GlobalLock.KERNEL32(00000000), ref: 0091EB87
                                                        • CloseClipboard.USER32 ref: 0091EB91
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0091EBBC
                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0091EBC9
                                                        • GetClipboardData.USER32(00000001), ref: 0091EBD1
                                                        • GlobalLock.KERNEL32(00000000), ref: 0091EBE2
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0091EC22
                                                        • IsClipboardFormatAvailable.USER32(0000000F), ref: 0091EC38
                                                        • GetClipboardData.USER32(0000000F), ref: 0091EC44
                                                        • GlobalLock.KERNEL32(00000000), ref: 0091EC55
                                                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0091EC77
                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0091EC94
                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0091ECD2
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0091ECF3
                                                        • CountClipboardFormats.USER32 ref: 0091ED14
                                                        • CloseClipboard.USER32 ref: 0091ED59
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                        • String ID:
                                                        • API String ID: 420908878-0
                                                        • Opcode ID: 0c1c05624f43907b1653c3963175cb836f4d69fa54937670cb6a9b43f8fc9d64
                                                        • Instruction ID: 212cbd7c40c7c3ba852093697ef98e8ac6278fd9a1c35358116232b6817e491e
                                                        • Opcode Fuzzy Hash: 0c1c05624f43907b1653c3963175cb836f4d69fa54937670cb6a9b43f8fc9d64
                                                        • Instruction Fuzzy Hash: 3661D0752082069FD300EF24D889FAAB7E8FF85704F084519F856D72A1DB30D985DB62
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 009169BE
                                                        • FindClose.KERNEL32(00000000), ref: 00916A12
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00916A4E
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00916A75
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00916AB2
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00916ADF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                        • API String ID: 3830820486-3289030164
                                                        • Opcode ID: 57e1d9596baaf24265e899e75f5cfee3d0da13d95a55d2365b02b215325b8134
                                                        • Instruction ID: e655c1df47a91aa692438c3d6645761bda75c203c9de4612e4360bfade0c9013
                                                        • Opcode Fuzzy Hash: 57e1d9596baaf24265e899e75f5cfee3d0da13d95a55d2365b02b215325b8134
                                                        • Instruction Fuzzy Hash: F8D14EB2908304AED710EBA8C981EABB7ECFF89704F44491DF585D6191EB74DA44CB63
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 00919663
                                                        • GetFileAttributesW.KERNEL32(?), ref: 009196A1
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 009196BB
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 009196D3
                                                        • FindClose.KERNEL32(00000000), ref: 009196DE
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 009196FA
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0091974A
                                                        • SetCurrentDirectoryW.KERNEL32(00966B7C), ref: 00919768
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00919772
                                                        • FindClose.KERNEL32(00000000), ref: 0091977F
                                                        • FindClose.KERNEL32(00000000), ref: 0091978F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1409584000-438819550
                                                        • Opcode ID: fdfeaf828f262db0143d225e0ea176e3c0f1b4e9643e0cf5c3256319967b631c
                                                        • Instruction ID: 48642796dc9e3f982bfb8e59a1f70e0c4bb10748f3d49d17023a5833a5b5c1d7
                                                        • Opcode Fuzzy Hash: fdfeaf828f262db0143d225e0ea176e3c0f1b4e9643e0cf5c3256319967b631c
                                                        • Instruction Fuzzy Hash: 8331CE7260461DAADF14AFB4DC18ADE77ACEF49320F104166F815E21E0EB30DA808F20
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 009197BE
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00919819
                                                        • FindClose.KERNEL32(00000000), ref: 00919824
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00919840
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00919890
                                                        • SetCurrentDirectoryW.KERNEL32(00966B7C), ref: 009198AE
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 009198B8
                                                        • FindClose.KERNEL32(00000000), ref: 009198C5
                                                        • FindClose.KERNEL32(00000000), ref: 009198D5
                                                          • Part of subcall function 0090DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0090DB00
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                        • String ID: *.*
                                                        • API String ID: 2640511053-438819550
                                                        • Opcode ID: af9bf44b00e83f1dcfb82ab6168389bb31d96368f0c2e0beb1d33da866a44292
                                                        • Instruction ID: 5ae87352b25b336373fe4061974205245c4f2cf16bdebf5206c26e2c3af68c00
                                                        • Opcode Fuzzy Hash: af9bf44b00e83f1dcfb82ab6168389bb31d96368f0c2e0beb1d33da866a44292
                                                        • Instruction Fuzzy Hash: D831C17260461DAEDF10AFB8EC58ADE77ACEF46324F1041A5E815E2190DB30DAC5CF20
                                                        APIs
                                                        • GetLocalTime.KERNEL32(?), ref: 00918257
                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00918267
                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00918273
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00918310
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00918324
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00918356
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0091838C
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00918395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryTime$File$Local$System
                                                        • String ID: *.*
                                                        • API String ID: 1464919966-438819550
                                                        • Opcode ID: 82c053c22192f69f95763266198f213d575bd07d2b5609ab0c3dfee4d7ccc5d4
                                                        • Instruction ID: e23240eb5763900e51ec3bfc9da947bbcfe857e2c85690dc4a1627f5b2cbb1e3
                                                        • Opcode Fuzzy Hash: 82c053c22192f69f95763266198f213d575bd07d2b5609ab0c3dfee4d7ccc5d4
                                                        • Instruction Fuzzy Hash: 786157B26082099FDB10EF64C8409AFB3E8FF89310F04891EF999D7251DB31E945CB92
                                                        APIs
                                                          • Part of subcall function 008A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,008A3A97,?,?,008A2E7F,?,?,?,00000000), ref: 008A3AC2
                                                          • Part of subcall function 0090E199: GetFileAttributesW.KERNEL32(?,0090CF95), ref: 0090E19A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0090D122
                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0090D1DD
                                                        • MoveFileW.KERNEL32(?,?), ref: 0090D1F0
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 0090D20D
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0090D237
                                                          • Part of subcall function 0090D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0090D21C,?,?), ref: 0090D2B2
                                                        • FindClose.KERNEL32(00000000,?,?,?), ref: 0090D253
                                                        • FindClose.KERNEL32(00000000), ref: 0090D264
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 1946585618-1173974218
                                                        • Opcode ID: 1d9a98a350546288d10ff54c2dd7f0775cb6af4566ad6673bf8938fd403bb1e6
                                                        • Instruction ID: 0c1f14712ab154033d45ed328f5e6a00db2d024613926c1467a883590e462b4b
                                                        • Opcode Fuzzy Hash: 1d9a98a350546288d10ff54c2dd7f0775cb6af4566ad6673bf8938fd403bb1e6
                                                        • Instruction Fuzzy Hash: 81618D3180611DAEDF05EBE8DA529EEB7B9FF55300F244065E412B3191EB34AF09DB61
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                        • String ID:
                                                        • API String ID: 1737998785-0
                                                        • Opcode ID: 54a6f705b0d54168c6a5834bf0d1faf6a18e1551364d40972aad525e3790872f
                                                        • Instruction ID: 8f448ded11481d57b0e29eae1bc384d3a43bb61bceda27c03c9dba17d6a86df0
                                                        • Opcode Fuzzy Hash: 54a6f705b0d54168c6a5834bf0d1faf6a18e1551364d40972aad525e3790872f
                                                        • Instruction Fuzzy Hash: D241E3752086119FE310CF19E849F59BBE5FF44318F14C099E8199B6A2C775EC81CF90
                                                        APIs
                                                          • Part of subcall function 009016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0090170D
                                                          • Part of subcall function 009016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0090173A
                                                          • Part of subcall function 009016C3: GetLastError.KERNEL32 ref: 0090174A
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 0090E932
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                        • String ID: $ $@$SeShutdownPrivilege
                                                        • API String ID: 2234035333-3163812486
                                                        • Opcode ID: 3e0add9a7f7d4986e3168d0f7f4ff4605611074b459ef2d6aa8ec02704962be7
                                                        • Instruction ID: a7930eea2038c95125e3c9dde3df459c0cb409bcf828ffb0774d2e8db217929d
                                                        • Opcode Fuzzy Hash: 3e0add9a7f7d4986e3168d0f7f4ff4605611074b459ef2d6aa8ec02704962be7
                                                        • Instruction Fuzzy Hash: B701F973624311AFEB5426B49C86FBF726CA714B90F154D21FC23F21D1D5A55C409690
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00921276
                                                        • WSAGetLastError.WSOCK32 ref: 00921283
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 009212BA
                                                        • WSAGetLastError.WSOCK32 ref: 009212C5
                                                        • closesocket.WSOCK32(00000000), ref: 009212F4
                                                        • listen.WSOCK32(00000000,00000005), ref: 00921303
                                                        • WSAGetLastError.WSOCK32 ref: 0092130D
                                                        • closesocket.WSOCK32(00000000), ref: 0092133C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$closesocket$bindlistensocket
                                                        • String ID:
                                                        • API String ID: 540024437-0
                                                        • Opcode ID: 1981f26fc2272f1d824215519ce6cd51926e5beea025552aec0860f8bbd6cda2
                                                        • Instruction ID: a5eb607accf503e1199a1e8afbd978c15ce9d9e9995367eb791b6f6cb558b904
                                                        • Opcode Fuzzy Hash: 1981f26fc2272f1d824215519ce6cd51926e5beea025552aec0860f8bbd6cda2
                                                        • Instruction Fuzzy Hash: 75418171A00110DFD710DF68D488B2ABBE6FF56318F188198E8569F296C771ED85CBE1
                                                        APIs
                                                        • _free.LIBCMT ref: 008DB9D4
                                                        • _free.LIBCMT ref: 008DB9F8
                                                        • _free.LIBCMT ref: 008DBB7F
                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00943700), ref: 008DBB91
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0097121C,000000FF,00000000,0000003F,00000000,?,?), ref: 008DBC09
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00971270,000000FF,?,0000003F,00000000,?), ref: 008DBC36
                                                        • _free.LIBCMT ref: 008DBD4B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                        • String ID:
                                                        • API String ID: 314583886-0
                                                        • Opcode ID: 33f250e35fa9f8b257bfcb65711a9475baca31f2f01eaef2f3e072b32ed0b79c
                                                        • Instruction ID: 9266bf672a8b3728159dc4f857ee259e69cc88b2593386f9fbb0928efa3cd914
                                                        • Opcode Fuzzy Hash: 33f250e35fa9f8b257bfcb65711a9475baca31f2f01eaef2f3e072b32ed0b79c
                                                        • Instruction Fuzzy Hash: A5C11671904248EFCB249F6D8851BAA7BF9FF41360F1543ABE494D7352EB308E419751
                                                        APIs
                                                          • Part of subcall function 008A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,008A3A97,?,?,008A2E7F,?,?,?,00000000), ref: 008A3AC2
                                                          • Part of subcall function 0090E199: GetFileAttributesW.KERNEL32(?,0090CF95), ref: 0090E19A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0090D420
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 0090D470
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0090D481
                                                        • FindClose.KERNEL32(00000000), ref: 0090D498
                                                        • FindClose.KERNEL32(00000000), ref: 0090D4A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 2649000838-1173974218
                                                        • Opcode ID: eb36971be545bbba55e03e3e21f74b37cf85695226be62ef679b803820c5b786
                                                        • Instruction ID: 4e71d5906c0f4fe2125761b1a317d7dc48a8ed9d699239a3dda44484d1b4197b
                                                        • Opcode Fuzzy Hash: eb36971be545bbba55e03e3e21f74b37cf85695226be62ef679b803820c5b786
                                                        • Instruction Fuzzy Hash: 36316D7101D3519FD204EF68D8918AFB7A8FE92304F444A2DF4E1931E1EB24EA09DB63
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: __floor_pentium4
                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                        • API String ID: 4168288129-2761157908
                                                        • Opcode ID: 62d486e25aa7d899df57a54d5f2b33d9ef8442c5570b2342f44a0dd83e1cc262
                                                        • Instruction ID: 10153d4537ce21044981def57e5ab1adb4371220b2c5dc3f17706f2035c24ef9
                                                        • Opcode Fuzzy Hash: 62d486e25aa7d899df57a54d5f2b33d9ef8442c5570b2342f44a0dd83e1cc262
                                                        • Instruction Fuzzy Hash: 6FC23771E086288BDB25DE289D407EAB7B5FB48314F1442EBD94EE7341E774AE819F40
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 009164DC
                                                        • CoInitialize.OLE32(00000000), ref: 00916639
                                                        • CoCreateInstance.OLE32(0093FCF8,00000000,00000001,0093FB68,?), ref: 00916650
                                                        • CoUninitialize.OLE32 ref: 009168D4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 886957087-24824748
                                                        • Opcode ID: e480bcb3496a0134597a1adf3c6cf50e95f3aacd4312e27e54bcfbf4b18c92b8
                                                        • Instruction ID: 9cd170edc23716b3f499e2bf68dc8e6e35eaf6616db2d02d9d9496d64f73057f
                                                        • Opcode Fuzzy Hash: e480bcb3496a0134597a1adf3c6cf50e95f3aacd4312e27e54bcfbf4b18c92b8
                                                        • Instruction Fuzzy Hash: 2AD14971608205AFD304EF28C881EABB7E9FF95704F00496DF595CB2A1EB70E945CB92
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,00000000), ref: 009222E8
                                                          • Part of subcall function 0091E4EC: GetWindowRect.USER32(?,?), ref: 0091E504
                                                        • GetDesktopWindow.USER32 ref: 00922312
                                                        • GetWindowRect.USER32(00000000), ref: 00922319
                                                        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00922355
                                                        • GetCursorPos.USER32(?), ref: 00922381
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 009223DF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                        • String ID:
                                                        • API String ID: 2387181109-0
                                                        • Opcode ID: 96368c75c47401da8f076fbb130bb1ff8980d62544bb03934b130e8dc38ff448
                                                        • Instruction ID: 66d3289851431a5326dc7db64abd6f5d1d8270c509c22d7a0b7160769b8c12ba
                                                        • Opcode Fuzzy Hash: 96368c75c47401da8f076fbb130bb1ff8980d62544bb03934b130e8dc38ff448
                                                        • Instruction Fuzzy Hash: 4031E072508715AFD720DF14D849B9BBBA9FFC8714F000A19F985A7191DB34EA08CB92
                                                        APIs
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00919B78
                                                        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00919C8B
                                                          • Part of subcall function 00913874: GetInputState.USER32 ref: 009138CB
                                                          • Part of subcall function 00913874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00913966
                                                        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00919BA8
                                                        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00919C75
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                        • String ID: *.*
                                                        • API String ID: 1972594611-438819550
                                                        • Opcode ID: ae3bb32dcd751145bbcb927fb02ed10e3865575302057e4657c3f56241430e1b
                                                        • Instruction ID: ec2365143bc92a5f8a6932a06e020f35a5de3df897284f6084778694a296f021
                                                        • Opcode Fuzzy Hash: ae3bb32dcd751145bbcb927fb02ed10e3865575302057e4657c3f56241430e1b
                                                        • Instruction Fuzzy Hash: 38417171A4460E9FDF14DF68C855AEEBBB8FF05310F144055F849A2291EB309E84CFA1
                                                        APIs
                                                          • Part of subcall function 008B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 008B9BB2
                                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 008B9A4E
                                                        • GetSysColor.USER32(0000000F), ref: 008B9B23
                                                        • SetBkColor.GDI32(?,00000000), ref: 008B9B36
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Color$LongProcWindow
                                                        • String ID:
                                                        • API String ID: 3131106179-0
                                                        • Opcode ID: e7cce9a6a40e1824c6f0f776d221af069ea214a043b824f246708e175cc52f4b
                                                        • Instruction ID: 0f47dc5a295d113bef0108f786008e8eda4cd101bc3f0320edb1fb143993689b
                                                        • Opcode Fuzzy Hash: e7cce9a6a40e1824c6f0f776d221af069ea214a043b824f246708e175cc52f4b
                                                        • Instruction Fuzzy Hash: 2EA1247121842CAEF738AA3C8C89EFB3A9DFB82314F154109F782D67D1CA259D41D676
                                                        APIs
                                                          • Part of subcall function 0092304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0092307A
                                                          • Part of subcall function 0092304E: _wcslen.LIBCMT ref: 0092309B
                                                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0092185D
                                                        • WSAGetLastError.WSOCK32 ref: 00921884
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 009218DB
                                                        • WSAGetLastError.WSOCK32 ref: 009218E6
                                                        • closesocket.WSOCK32(00000000), ref: 00921915
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 1601658205-0
                                                        • Opcode ID: 9d24cee37af038661447089df30d0c1e27a78a0ab7c10534bc0e89dca98bdd77
                                                        • Instruction ID: 74881bfea22350463a66a18ee35bf4f14c0641c4aa731acb2452bdf34bd73351
                                                        • Opcode Fuzzy Hash: 9d24cee37af038661447089df30d0c1e27a78a0ab7c10534bc0e89dca98bdd77
                                                        • Instruction Fuzzy Hash: C251D675A00210AFEB10AF28D886F6A77E5EB45718F088458F905AF3C7D771ED41CBA2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                        • String ID:
                                                        • API String ID: 292994002-0
                                                        • Opcode ID: 8b3be51bb7ddd8f7eb29cfe8bf74aa226d0b6e7e17df40ee4a521d9822fe859b
                                                        • Instruction ID: 6933a362f7d66a7d23252a4629473d0e9036131fc9e90327140f5f4f33983998
                                                        • Opcode Fuzzy Hash: 8b3be51bb7ddd8f7eb29cfe8bf74aa226d0b6e7e17df40ee4a521d9822fe859b
                                                        • Instruction Fuzzy Hash: 6B21C7717446115FD7208F2AC854B6A7BE9FF85315F199068E88ADB361CB71EC42CF90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                        • API String ID: 0-1546025612
                                                        • Opcode ID: 3ec57733b919c63bc93c0b517f7b74deaee4fa810dd7df6427592349b6c28336
                                                        • Instruction ID: 60563b43b7ba6a6cc6062761c1c864b39b37765dddda4afb37fe19ada32f51ef
                                                        • Opcode Fuzzy Hash: 3ec57733b919c63bc93c0b517f7b74deaee4fa810dd7df6427592349b6c28336
                                                        • Instruction Fuzzy Hash: 47A29E70E0065ACBEF24CF59C8447ADB7B1FF56318F2481A9D815E7684EB709D91CB60
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0092A6AC
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0092A6BA
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 0092A79C
                                                        • CloseHandle.KERNEL32(00000000), ref: 0092A7AB
                                                          • Part of subcall function 008BCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,008E3303,?), ref: 008BCE8A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                        • String ID:
                                                        • API String ID: 1991900642-0
                                                        • Opcode ID: 491bb9e5db6a791111c55278894bbb571b2b7cf5a891f9de68668b858a8f732c
                                                        • Instruction ID: eb2b1bb9b189d8ec863867f8a4aa74153200910488d541dc9474718510f73eb7
                                                        • Opcode Fuzzy Hash: 491bb9e5db6a791111c55278894bbb571b2b7cf5a891f9de68668b858a8f732c
                                                        • Instruction Fuzzy Hash: 2C512CB15083109FD710EF28D886A6BBBE8FF89754F04892DF595D7251EB70E904CB92
                                                        APIs
                                                        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0090AAAC
                                                        • SetKeyboardState.USER32(00000080), ref: 0090AAC8
                                                        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0090AB36
                                                        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0090AB88
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 30f645b21e6603e6c21f599c1707b184590eda8bec6ee7e5446b66ceb93b9caa
                                                        • Instruction ID: af8a004f46c46a3033c238185382d1fddd35379ce567b1d4d5ce98cfdb8afd7f
                                                        • Opcode Fuzzy Hash: 30f645b21e6603e6c21f599c1707b184590eda8bec6ee7e5446b66ceb93b9caa
                                                        • Instruction Fuzzy Hash: 88311471A40718AEFB358B69CC05BFA7BAEAB94320F04421AF085961D1D378C981D7E2
                                                        APIs
                                                        • InternetReadFile.WININET(?,?,00000400,?), ref: 0091CE89
                                                        • GetLastError.KERNEL32(?,00000000), ref: 0091CEEA
                                                        • SetEvent.KERNEL32(?,?,00000000), ref: 0091CEFE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorEventFileInternetLastRead
                                                        • String ID:
                                                        • API String ID: 234945975-0
                                                        • Opcode ID: 14039d82e6455f29977382c3910a6396beaefe04b1bff90c43aa0e69f368c043
                                                        • Instruction ID: 052e82c570d66a601e7f9592d7af79bdd25249283569ae822560670e4e2e193d
                                                        • Opcode Fuzzy Hash: 14039d82e6455f29977382c3910a6396beaefe04b1bff90c43aa0e69f368c043
                                                        • Instruction Fuzzy Hash: EE21EDF1640709ABDB20CFA5C948BA7B7FCEB00314F10481EE542E2251E734EE858F90
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 009082AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: lstrlen
                                                        • String ID: ($|
                                                        • API String ID: 1659193697-1631851259
                                                        • Opcode ID: 824e2b86ec6d83f1f56bf334aa6e13a7cc6491ec0a1353456218b66ec0cbe751
                                                        • Instruction ID: eaa05d7590441a267301869acc77025223dc5c3417f37f2fc61e6b763515753b
                                                        • Opcode Fuzzy Hash: 824e2b86ec6d83f1f56bf334aa6e13a7cc6491ec0a1353456218b66ec0cbe751
                                                        • Instruction Fuzzy Hash: D6322475A007059FCB28CF69C481A6AB7F1FF48710B15C56EE59ADB3A1EB70E981CB40
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00915CC1
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00915D17
                                                        • FindClose.KERNEL32(?), ref: 00915D5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNext
                                                        • String ID:
                                                        • API String ID: 3541575487-0
                                                        • Opcode ID: 69b7cafb5639e92abbe7cfcef5cb4f952db4abcfe1570651288f19be15dcf070
                                                        • Instruction ID: 05b1e2bd65c3288db4c38d30e2fa2ebe4b848c22a3e54d70ca544aae83a7597e
                                                        • Opcode Fuzzy Hash: 69b7cafb5639e92abbe7cfcef5cb4f952db4abcfe1570651288f19be15dcf070
                                                        • Instruction Fuzzy Hash: 9E518878704A05DFC714CF28D484A96B7E8FF8A314F16855DE99A8B3A1CB30E884CF91
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32 ref: 008D271A
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 008D2724
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 008D2731
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: cd4fb490790531b5ec565fb7554ef24e6c93b3e68830cb9306232c4a5a2e201c
                                                        • Instruction ID: c2cbb8731c6598c864fed96f5efea6ffda9feadc5d9badf1e37a71ac183e6093
                                                        • Opcode Fuzzy Hash: cd4fb490790531b5ec565fb7554ef24e6c93b3e68830cb9306232c4a5a2e201c
                                                        • Instruction Fuzzy Hash: 0031C675911228ABCB21DF68DC88B99BBB8FF18310F5042DAE41CA7260E7349F818F45
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 009151DA
                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00915238
                                                        • SetErrorMode.KERNEL32(00000000), ref: 009152A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DiskFreeSpace
                                                        • String ID:
                                                        • API String ID: 1682464887-0
                                                        • Opcode ID: 5ecb11e3f4ad7201c5a2f5cb93731477a020fc6a1b5c28c11de221134bf88b09
                                                        • Instruction ID: 8571e54d4d35edf0dbb83bb3e02c594f9801ed77a6575bd3dcc636af9be30529
                                                        • Opcode Fuzzy Hash: 5ecb11e3f4ad7201c5a2f5cb93731477a020fc6a1b5c28c11de221134bf88b09
                                                        • Instruction Fuzzy Hash: 97318C75A04518DFDB00DF94D884EAEBBF4FF49314F098499E805AB3A2CB31E846CB91
                                                        APIs
                                                          • Part of subcall function 008BFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 008C0668
                                                          • Part of subcall function 008BFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 008C0685
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0090170D
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0090173A
                                                        • GetLastError.KERNEL32 ref: 0090174A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                        • String ID:
                                                        • API String ID: 577356006-0
                                                        • Opcode ID: 5fdcb7343c7c10d3ce8cc03fcca39601a037bfac1debb7dc8a27128157c1207a
                                                        • Instruction ID: 4f4d3649677f841d9b7e04e766e4a96f5122b1b90e9823a57953f3ca80159083
                                                        • Opcode Fuzzy Hash: 5fdcb7343c7c10d3ce8cc03fcca39601a037bfac1debb7dc8a27128157c1207a
                                                        • Instruction Fuzzy Hash: 2C119EB2514305AFD728AF54DC86DAAB7BDFB44754B24852EE056A7281EB70FC418B20
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0090D608
                                                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0090D645
                                                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0090D650
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CloseControlCreateDeviceFileHandle
                                                        • String ID:
                                                        • API String ID: 33631002-0
                                                        • Opcode ID: 75262eb60cb049db775200f4fd4e9380da9af8fdda39e9fbf0b67a4f613ba757
                                                        • Instruction ID: 5b1010965cf0765324788959865946ec58347b25c4b5df0bbb79242cd460dd59
                                                        • Opcode Fuzzy Hash: 75262eb60cb049db775200f4fd4e9380da9af8fdda39e9fbf0b67a4f613ba757
                                                        • Instruction Fuzzy Hash: B0115EB5E05228BFDB108F95DC45FAFBBBCEB45B50F108115F914F7290D6704A059BA1
                                                        APIs
                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0090168C
                                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 009016A1
                                                        • FreeSid.ADVAPI32(?), ref: 009016B1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                        • String ID:
                                                        • API String ID: 3429775523-0
                                                        • Opcode ID: a426588d4258d849b7a4fa2d22a0f8f626e88dcb2b7500b571cea3b4121d8e48
                                                        • Instruction ID: 9f262887da095570b0d325ae9362af5e3fdcb6e2df0fa651c56060b0fb02e331
                                                        • Opcode Fuzzy Hash: a426588d4258d849b7a4fa2d22a0f8f626e88dcb2b7500b571cea3b4121d8e48
                                                        • Instruction Fuzzy Hash: C2F0F4B195430DFBDF00DFE49D89AAEBBBDEB08704F504565E501E2181E774AA449B50
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(008D28E9,?,008C4CBE,008D28E9,009688B8,0000000C,008C4E15,008D28E9,00000002,00000000,?,008D28E9), ref: 008C4D09
                                                        • TerminateProcess.KERNEL32(00000000,?,008C4CBE,008D28E9,009688B8,0000000C,008C4E15,008D28E9,00000002,00000000,?,008D28E9), ref: 008C4D10
                                                        • ExitProcess.KERNEL32 ref: 008C4D22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: 223e6b759f5c8ae50cc1aee933811cf1d09ee98f8ab3309d9b90a0b5621deb2c
                                                        • Instruction ID: 5732fa361363b6ee3caecfb68e87ab6a273237184b39b185cd4cfe2a9aca824b
                                                        • Opcode Fuzzy Hash: 223e6b759f5c8ae50cc1aee933811cf1d09ee98f8ab3309d9b90a0b5621deb2c
                                                        • Instruction Fuzzy Hash: EBE0B671014548ABCF11BF64DD1AF983B79FB41791B104418FD06DA222CB35DD92EF81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: /
                                                        • API String ID: 0-2043925204
                                                        • Opcode ID: 707e455f2d005388037f4abdc7c19a436469bbff3ea2576e32c5c76044435bee
                                                        • Instruction ID: 664ecd6e611b9f4fbcd758ba5bf4280d9be2201811378691dd5dfebdcd55d95b
                                                        • Opcode Fuzzy Hash: 707e455f2d005388037f4abdc7c19a436469bbff3ea2576e32c5c76044435bee
                                                        • Instruction Fuzzy Hash: 0841267690021AABCB249FB9CC49EBB77B9FB84314F10436AF905D7380E6709D81CB50
                                                        APIs
                                                        • GetUserNameW.ADVAPI32(?,?), ref: 008FD28C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID: X64
                                                        • API String ID: 2645101109-893830106
                                                        • Opcode ID: 0c3ea7a283b2920e18e149d3d8ad9d3ca5341c3a709f5022de3818ed065ac360
                                                        • Instruction ID: 00a02389110520fc66aa38f0a9afd8dbc264585633f236865c363592733f6c64
                                                        • Opcode Fuzzy Hash: 0c3ea7a283b2920e18e149d3d8ad9d3ca5341c3a709f5022de3818ed065ac360
                                                        • Instruction Fuzzy Hash: 8BD0C9B581521DEACF94DBA0DC88DD9B37CFB04309F100151F206E2100D73095499F10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                        • Instruction ID: fa422e00e0fc9396f067fb1c4b199e1fffa599102d229db56ff22b486e270376
                                                        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                        • Instruction Fuzzy Hash: 39021A71E002199BDF14CFA9D880BADBBF1FF49314F25816EE919E7380D731AA418B94
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00916918
                                                        • FindClose.KERNEL32(00000000), ref: 00916961
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 43eb4b0dbfec14b07a99a1f981b54e9d651d9ee918bff3924b648c9b855fd8a8
                                                        • Instruction ID: 5f5406fa62bc75b110b2361ad77b24a52a71b1a7707f973c7082169219edc66e
                                                        • Opcode Fuzzy Hash: 43eb4b0dbfec14b07a99a1f981b54e9d651d9ee918bff3924b648c9b855fd8a8
                                                        • Instruction Fuzzy Hash: 0B11D071A046149FD710DF29C884A16BBE4FF85328F04C699E8698F6A2CB30EC45CB91
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00924891,?,?,00000035,?), ref: 009137E4
                                                        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00924891,?,?,00000035,?), ref: 009137F4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatLastMessage
                                                        • String ID:
                                                        • API String ID: 3479602957-0
                                                        • Opcode ID: 36d06dd9c15e8bfd2bc5621a6a14a93962c807290905f7fc56216404b3aacd11
                                                        • Instruction ID: 59d163db49131f07d922ecd068c4a9047573490e597f52225d1876219073101b
                                                        • Opcode Fuzzy Hash: 36d06dd9c15e8bfd2bc5621a6a14a93962c807290905f7fc56216404b3aacd11
                                                        • Instruction Fuzzy Hash: 74F0E5B17083292AEB20176A8C4DFEB3AAEEFC5761F000175F509E22C1D9609D44CBB1
                                                        APIs
                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0090B25D
                                                        • keybd_event.USER32(?,7707C0D0,?,00000000), ref: 0090B270
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: InputSendkeybd_event
                                                        • String ID:
                                                        • API String ID: 3536248340-0
                                                        • Opcode ID: cd58375e83042e637dd9828fcd244a758f1e64c1b54e0f5f1306d17e79af6439
                                                        • Instruction ID: cf11032721abc1c01320bb9ab33970be313b82b7a9aab68339796726c542e741
                                                        • Opcode Fuzzy Hash: cd58375e83042e637dd9828fcd244a758f1e64c1b54e0f5f1306d17e79af6439
                                                        • Instruction Fuzzy Hash: D5F01D7181424DAFDB059FA4C805BAE7BB4FF14305F008409F965A5191C37996119F94
                                                        APIs
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,009011FC), ref: 009010D4
                                                        • CloseHandle.KERNEL32(?,?,009011FC), ref: 009010E9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                        • String ID:
                                                        • API String ID: 81990902-0
                                                        • Opcode ID: e91e3c9f8d2ed53ea5a35097d177d09d58aa7cc5e7a7704e83eb6709be36efbe
                                                        • Instruction ID: ffb5745959e671bb7d4f51afa7148538cbe4121fe33c4c81047f7da31e494840
                                                        • Opcode Fuzzy Hash: e91e3c9f8d2ed53ea5a35097d177d09d58aa7cc5e7a7704e83eb6709be36efbe
                                                        • Instruction Fuzzy Hash: 64E0BF72018610EEE7252B55FC05EB777E9FB04310B14882DF5A5945B1DB62ACA0EB50
                                                        Strings
                                                        • Variable is not of type 'Object'., xrefs: 008F0C40
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Variable is not of type 'Object'.
                                                        • API String ID: 0-1840281001
                                                        • Opcode ID: 61b52d0b1badb95e798f74761597e2c18d5924353f73faece82eaa6e10ac5788
                                                        • Instruction ID: 48c5e9f2aab1e0f18b4f73c6bdbb45092fd45be67c885449262c00aa4bf3b1c5
                                                        • Opcode Fuzzy Hash: 61b52d0b1badb95e798f74761597e2c18d5924353f73faece82eaa6e10ac5788
                                                        • Instruction Fuzzy Hash: 8232687090021C9FEF14DFA4C980AEDB7B5FF06318F248059E906EB692DB75AE45CB61
                                                        APIs
                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,008D6766,?,?,00000008,?,?,008DFEFE,00000000), ref: 008D6998
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 3997070919-0
                                                        • Opcode ID: 1ccee7e9bf3aac72f2d63e6dbd29aa80a2012f7c7943f55ef23bf3e8107dc210
                                                        • Instruction ID: 19d16908d0791b2395a795c6aa8aaf72fc2076bb5596efc4fe6ea539752fdc50
                                                        • Opcode Fuzzy Hash: 1ccee7e9bf3aac72f2d63e6dbd29aa80a2012f7c7943f55ef23bf3e8107dc210
                                                        • Instruction Fuzzy Hash: 98B1493161060D9FD715CF28C48AB657BA0FF45368F29865AE8D9CF3A2D335E9A1CB40
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3916222277
                                                        • Opcode ID: 59458db0cc7f4ab69a6d1ec29d211f66822a0287e71c28149f577277be005412
                                                        • Instruction ID: eb3aa3950265caaa69fe0014dd71e65b6dbe5ea876fdeb1719458ba9d61f856c
                                                        • Opcode Fuzzy Hash: 59458db0cc7f4ab69a6d1ec29d211f66822a0287e71c28149f577277be005412
                                                        • Instruction Fuzzy Hash: F3124D71900229DBDB24CF68C8816EEB7F5FF48710F1481AAE949EB351DB709A85CF94
                                                        APIs
                                                        • BlockInput.USER32(00000001), ref: 0091EABD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: BlockInput
                                                        • String ID:
                                                        • API String ID: 3456056419-0
                                                        • Opcode ID: b76b545b9b77be823710e4c34876798f53454cf2e8b3b4c5bf1d6ab2840a4d14
                                                        • Instruction ID: a784e8dd2be110a889c4a132707d7e8eb6a929f51514b3a5ad8cb5b34142a0a9
                                                        • Opcode Fuzzy Hash: b76b545b9b77be823710e4c34876798f53454cf2e8b3b4c5bf1d6ab2840a4d14
                                                        • Instruction Fuzzy Hash: 8DE01A362102049FD710EF69D805E9AB7E9FF99760F008416FC4AD7251DAB0A8808B91
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,008C03EE), ref: 008C09DA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 9d1afe1b9f499c1e93867b322b5ec24c78e02c511c3a661a0eeec1aab1e800ac
                                                        • Instruction ID: b625996b6fac9003c8909a6f5cc2e9aa4b8bab71b20c5ed5ddea2bab7c2996a7
                                                        • Opcode Fuzzy Hash: 9d1afe1b9f499c1e93867b322b5ec24c78e02c511c3a661a0eeec1aab1e800ac
                                                        • Instruction Fuzzy Hash:
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                        • Instruction ID: d43fb7778c9c6da3e53c998f8de556976e5ee4da3010538eeb317d02e4b9c6a9
                                                        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                        • Instruction Fuzzy Hash: A951796160C6499BDB38452C885DFBE2BB5FB12344F18053DEA82C7682C639DE09DF5A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ac99db9e2d892b693e3e66d666a0955d459eba9d10e5ce21869d7c4b5a7e46c9
                                                        • Instruction ID: fcc6f8ed472159cd47d11dc861259edb91dd93b16ef70e865d95053fa83f28de
                                                        • Opcode Fuzzy Hash: ac99db9e2d892b693e3e66d666a0955d459eba9d10e5ce21869d7c4b5a7e46c9
                                                        • Instruction Fuzzy Hash: 88320F26D2DF014DD7239634D822326A359BFB73C5F55C737F81AB5AAAEB28C4835100
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 43cdbe2a99f426c734ebb426bdec9f1985ef94ae5a220063646aa9b10210c521
                                                        • Instruction ID: 047bde980ebee8999d8e0407479b3657774fff44b2b9fd73867237a9ac34710d
                                                        • Opcode Fuzzy Hash: 43cdbe2a99f426c734ebb426bdec9f1985ef94ae5a220063646aa9b10210c521
                                                        • Instruction Fuzzy Hash: 28321631A0411D8BDF28CF39C6A06BE7BA1FB45314F28856AD68ACB391D334DE85DB40
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 48bc482ec234320bde69b0b9d6ee0324efc205bda1d1bf28e3ff53a9b3d1e3ac
                                                        • Instruction ID: 3ce751f2e202965c49b6a17013181307200dcfbb1add15bfde08a4fefdfd12bb
                                                        • Opcode Fuzzy Hash: 48bc482ec234320bde69b0b9d6ee0324efc205bda1d1bf28e3ff53a9b3d1e3ac
                                                        • Instruction Fuzzy Hash: AD22D0B0A04609DFEF14CF69C881AAEB3B5FF46318F144129E812E7691EB35ED11DB61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 745d7337caeca96e4cb34bcbb185a7688a18a83bf3aecc67126ceed9736a9832
                                                        • Instruction ID: 15da6d9f6c12bbe7d447b10d8896e96208d14db4414af6867ac3332eaaa1ad29
                                                        • Opcode Fuzzy Hash: 745d7337caeca96e4cb34bcbb185a7688a18a83bf3aecc67126ceed9736a9832
                                                        • Instruction Fuzzy Hash: 3E02C5B0A00119EFDF04DF69D881AAEB7B1FF45304F608169E856DB391EB31EA10CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                        • Instruction ID: 43b25562632b2dd4430c7a70fbe3b90345f6a69f8e525bb0297313c24033c393
                                                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                        • Instruction Fuzzy Hash: FD9157722080A349DF29463985B8A7DFFF1EA533A1719079DE4F3CA1C6EE34D568D620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                        • Instruction ID: c9ab22138bc432c15e7c7f8d1cef37ec41e2a686392ef6727d8372217f8d878c
                                                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                        • Instruction Fuzzy Hash: 2D9135722090A349DF69427985BC93DFEF1AA533B5319079DD4F2CA1C2FD34C9699A20
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9a28044dc8a326d704bfca54066d41e794ed57077e44100218b90f0be6c82404
                                                        • Instruction ID: aa86a7b12b8c6c117f806dc4b719206a1a74ad25b40dd30e97bf93e48c8ed4d7
                                                        • Opcode Fuzzy Hash: 9a28044dc8a326d704bfca54066d41e794ed57077e44100218b90f0be6c82404
                                                        • Instruction Fuzzy Hash: 19616771248719A6DB349A2C8995FBE23B4FF41764F10491EE942DB281DA31DE42CF16
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b69a2e3618aae959998ff9a48ead1f81d88d4ea61a46793cb35964cfe4087537
                                                        • Instruction ID: 7b4a63ec30be32ae800afa60f5da43673498a16d2c8083864c0f614711f5122c
                                                        • Opcode Fuzzy Hash: b69a2e3618aae959998ff9a48ead1f81d88d4ea61a46793cb35964cfe4087537
                                                        • Instruction Fuzzy Hash: 8B617A72248709A7DA384A2C5856FBE23B4FF42B44F10095EFA43CB289D631ED428E56
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                        • Instruction ID: aff6b42ac07142c0fd4d4fa20b77ec3d88ec2297355063e7843ec55a0cc06931
                                                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                        • Instruction Fuzzy Hash: 8A8144725090A349DF59423985B893EFFF1FA933A131A47ADD4F2CA1C6EE34C558D620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4419b22762cce407f25d499c4552a5b59fe23419c1de1eb6ff6efad1950101f5
                                                        • Instruction ID: 71579a1cda0acb98ab79df22d97053d3318e56f88922e1913630f63ffa1287a9
                                                        • Opcode Fuzzy Hash: 4419b22762cce407f25d499c4552a5b59fe23419c1de1eb6ff6efad1950101f5
                                                        • Instruction Fuzzy Hash: 1421A5327306158BD728DF79C8226BA73E9E754310F25862EE4A7C37D1DE39A944DB80
                                                        APIs
                                                        • SetTextColor.GDI32(?,00000000), ref: 0093712F
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00937160
                                                        • GetSysColor.USER32(0000000F), ref: 0093716C
                                                        • SetBkColor.GDI32(?,000000FF), ref: 00937186
                                                        • SelectObject.GDI32(?,?), ref: 00937195
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 009371C0
                                                        • GetSysColor.USER32(00000010), ref: 009371C8
                                                        • CreateSolidBrush.GDI32(00000000), ref: 009371CF
                                                        • FrameRect.USER32(?,?,00000000), ref: 009371DE
                                                        • DeleteObject.GDI32(00000000), ref: 009371E5
                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00937230
                                                        • FillRect.USER32(?,?,?), ref: 00937262
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00937284
                                                          • Part of subcall function 009373E8: GetSysColor.USER32(00000012), ref: 00937421
                                                          • Part of subcall function 009373E8: SetTextColor.GDI32(?,?), ref: 00937425
                                                          • Part of subcall function 009373E8: GetSysColorBrush.USER32(0000000F), ref: 0093743B
                                                          • Part of subcall function 009373E8: GetSysColor.USER32(0000000F), ref: 00937446
                                                          • Part of subcall function 009373E8: GetSysColor.USER32(00000011), ref: 00937463
                                                          • Part of subcall function 009373E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00937471
                                                          • Part of subcall function 009373E8: SelectObject.GDI32(?,00000000), ref: 00937482
                                                          • Part of subcall function 009373E8: SetBkColor.GDI32(?,00000000), ref: 0093748B
                                                          • Part of subcall function 009373E8: SelectObject.GDI32(?,?), ref: 00937498
                                                          • Part of subcall function 009373E8: InflateRect.USER32(?,000000FF,000000FF), ref: 009374B7
                                                          • Part of subcall function 009373E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 009374CE
                                                          • Part of subcall function 009373E8: GetWindowLongW.USER32(00000000,000000F0), ref: 009374DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                        • String ID:
                                                        • API String ID: 4124339563-0
                                                        • Opcode ID: c6ea904b5bdb892c515dde8549bd9ad6fdb7fa68dd114c4f75f4d689407cba8f
                                                        • Instruction ID: 6fa102e0ee423bfe366f19d7f352e4a30e6f022f64f7b772cffba2a6bc5e155a
                                                        • Opcode Fuzzy Hash: c6ea904b5bdb892c515dde8549bd9ad6fdb7fa68dd114c4f75f4d689407cba8f
                                                        • Instruction Fuzzy Hash: 65A1A0B201C701AFDB109FA0DC48E6BBBA9FB49321F100A19F962A61E1D775E944EF51
                                                        APIs
                                                        • DestroyWindow.USER32(?,?), ref: 008B8E14
                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 008F6AC5
                                                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 008F6AFE
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 008F6F43
                                                          • Part of subcall function 008B8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,008B8BE8,?,00000000,?,?,?,?,008B8BBA,00000000,?), ref: 008B8FC5
                                                        • SendMessageW.USER32(?,00001053), ref: 008F6F7F
                                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 008F6F96
                                                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 008F6FAC
                                                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 008F6FB7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                        • String ID: 0
                                                        • API String ID: 2760611726-4108050209
                                                        • Opcode ID: 22050a1fc0d1ada9c74f4d5a20deb3c84d223a38921816411ea8669dbbdbfe4f
                                                        • Instruction ID: 7c6d6f634aa7d1f58586d4f2f0695ece57dc7a4d60d31d37c71ebcd43f20bdbc
                                                        • Opcode Fuzzy Hash: 22050a1fc0d1ada9c74f4d5a20deb3c84d223a38921816411ea8669dbbdbfe4f
                                                        • Instruction Fuzzy Hash: 5312AB31204209EFDB25DF28D844BB6B7A5FB44310F144269F689DB261DB31ECA2EF91
                                                        APIs
                                                        • DestroyWindow.USER32(00000000), ref: 0092273E
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0092286A
                                                        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 009228A9
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 009228B9
                                                        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00922900
                                                        • GetClientRect.USER32(00000000,?), ref: 0092290C
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00922955
                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00922964
                                                        • GetStockObject.GDI32(00000011), ref: 00922974
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00922978
                                                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00922988
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00922991
                                                        • DeleteDC.GDI32(00000000), ref: 0092299A
                                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 009229C6
                                                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 009229DD
                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00922A1D
                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00922A31
                                                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00922A42
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00922A77
                                                        • GetStockObject.GDI32(00000011), ref: 00922A82
                                                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00922A8D
                                                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00922A97
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                        • API String ID: 2910397461-517079104
                                                        • Opcode ID: 461aa6686ee363137a55a85a9b9bbb1dfeccaec106098a772f1e814dc6b530e3
                                                        • Instruction ID: ec5cceecd998c73bb60afca82fec74b6881d5d72497d6c3fc2fadcf079bd8cf7
                                                        • Opcode Fuzzy Hash: 461aa6686ee363137a55a85a9b9bbb1dfeccaec106098a772f1e814dc6b530e3
                                                        • Instruction Fuzzy Hash: E6B15BB2A14615BFEB14DFA8DC8AEAE7BA9EB48710F004114F915E7290D774ED40DB90
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00914AED
                                                        • GetDriveTypeW.KERNEL32(?,0093CB68,?,\\.\,0093CC08), ref: 00914BCA
                                                        • SetErrorMode.KERNEL32(00000000,0093CB68,?,\\.\,0093CC08), ref: 00914D36
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                        • API String ID: 2907320926-4222207086
                                                        • Opcode ID: 5cac10e149f38c2aa6d5830ae951dc4769f28f0b33916c946472626ef9457b74
                                                        • Instruction ID: e44a8875f1790d76435c4b2e7c1fe7073ccaa849c9d01b8ae49490370c076de8
                                                        • Opcode Fuzzy Hash: 5cac10e149f38c2aa6d5830ae951dc4769f28f0b33916c946472626ef9457b74
                                                        • Instruction Fuzzy Hash: CF61D53070510DDBDB04DF28CA91DEC77A4EB8E744B244415F846AB691DB39ED81DB82
                                                        APIs
                                                        • GetSysColor.USER32(00000012), ref: 00937421
                                                        • SetTextColor.GDI32(?,?), ref: 00937425
                                                        • GetSysColorBrush.USER32(0000000F), ref: 0093743B
                                                        • GetSysColor.USER32(0000000F), ref: 00937446
                                                        • CreateSolidBrush.GDI32(?), ref: 0093744B
                                                        • GetSysColor.USER32(00000011), ref: 00937463
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00937471
                                                        • SelectObject.GDI32(?,00000000), ref: 00937482
                                                        • SetBkColor.GDI32(?,00000000), ref: 0093748B
                                                        • SelectObject.GDI32(?,?), ref: 00937498
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 009374B7
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 009374CE
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 009374DB
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0093752A
                                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00937554
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00937572
                                                        • DrawFocusRect.USER32(?,?), ref: 0093757D
                                                        • GetSysColor.USER32(00000011), ref: 0093758E
                                                        • SetTextColor.GDI32(?,00000000), ref: 00937596
                                                        • DrawTextW.USER32(?,009370F5,000000FF,?,00000000), ref: 009375A8
                                                        • SelectObject.GDI32(?,?), ref: 009375BF
                                                        • DeleteObject.GDI32(?), ref: 009375CA
                                                        • SelectObject.GDI32(?,?), ref: 009375D0
                                                        • DeleteObject.GDI32(?), ref: 009375D5
                                                        • SetTextColor.GDI32(?,?), ref: 009375DB
                                                        • SetBkColor.GDI32(?,?), ref: 009375E5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 1996641542-0
                                                        • Opcode ID: 94cd6e51b197c7077265cef95419eebd2e5e8f954a461e515d81411902f1020b
                                                        • Instruction ID: e30b89be0ff08f7129d8fd2da042c385939550bbd85d7b35de08bf4ee09b3bf4
                                                        • Opcode Fuzzy Hash: 94cd6e51b197c7077265cef95419eebd2e5e8f954a461e515d81411902f1020b
                                                        • Instruction Fuzzy Hash: E66171B2908618AFDF119FA4DC49EEEBFB9EB08320F104115F911BB2A1D7759940EF90
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00931128
                                                        • GetDesktopWindow.USER32 ref: 0093113D
                                                        • GetWindowRect.USER32(00000000), ref: 00931144
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00931199
                                                        • DestroyWindow.USER32(?), ref: 009311B9
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 009311ED
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0093120B
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0093121D
                                                        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00931232
                                                        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00931245
                                                        • IsWindowVisible.USER32(00000000), ref: 009312A1
                                                        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 009312BC
                                                        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 009312D0
                                                        • GetWindowRect.USER32(00000000,?), ref: 009312E8
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 0093130E
                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 00931328
                                                        • CopyRect.USER32(?,?), ref: 0093133F
                                                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 009313AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                        • String ID: ($0$tooltips_class32
                                                        • API String ID: 698492251-4156429822
                                                        • Opcode ID: 5aea8d454089be8a725d55cd945d1357f211071abeb2d063885a4009ea62de0b
                                                        • Instruction ID: 00a4642bc7e5f54610e47bc82f8e75252fc7fff7e57037cbe56931e3322e68ff
                                                        • Opcode Fuzzy Hash: 5aea8d454089be8a725d55cd945d1357f211071abeb2d063885a4009ea62de0b
                                                        • Instruction Fuzzy Hash: FFB18C71608341AFD704DF68C885B6BBBE5FF85354F008918F999AB2A1CB71E845CF92
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 009302E5
                                                        • _wcslen.LIBCMT ref: 0093031F
                                                        • _wcslen.LIBCMT ref: 00930389
                                                        • _wcslen.LIBCMT ref: 009303F1
                                                        • _wcslen.LIBCMT ref: 00930475
                                                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 009304C5
                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00930504
                                                          • Part of subcall function 008BF9F2: _wcslen.LIBCMT ref: 008BF9FD
                                                          • Part of subcall function 0090223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00902258
                                                          • Part of subcall function 0090223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0090228A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$MessageSend$BuffCharUpper
                                                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                        • API String ID: 1103490817-719923060
                                                        • Opcode ID: 51595c77ca3ef31562d101273d505990fa2151f3aea630ca35f05a21c65bad83
                                                        • Instruction ID: ca638bf3ac7c645996fc437d87b654ee223b443b21b3e980145a5de4f3e9eb4d
                                                        • Opcode Fuzzy Hash: 51595c77ca3ef31562d101273d505990fa2151f3aea630ca35f05a21c65bad83
                                                        • Instruction Fuzzy Hash: 9CE18C312182018FC714DF28C96196AB7E6FFC8718F144A6CF8969B7A6DB34ED45CB42
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 008B8968
                                                        • GetSystemMetrics.USER32(00000007), ref: 008B8970
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 008B899B
                                                        • GetSystemMetrics.USER32(00000008), ref: 008B89A3
                                                        • GetSystemMetrics.USER32(00000004), ref: 008B89C8
                                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 008B89E5
                                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 008B89F5
                                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 008B8A28
                                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 008B8A3C
                                                        • GetClientRect.USER32(00000000,000000FF), ref: 008B8A5A
                                                        • GetStockObject.GDI32(00000011), ref: 008B8A76
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 008B8A81
                                                          • Part of subcall function 008B912D: GetCursorPos.USER32(?), ref: 008B9141
                                                          • Part of subcall function 008B912D: ScreenToClient.USER32(00000000,?), ref: 008B915E
                                                          • Part of subcall function 008B912D: GetAsyncKeyState.USER32(00000001), ref: 008B9183
                                                          • Part of subcall function 008B912D: GetAsyncKeyState.USER32(00000002), ref: 008B919D
                                                        • SetTimer.USER32(00000000,00000000,00000028,008B90FC), ref: 008B8AA8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                        • String ID: AutoIt v3 GUI
                                                        • API String ID: 1458621304-248962490
                                                        • Opcode ID: d2f34196fba003722dcbeda7e244e2e188a4730d464ca27d9c028b7eebbfddeb
                                                        • Instruction ID: 0f888ec58b1b045ff7d71372c6d336a418081b593a390ff731d6770c960b82c9
                                                        • Opcode Fuzzy Hash: d2f34196fba003722dcbeda7e244e2e188a4730d464ca27d9c028b7eebbfddeb
                                                        • Instruction Fuzzy Hash: 5FB16776A1420AEFDB14DFA8DC85BEA3BB5FB48314F104229FA15E7290DB30A841DF51
                                                        APIs
                                                          • Part of subcall function 009010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00901114
                                                          • Part of subcall function 009010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00900B9B,?,?,?), ref: 00901120
                                                          • Part of subcall function 009010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00900B9B,?,?,?), ref: 0090112F
                                                          • Part of subcall function 009010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00900B9B,?,?,?), ref: 00901136
                                                          • Part of subcall function 009010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0090114D
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00900DF5
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00900E29
                                                        • GetLengthSid.ADVAPI32(?), ref: 00900E40
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00900E7A
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00900E96
                                                        • GetLengthSid.ADVAPI32(?), ref: 00900EAD
                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00900EB5
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00900EBC
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00900EDD
                                                        • CopySid.ADVAPI32(00000000), ref: 00900EE4
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00900F13
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00900F35
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00900F47
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00900F6E
                                                        • HeapFree.KERNEL32(00000000), ref: 00900F75
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00900F7E
                                                        • HeapFree.KERNEL32(00000000), ref: 00900F85
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00900F8E
                                                        • HeapFree.KERNEL32(00000000), ref: 00900F95
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00900FA1
                                                        • HeapFree.KERNEL32(00000000), ref: 00900FA8
                                                          • Part of subcall function 00901193: GetProcessHeap.KERNEL32(00000008,00900BB1,?,00000000,?,00900BB1,?), ref: 009011A1
                                                          • Part of subcall function 00901193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00900BB1,?), ref: 009011A8
                                                          • Part of subcall function 00901193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00900BB1,?), ref: 009011B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                        • String ID:
                                                        • API String ID: 4175595110-0
                                                        • Opcode ID: c7c863218c1a074f995901dedfc3a5dbd6c5c39da408e3b6fda8dc116e40e049
                                                        • Instruction ID: 3dd376c00256fdd3b2acc2fe3af4fbce4d35e4b62b662d6601ecb9a4f86afd99
                                                        • Opcode Fuzzy Hash: c7c863218c1a074f995901dedfc3a5dbd6c5c39da408e3b6fda8dc116e40e049
                                                        • Instruction Fuzzy Hash: 9B7159B290820AAFDF209FA4DC48BAEBBBCBF45301F044115FA59F6191D7319A05EF60
                                                        APIs
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0092C4BD
                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,0093CC08,00000000,?,00000000,?,?), ref: 0092C544
                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0092C5A4
                                                        • _wcslen.LIBCMT ref: 0092C5F4
                                                        • _wcslen.LIBCMT ref: 0092C66F
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0092C6B2
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0092C7C1
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0092C84D
                                                        • RegCloseKey.ADVAPI32(?), ref: 0092C881
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0092C88E
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0092C960
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                        • API String ID: 9721498-966354055
                                                        • Opcode ID: 094b9063869196fbcec4a0ebf6fa39b360214cf79100d13a95b7a0ba15a30da0
                                                        • Instruction ID: df3fb83cb430834bed678d40121ef85580dd908cc2319260b4342a3cd2e944f8
                                                        • Opcode Fuzzy Hash: 094b9063869196fbcec4a0ebf6fa39b360214cf79100d13a95b7a0ba15a30da0
                                                        • Instruction Fuzzy Hash: 21125A756082119FDB14DF18D891E2AB7E5FF89714F04885CF88A9B7A2DB31ED41CB82
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 009309C6
                                                        • _wcslen.LIBCMT ref: 00930A01
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00930A54
                                                        • _wcslen.LIBCMT ref: 00930A8A
                                                        • _wcslen.LIBCMT ref: 00930B06
                                                        • _wcslen.LIBCMT ref: 00930B81
                                                          • Part of subcall function 008BF9F2: _wcslen.LIBCMT ref: 008BF9FD
                                                          • Part of subcall function 00902BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00902BFA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$MessageSend$BuffCharUpper
                                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                        • API String ID: 1103490817-4258414348
                                                        • Opcode ID: bf5403bc6e4dc617dd66289b45916612c78e1695d51adac6467e1c54ec1f1f19
                                                        • Instruction ID: cdd4cfbd8470661339009c41c90b49b083df41faeece7a19314fec31a01c698c
                                                        • Opcode Fuzzy Hash: bf5403bc6e4dc617dd66289b45916612c78e1695d51adac6467e1c54ec1f1f19
                                                        • Instruction Fuzzy Hash: 9AE156356083018FCB14EF28C46092AB7E5FFD9718F14895DE8969B7A2DB31ED45CB82
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                        • API String ID: 1256254125-909552448
                                                        • Opcode ID: 039462f4004bef992723a5cf04efb21b58dec7cd5e0e0461632bc201d60e9c5c
                                                        • Instruction ID: 33f4ab134833aeb4126e849adebd86e8cafdee813f225e605db751aef8d93823
                                                        • Opcode Fuzzy Hash: 039462f4004bef992723a5cf04efb21b58dec7cd5e0e0461632bc201d60e9c5c
                                                        • Instruction Fuzzy Hash: 797115B260053A8BCB20DE7CED516BF33A9AF61754F250528F856E728CE635DD84C3A1
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 0093835A
                                                        • _wcslen.LIBCMT ref: 0093836E
                                                        • _wcslen.LIBCMT ref: 00938391
                                                        • _wcslen.LIBCMT ref: 009383B4
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 009383F2
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00935BF2), ref: 0093844E
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00938487
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 009384CA
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00938501
                                                        • FreeLibrary.KERNEL32(?), ref: 0093850D
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0093851D
                                                        • DestroyIcon.USER32(?,?,?,?,?,00935BF2), ref: 0093852C
                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00938549
                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00938555
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                        • String ID: .dll$.exe$.icl
                                                        • API String ID: 799131459-1154884017
                                                        • Opcode ID: 344df7fe338b6db3f151e1b8f8653754ff42703140c1eccdb4faba411472ca6c
                                                        • Instruction ID: 8da9505db9c64579282d4501731cbd192979de08074d1215a6aae374a6463f48
                                                        • Opcode Fuzzy Hash: 344df7fe338b6db3f151e1b8f8653754ff42703140c1eccdb4faba411472ca6c
                                                        • Instruction Fuzzy Hash: 9E61CDB2904715BAEB149F64CC85BBF77ACFB08B11F104609F815E61E1DB74A984DBA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 0-1645009161
                                                        • Opcode ID: 67735025186bad454d63b52689f9f8f355bf10494e956e201b762be280dd98ab
                                                        • Instruction ID: 3581d10c6bcf3b941eec1746a4139494a53610c4fdc2c9be4b771771ec94685f
                                                        • Opcode Fuzzy Hash: 67735025186bad454d63b52689f9f8f355bf10494e956e201b762be280dd98ab
                                                        • Instruction Fuzzy Hash: 2481F671A44605BBEB20AF65DC42FAF37B8FF56304F044024F905EA592EB70DA11E7A2
                                                        APIs
                                                        • LoadIconW.USER32(00000063), ref: 00905A2E
                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00905A40
                                                        • SetWindowTextW.USER32(?,?), ref: 00905A57
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00905A6C
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00905A72
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00905A82
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00905A88
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00905AA9
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00905AC3
                                                        • GetWindowRect.USER32(?,?), ref: 00905ACC
                                                        • _wcslen.LIBCMT ref: 00905B33
                                                        • SetWindowTextW.USER32(?,?), ref: 00905B6F
                                                        • GetDesktopWindow.USER32 ref: 00905B75
                                                        • GetWindowRect.USER32(00000000), ref: 00905B7C
                                                        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00905BD3
                                                        • GetClientRect.USER32(?,?), ref: 00905BE0
                                                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 00905C05
                                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00905C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                        • String ID:
                                                        • API String ID: 895679908-0
                                                        • Opcode ID: 191985f0f05c579e751c54f7cec22c32b62cd7a8d1490c8a5a9ee4a56b801ef4
                                                        • Instruction ID: ca82b88b39cdc57ed4caa71a813711121edc8be37b4f45c0bbe9a310a6d047f9
                                                        • Opcode Fuzzy Hash: 191985f0f05c579e751c54f7cec22c32b62cd7a8d1490c8a5a9ee4a56b801ef4
                                                        • Instruction Fuzzy Hash: 7D714C71900B09AFDB20DFA8CE86A6FBBF9FF48704F114918E582A25A0D775E944DF50
                                                        APIs
                                                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 008C00C6
                                                          • Part of subcall function 008C00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0097070C,00000FA0,31F2803C,?,?,?,?,008E23B3,000000FF), ref: 008C011C
                                                          • Part of subcall function 008C00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,008E23B3,000000FF), ref: 008C0127
                                                          • Part of subcall function 008C00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,008E23B3,000000FF), ref: 008C0138
                                                          • Part of subcall function 008C00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 008C014E
                                                          • Part of subcall function 008C00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 008C015C
                                                          • Part of subcall function 008C00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 008C016A
                                                          • Part of subcall function 008C00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008C0195
                                                          • Part of subcall function 008C00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008C01A0
                                                        • ___scrt_fastfail.LIBCMT ref: 008C00E7
                                                          • Part of subcall function 008C00A3: __onexit.LIBCMT ref: 008C00A9
                                                        Strings
                                                        • kernel32.dll, xrefs: 008C0133
                                                        • SleepConditionVariableCS, xrefs: 008C0154
                                                        • WakeAllConditionVariable, xrefs: 008C0162
                                                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 008C0122
                                                        • InitializeConditionVariable, xrefs: 008C0148
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                        • API String ID: 66158676-1714406822
                                                        • Opcode ID: d44b689a817eb958263607dc5ac06c9f089b37bee00871697b5f27ce2ad0ed03
                                                        • Instruction ID: 14da982dc87a75ac3ce5ea750152059ec8e6903e70d547cfd0de265ddc43e462
                                                        • Opcode Fuzzy Hash: d44b689a817eb958263607dc5ac06c9f089b37bee00871697b5f27ce2ad0ed03
                                                        • Instruction Fuzzy Hash: 6B212572A1CB00EBD7105BA4AC09F6A73B4FB84B94F04412EF815E6291DBB0D8009E91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                        • API String ID: 176396367-1603158881
                                                        • Opcode ID: b48741d94e366c576890d92ffcb355c26d3efdce9fa799a66798af1562cffa71
                                                        • Instruction ID: 10485af5f4885f7364a5942e46447dcfcb04b0f88cef54bac9e0f71d442b8800
                                                        • Opcode Fuzzy Hash: b48741d94e366c576890d92ffcb355c26d3efdce9fa799a66798af1562cffa71
                                                        • Instruction Fuzzy Hash: 16E1D432A00616AECB289F78C851BEDBBBCFF44710F54C529E456E7290DB30AE858790
                                                        APIs
                                                        • CharLowerBuffW.USER32(00000000,00000000,0093CC08), ref: 00914527
                                                        • _wcslen.LIBCMT ref: 0091453B
                                                        • _wcslen.LIBCMT ref: 00914599
                                                        • _wcslen.LIBCMT ref: 009145F4
                                                        • _wcslen.LIBCMT ref: 0091463F
                                                        • _wcslen.LIBCMT ref: 009146A7
                                                          • Part of subcall function 008BF9F2: _wcslen.LIBCMT ref: 008BF9FD
                                                        • GetDriveTypeW.KERNEL32(?,00966BF0,00000061), ref: 00914743
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharDriveLowerType
                                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                        • API String ID: 2055661098-1000479233
                                                        • Opcode ID: 3c8d463bdd67ea36d6895b7aa600b784d7898af7eab63459913c0e1ac24a5a98
                                                        • Instruction ID: 3cbc0f1b4c196c882a4904ec3dc3fcdfb525d7585a747fd0b0029df266250395
                                                        • Opcode Fuzzy Hash: 3c8d463bdd67ea36d6895b7aa600b784d7898af7eab63459913c0e1ac24a5a98
                                                        • Instruction Fuzzy Hash: 71B1E2717083069FC710DF28C890AAAB7E9FFAA764F50492DF496C7291D730D984CB92
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 0092B198
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0092B1B0
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0092B1D4
                                                        • _wcslen.LIBCMT ref: 0092B200
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0092B214
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0092B236
                                                        • _wcslen.LIBCMT ref: 0092B332
                                                          • Part of subcall function 009105A7: GetStdHandle.KERNEL32(000000F6), ref: 009105C6
                                                        • _wcslen.LIBCMT ref: 0092B34B
                                                        • _wcslen.LIBCMT ref: 0092B366
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0092B3B6
                                                        • GetLastError.KERNEL32(00000000), ref: 0092B407
                                                        • CloseHandle.KERNEL32(?), ref: 0092B439
                                                        • CloseHandle.KERNEL32(00000000), ref: 0092B44A
                                                        • CloseHandle.KERNEL32(00000000), ref: 0092B45C
                                                        • CloseHandle.KERNEL32(00000000), ref: 0092B46E
                                                        • CloseHandle.KERNEL32(?), ref: 0092B4E3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 2178637699-0
                                                        • Opcode ID: 256c46ea5fe1658e8e0421fe3fb161373fc46c31d6b73266939e61cc59ea9f9e
                                                        • Instruction ID: 909ec3930dc56f7c57484b8b8358167d0e66c939e94a4d1ed047659cf2ad1540
                                                        • Opcode Fuzzy Hash: 256c46ea5fe1658e8e0421fe3fb161373fc46c31d6b73266939e61cc59ea9f9e
                                                        • Instruction Fuzzy Hash: FEF188316083109FD714EF28D891B6ABBE5FF85310F18895DF8999B2A6DB31EC44CB52
                                                        APIs
                                                        • GetMenuItemCount.USER32(00971990), ref: 008E2F8D
                                                        • GetMenuItemCount.USER32(00971990), ref: 008E303D
                                                        • GetCursorPos.USER32(?), ref: 008E3081
                                                        • SetForegroundWindow.USER32(00000000), ref: 008E308A
                                                        • TrackPopupMenuEx.USER32(00971990,00000000,?,00000000,00000000,00000000), ref: 008E309D
                                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 008E30A9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                        • String ID: 0
                                                        • API String ID: 36266755-4108050209
                                                        • Opcode ID: 5c9feba1b0c8a4d3a27c70087de48dd476df256cfb7d9c4f0b85a611b0ef509a
                                                        • Instruction ID: 96f8477d8c53f2ce27328181a8b2261dba6b50d36a21cc8f203acfe1b6c09ba6
                                                        • Opcode Fuzzy Hash: 5c9feba1b0c8a4d3a27c70087de48dd476df256cfb7d9c4f0b85a611b0ef509a
                                                        • Instruction Fuzzy Hash: B3710771644255BEFB218F69CC49FAABF68FF06324F204216F514EA1E0CBB1AD50DB50
                                                        APIs
                                                        • DestroyWindow.USER32(?,?), ref: 00936DEB
                                                          • Part of subcall function 008A6B57: _wcslen.LIBCMT ref: 008A6B6A
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00936E5F
                                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00936E81
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00936E94
                                                        • DestroyWindow.USER32(?), ref: 00936EB5
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,008A0000,00000000), ref: 00936EE4
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00936EFD
                                                        • GetDesktopWindow.USER32 ref: 00936F16
                                                        • GetWindowRect.USER32(00000000), ref: 00936F1D
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00936F35
                                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00936F4D
                                                          • Part of subcall function 008B9944: GetWindowLongW.USER32(?,000000EB), ref: 008B9952
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                        • String ID: 0$tooltips_class32
                                                        • API String ID: 2429346358-3619404913
                                                        • Opcode ID: 294434ad6a92d63bd098daefd5468547977870124fc6d799380dc0c90c118d54
                                                        • Instruction ID: f6cc8144ad9637c7ce7269c8a21301f744f81345e6741937fa9ad431adcf2857
                                                        • Opcode Fuzzy Hash: 294434ad6a92d63bd098daefd5468547977870124fc6d799380dc0c90c118d54
                                                        • Instruction Fuzzy Hash: DD717975108641AFDB21CF18DC44FAABBF9FB89304F04481DFA9997261C770A95ADF22
                                                        APIs
                                                          • Part of subcall function 008B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 008B9BB2
                                                        • DragQueryPoint.SHELL32(?,?), ref: 00939147
                                                          • Part of subcall function 00937674: ClientToScreen.USER32(?,?), ref: 0093769A
                                                          • Part of subcall function 00937674: GetWindowRect.USER32(?,?), ref: 00937710
                                                          • Part of subcall function 00937674: PtInRect.USER32(?,?,00938B89), ref: 00937720
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 009391B0
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 009391BB
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 009391DE
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00939225
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0093923E
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00939255
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00939277
                                                        • DragFinish.SHELL32(?), ref: 0093927E
                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00939371
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                        • API String ID: 221274066-3440237614
                                                        • Opcode ID: 158a5b1e7414c3cf57de103fb20bec0d7a0374ff60039b740d2a2397d26fef1b
                                                        • Instruction ID: de8e7d52d05d5a3d55321b3e0270b0f1167d50c95cb6b9ed86dc2a02182d84ce
                                                        • Opcode Fuzzy Hash: 158a5b1e7414c3cf57de103fb20bec0d7a0374ff60039b740d2a2397d26fef1b
                                                        • Instruction Fuzzy Hash: E5618972108701AFD701EF64DC85EAFBBE9FF89750F00092EF595922A0DB709A49CB52
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0091C4B0
                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0091C4C3
                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0091C4D7
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0091C4F0
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0091C533
                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0091C549
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0091C554
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0091C584
                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0091C5DC
                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0091C5F0
                                                        • InternetCloseHandle.WININET(00000000), ref: 0091C5FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                        • String ID:
                                                        • API String ID: 3800310941-3916222277
                                                        • Opcode ID: c4aef8cdb775d7bea9aaaacfd20271a87cd6e6e1c15bbed737670ba0489f16fa
                                                        • Instruction ID: 0a4d7a8f4d5104867f397daaa53c810d6b20607244b6487f0866486aed2d18c9
                                                        • Opcode Fuzzy Hash: c4aef8cdb775d7bea9aaaacfd20271a87cd6e6e1c15bbed737670ba0489f16fa
                                                        • Instruction Fuzzy Hash: AB513AF1644609BFEB218F64C988ABB7BBDFB08754F004419F946A6250DB34E984AF61
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00938592
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 009385A2
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 009385AD
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 009385BA
                                                        • GlobalLock.KERNEL32(00000000), ref: 009385C8
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 009385D7
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 009385E0
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 009385E7
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 009385F8
                                                        • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0093FC38,?), ref: 00938611
                                                        • GlobalFree.KERNEL32(00000000), ref: 00938621
                                                        • GetObjectW.GDI32(?,00000018,?), ref: 00938641
                                                        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00938671
                                                        • DeleteObject.GDI32(?), ref: 00938699
                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 009386AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID:
                                                        • API String ID: 3840717409-0
                                                        • Opcode ID: 1be5b2c367ad4cc9eb8f94e3dd4a1dc578568e56900f9a8e0ef5775d8638901f
                                                        • Instruction ID: 534f83bafaaeb773e3ced6f8d37d8b8da304c8b1f9d0529e08d2b0c19ff195f9
                                                        • Opcode Fuzzy Hash: 1be5b2c367ad4cc9eb8f94e3dd4a1dc578568e56900f9a8e0ef5775d8638901f
                                                        • Instruction Fuzzy Hash: EB4107B5614608AFDB119FA5CC89EAB7BBCEF89B15F108058F915E7260DB309D01EF60
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000000), ref: 00911502
                                                        • VariantCopy.OLEAUT32(?,?), ref: 0091150B
                                                        • VariantClear.OLEAUT32(?), ref: 00911517
                                                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 009115FB
                                                        • VarR8FromDec.OLEAUT32(?,?), ref: 00911657
                                                        • VariantInit.OLEAUT32(?), ref: 00911708
                                                        • SysFreeString.OLEAUT32(?), ref: 0091178C
                                                        • VariantClear.OLEAUT32(?), ref: 009117D8
                                                        • VariantClear.OLEAUT32(?), ref: 009117E7
                                                        • VariantInit.OLEAUT32(00000000), ref: 00911823
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                        • API String ID: 1234038744-3931177956
                                                        • Opcode ID: 0323a64382fd16ef2cbd241af1161f7dd8ad360f44fa786015401bcb01401bfd
                                                        • Instruction ID: 146da11885b49d013c3903e90c21bf83469f111dbc0fbcb4dee7f3c098c7e8c3
                                                        • Opcode Fuzzy Hash: 0323a64382fd16ef2cbd241af1161f7dd8ad360f44fa786015401bcb01401bfd
                                                        • Instruction Fuzzy Hash: CAD11E71B00509EBDB109F68D884BF9B7BAFF45700F148456F646AB681DB34EC80DB62
                                                        APIs
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                          • Part of subcall function 0092C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0092B6AE,?,?), ref: 0092C9B5
                                                          • Part of subcall function 0092C998: _wcslen.LIBCMT ref: 0092C9F1
                                                          • Part of subcall function 0092C998: _wcslen.LIBCMT ref: 0092CA68
                                                          • Part of subcall function 0092C998: _wcslen.LIBCMT ref: 0092CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0092B6F4
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0092B772
                                                        • RegDeleteValueW.ADVAPI32(?,?), ref: 0092B80A
                                                        • RegCloseKey.ADVAPI32(?), ref: 0092B87E
                                                        • RegCloseKey.ADVAPI32(?), ref: 0092B89C
                                                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0092B8F2
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0092B904
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0092B922
                                                        • FreeLibrary.KERNEL32(00000000), ref: 0092B983
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0092B994
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 146587525-4033151799
                                                        • Opcode ID: 33e55ca768fe3f788e9a5ada76f1b24578685b0768fb88d1e0372edcb5e190e5
                                                        • Instruction ID: 4a402a72f3a6bc765c6d1ae32532f511b26d0305203506b237bd3d487cfad0d3
                                                        • Opcode Fuzzy Hash: 33e55ca768fe3f788e9a5ada76f1b24578685b0768fb88d1e0372edcb5e190e5
                                                        • Instruction Fuzzy Hash: 80C1AD34208211AFD714DF18D495F2ABBE9FF85308F14845CF5AA8B6A2CB75EC45CB92
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 009225D8
                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 009225E8
                                                        • CreateCompatibleDC.GDI32(?), ref: 009225F4
                                                        • SelectObject.GDI32(00000000,?), ref: 00922601
                                                        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0092266D
                                                        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 009226AC
                                                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 009226D0
                                                        • SelectObject.GDI32(?,?), ref: 009226D8
                                                        • DeleteObject.GDI32(?), ref: 009226E1
                                                        • DeleteDC.GDI32(?), ref: 009226E8
                                                        • ReleaseDC.USER32(00000000,?), ref: 009226F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                        • String ID: (
                                                        • API String ID: 2598888154-3887548279
                                                        • Opcode ID: 36c6416796f2772ec72ee4d964f144096311a447d3bc7b810f2ce66959255714
                                                        • Instruction ID: 519dc6ec42b64c437b727a259b4994711ebe2d59535264a7aa63333dd978311d
                                                        • Opcode Fuzzy Hash: 36c6416796f2772ec72ee4d964f144096311a447d3bc7b810f2ce66959255714
                                                        • Instruction Fuzzy Hash: 9D61F4B6D04219EFCF14CFA4D884EAEBBB5FF48310F20852AE955A7250D774A941DF50
                                                        APIs
                                                        • ___free_lconv_mon.LIBCMT ref: 008DDAA1
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD659
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD66B
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD67D
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD68F
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD6A1
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD6B3
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD6C5
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD6D7
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD6E9
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD6FB
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD70D
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD71F
                                                          • Part of subcall function 008DD63C: _free.LIBCMT ref: 008DD731
                                                        • _free.LIBCMT ref: 008DDA96
                                                          • Part of subcall function 008D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,008DD7D1,00000000,00000000,00000000,00000000,?,008DD7F8,00000000,00000007,00000000,?,008DDBF5,00000000), ref: 008D29DE
                                                          • Part of subcall function 008D29C8: GetLastError.KERNEL32(00000000,?,008DD7D1,00000000,00000000,00000000,00000000,?,008DD7F8,00000000,00000007,00000000,?,008DDBF5,00000000,00000000), ref: 008D29F0
                                                        • _free.LIBCMT ref: 008DDAB8
                                                        • _free.LIBCMT ref: 008DDACD
                                                        • _free.LIBCMT ref: 008DDAD8
                                                        • _free.LIBCMT ref: 008DDAFA
                                                        • _free.LIBCMT ref: 008DDB0D
                                                        • _free.LIBCMT ref: 008DDB1B
                                                        • _free.LIBCMT ref: 008DDB26
                                                        • _free.LIBCMT ref: 008DDB5E
                                                        • _free.LIBCMT ref: 008DDB65
                                                        • _free.LIBCMT ref: 008DDB82
                                                        • _free.LIBCMT ref: 008DDB9A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                        • String ID:
                                                        • API String ID: 161543041-0
                                                        • Opcode ID: 75cfa5b77b74e6ba9facf190ccaf933ccda6d305702d11f85df7d299abfdd41b
                                                        • Instruction ID: 956b6eda7ce11b42b2a34af00b290b339d9841360672aa61d4080f0969076b89
                                                        • Opcode Fuzzy Hash: 75cfa5b77b74e6ba9facf190ccaf933ccda6d305702d11f85df7d299abfdd41b
                                                        • Instruction Fuzzy Hash: 38315A32604704AFEB21BA39E845F6A7BE8FF10324F15861BE449D7391DA30AC409B21
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 0090369C
                                                        • _wcslen.LIBCMT ref: 009036A7
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00903797
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 0090380C
                                                        • GetDlgCtrlID.USER32(?), ref: 0090385D
                                                        • GetWindowRect.USER32(?,?), ref: 00903882
                                                        • GetParent.USER32(?), ref: 009038A0
                                                        • ScreenToClient.USER32(00000000), ref: 009038A7
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00903921
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0090395D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                        • String ID: %s%u
                                                        • API String ID: 4010501982-679674701
                                                        • Opcode ID: 5b0010f0f7c5c2c070a1216840e37a8d582882c1294580c13e1084d8d9b4dfa7
                                                        • Instruction ID: 5c85117ecd63a8b5793d342768cda2374e595d325369d51b0dd0daa9d7eb7dff
                                                        • Opcode Fuzzy Hash: 5b0010f0f7c5c2c070a1216840e37a8d582882c1294580c13e1084d8d9b4dfa7
                                                        • Instruction Fuzzy Hash: 4391AD71204606EFDB19DF24C885FAAB7ADFF44354F00C629F9AAD2191DB30EA45CB91
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00904994
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 009049DA
                                                        • _wcslen.LIBCMT ref: 009049EB
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 009049F7
                                                        • _wcsstr.LIBVCRUNTIME ref: 00904A2C
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00904A64
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00904A9D
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00904AE6
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00904B20
                                                        • GetWindowRect.USER32(?,?), ref: 00904B8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                        • String ID: ThumbnailClass
                                                        • API String ID: 1311036022-1241985126
                                                        • Opcode ID: 35cad474bce014a90cfbaf4f6a6779e60011b1f114bf8944f9d986b349dce19f
                                                        • Instruction ID: d77d67a204917e73bfc325f940236f2c6d0231cffbe7f21c6cba3e1658f372e3
                                                        • Opcode Fuzzy Hash: 35cad474bce014a90cfbaf4f6a6779e60011b1f114bf8944f9d986b349dce19f
                                                        • Instruction Fuzzy Hash: 0E919AB21082069FDB04DF14C985BAA77ECFF84754F048469FE859A0D6EB34ED45CBA2
                                                        APIs
                                                          • Part of subcall function 008B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 008B9BB2
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00938D5A
                                                        • GetFocus.USER32 ref: 00938D6A
                                                        • GetDlgCtrlID.USER32(00000000), ref: 00938D75
                                                        • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00938E1D
                                                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00938ECF
                                                        • GetMenuItemCount.USER32(?), ref: 00938EEC
                                                        • GetMenuItemID.USER32(?,00000000), ref: 00938EFC
                                                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00938F2E
                                                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00938F70
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00938FA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                        • String ID: 0
                                                        • API String ID: 1026556194-4108050209
                                                        • Opcode ID: 8368ac73a0c3d54dacd5a716562fb8f9be2a42d9dd3869c3a96381754c480ec6
                                                        • Instruction ID: 7f00be1c8deb0d117e5fc8e792c9322ea319957661d0c69aad69724ca9e41003
                                                        • Opcode Fuzzy Hash: 8368ac73a0c3d54dacd5a716562fb8f9be2a42d9dd3869c3a96381754c480ec6
                                                        • Instruction Fuzzy Hash: 04818EB1508301AFD720DF24D884AABBBE9FB88754F140919F995E7291DB70D901DFA2
                                                        APIs
                                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0090DC20
                                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0090DC46
                                                        • _wcslen.LIBCMT ref: 0090DC50
                                                        • _wcsstr.LIBVCRUNTIME ref: 0090DCA0
                                                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0090DCBC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                        • API String ID: 1939486746-1459072770
                                                        • Opcode ID: ab57d4fa9e16b7f8155355aca85ac7e599fbb361c955e12f868751428a73f929
                                                        • Instruction ID: dfc6e6d7799a4ff6bb0c86ff6ee6dcc166c10f92dc2fa2aba9388c3cfe0325bf
                                                        • Opcode Fuzzy Hash: ab57d4fa9e16b7f8155355aca85ac7e599fbb361c955e12f868751428a73f929
                                                        • Instruction Fuzzy Hash: 0341D0729406107AEB14A7B89C47EBF77BCFF42710F100069F904E61D2EB74DA019BA6
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0092CC64
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0092CC8D
                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0092CD48
                                                          • Part of subcall function 0092CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0092CCAA
                                                          • Part of subcall function 0092CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0092CCBD
                                                          • Part of subcall function 0092CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0092CCCF
                                                          • Part of subcall function 0092CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0092CD05
                                                          • Part of subcall function 0092CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0092CD28
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0092CCF3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 2734957052-4033151799
                                                        • Opcode ID: 3737f45b6dd125fda126188a5e4f7c8c9328b6e176c2c575124c0f90a1ee4e4d
                                                        • Instruction ID: af037e54b0ec7b8934dd655184e080fee3535f2af60d0832b410ab7fb6ab3f4c
                                                        • Opcode Fuzzy Hash: 3737f45b6dd125fda126188a5e4f7c8c9328b6e176c2c575124c0f90a1ee4e4d
                                                        • Instruction Fuzzy Hash: 1B3180B5901128BBDB208BA1EC88EFFBB7CEF46740F000565A905E3244D7749E45EBA0
                                                        APIs
                                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00913D40
                                                        • _wcslen.LIBCMT ref: 00913D6D
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00913D9D
                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00913DBE
                                                        • RemoveDirectoryW.KERNEL32(?), ref: 00913DCE
                                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00913E55
                                                        • CloseHandle.KERNEL32(00000000), ref: 00913E60
                                                        • CloseHandle.KERNEL32(00000000), ref: 00913E6B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                        • String ID: :$\$\??\%s
                                                        • API String ID: 1149970189-3457252023
                                                        • Opcode ID: 4bf48a7991737fda6308311429bfa95b7c39fd5bf141245e73b432cf1026ea1d
                                                        • Instruction ID: 0217d208eb06474656609c12a9a436427b03519756548a55dcd3c4c8e37db77a
                                                        • Opcode Fuzzy Hash: 4bf48a7991737fda6308311429bfa95b7c39fd5bf141245e73b432cf1026ea1d
                                                        • Instruction Fuzzy Hash: 1F31B6B56142096BDB219BA4DC49FEF37BCEF88700F1040B5F515E61A0E774D7849B64
                                                        APIs
                                                        • timeGetTime.WINMM ref: 0090E6B4
                                                          • Part of subcall function 008BE551: timeGetTime.WINMM(?,?,0090E6D4), ref: 008BE555
                                                        • Sleep.KERNEL32(0000000A), ref: 0090E6E1
                                                        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0090E705
                                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0090E727
                                                        • SetActiveWindow.USER32 ref: 0090E746
                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0090E754
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 0090E773
                                                        • Sleep.KERNEL32(000000FA), ref: 0090E77E
                                                        • IsWindow.USER32 ref: 0090E78A
                                                        • EndDialog.USER32(00000000), ref: 0090E79B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                        • String ID: BUTTON
                                                        • API String ID: 1194449130-3405671355
                                                        • Opcode ID: c6f39074438f6a18e4774491d0e3024e7ba568fc5712544757b731a6b33944ab
                                                        • Instruction ID: 7882713e8296bfb4a0345480d066077a20568b27ad25d00f12778cc016592a2d
                                                        • Opcode Fuzzy Hash: c6f39074438f6a18e4774491d0e3024e7ba568fc5712544757b731a6b33944ab
                                                        • Instruction Fuzzy Hash: 8A2181B222C605AFEB006F64EC89B293B6DF79474DF144826F50A911E1DB72AC40BF24
                                                        APIs
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0090EA5D
                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0090EA73
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0090EA84
                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0090EA96
                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0090EAA7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: SendString$_wcslen
                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                        • API String ID: 2420728520-1007645807
                                                        • Opcode ID: 4d60af869d04a6d62924c0b241efb6432306c758dfe15611d97df0a9cd30f1a2
                                                        • Instruction ID: 73a4f74c266028f08e106073169a83058a522b211ca74b0d1644cbc9ae15fcfd
                                                        • Opcode Fuzzy Hash: 4d60af869d04a6d62924c0b241efb6432306c758dfe15611d97df0a9cd30f1a2
                                                        • Instruction Fuzzy Hash: 50117331A502197DE720A7A5DC4ADFF6A7CFBD6B44F040829B801E20D1EFB00945C9B1
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000001), ref: 00905CE2
                                                        • GetWindowRect.USER32(00000000,?), ref: 00905CFB
                                                        • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00905D59
                                                        • GetDlgItem.USER32(?,00000002), ref: 00905D69
                                                        • GetWindowRect.USER32(00000000,?), ref: 00905D7B
                                                        • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00905DCF
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00905DDD
                                                        • GetWindowRect.USER32(00000000,?), ref: 00905DEF
                                                        • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00905E31
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00905E44
                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00905E5A
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00905E67
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                        • String ID:
                                                        • API String ID: 3096461208-0
                                                        • Opcode ID: 2dfd4c04d42fd619c960429d997cf7b32a2c7dbf017bd77ced2a4b043af9291b
                                                        • Instruction ID: dc650c7010dd082dab7295fe7bf543a8516933e44b471418b2027eb25db6b88f
                                                        • Opcode Fuzzy Hash: 2dfd4c04d42fd619c960429d997cf7b32a2c7dbf017bd77ced2a4b043af9291b
                                                        • Instruction Fuzzy Hash: 5F51FDB1A10615AFDF18CF68DD89AAEBBB9FB48700F158129F916E62D0D7709E04CF50
                                                        APIs
                                                          • Part of subcall function 008B8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,008B8BE8,?,00000000,?,?,?,?,008B8BBA,00000000,?), ref: 008B8FC5
                                                        • DestroyWindow.USER32(?), ref: 008B8C81
                                                        • KillTimer.USER32(00000000,?,?,?,?,008B8BBA,00000000,?), ref: 008B8D1B
                                                        • DestroyAcceleratorTable.USER32(00000000), ref: 008F6973
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,008B8BBA,00000000,?), ref: 008F69A1
                                                        • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,008B8BBA,00000000,?), ref: 008F69B8
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,008B8BBA,00000000), ref: 008F69D4
                                                        • DeleteObject.GDI32(00000000), ref: 008F69E6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                        • String ID:
                                                        • API String ID: 641708696-0
                                                        • Opcode ID: c432c2c06e08384fcbcf227aeec07097c5980f06bbbe8333f4aa9ccee3b6664c
                                                        • Instruction ID: 3d41b9f383faa68399531c778640cefd5a9af06649eb62c5a52c163d86075b89
                                                        • Opcode Fuzzy Hash: c432c2c06e08384fcbcf227aeec07097c5980f06bbbe8333f4aa9ccee3b6664c
                                                        • Instruction Fuzzy Hash: B561EC72116A09DFCB258F28D958BBA7BF5FB00316F144618E146EB660CB71ACD1EF90
                                                        APIs
                                                          • Part of subcall function 008B9944: GetWindowLongW.USER32(?,000000EB), ref: 008B9952
                                                        • GetSysColor.USER32(0000000F), ref: 008B9862
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ColorLongWindow
                                                        • String ID:
                                                        • API String ID: 259745315-0
                                                        • Opcode ID: 06ff1cf0f13a5fb0e88ca1a9788441e0a5b1a199bf7e4b7f7fb644428f207a69
                                                        • Instruction ID: bba9b7bed88d576dfc5fd39b204a008a1d83eff4a9da46e47ccd5da6cea84e49
                                                        • Opcode Fuzzy Hash: 06ff1cf0f13a5fb0e88ca1a9788441e0a5b1a199bf7e4b7f7fb644428f207a69
                                                        • Instruction Fuzzy Hash: 63417F71108A44AFDB215F789C84BBA3BB5FB06330F144669FAE2D72E1D7319842EB11
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,008EF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00909717
                                                        • LoadStringW.USER32(00000000,?,008EF7F8,00000001), ref: 00909720
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,008EF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00909742
                                                        • LoadStringW.USER32(00000000,?,008EF7F8,00000001), ref: 00909745
                                                        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00909866
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                        • API String ID: 747408836-2268648507
                                                        • Opcode ID: 5acd1c834974106b4dcea91f80a649179ff88b3e12bec5bcc86253bbef74deff
                                                        • Instruction ID: 636924c67e79d62ec86b8f46e334e37ca0dfea2dcb06fbd1da258c99027db8ec
                                                        • Opcode Fuzzy Hash: 5acd1c834974106b4dcea91f80a649179ff88b3e12bec5bcc86253bbef74deff
                                                        • Instruction Fuzzy Hash: 6B413B72804219AADF04EBE4DD46EEE7778EF56340F504025F605B2192EB356F48CB62
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00923C5C
                                                        • CoInitialize.OLE32(00000000), ref: 00923C8A
                                                        • CoUninitialize.OLE32 ref: 00923C94
                                                        • _wcslen.LIBCMT ref: 00923D2D
                                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00923DB1
                                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00923ED5
                                                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00923F0E
                                                        • CoGetObject.OLE32(?,00000000,0093FB98,?), ref: 00923F2D
                                                        • SetErrorMode.KERNEL32(00000000), ref: 00923F40
                                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00923FC4
                                                        • VariantClear.OLEAUT32(?), ref: 00923FD8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                        • String ID:
                                                        • API String ID: 429561992-0
                                                        • Opcode ID: fb73a69ccf90fe4781b66c32ccc076802408908ccb54df7c283220f1f6005f44
                                                        • Instruction ID: a57a3899fb026de6766cf2b1d3d45d7fb9586917c869e81a938b86f5798f79c4
                                                        • Opcode Fuzzy Hash: fb73a69ccf90fe4781b66c32ccc076802408908ccb54df7c283220f1f6005f44
                                                        • Instruction Fuzzy Hash: 56C143B1608315AFD700DF68D88492BBBE9FF89744F10891DF98A9B261D734EE05CB52
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00917AF3
                                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00917B8F
                                                        • SHGetDesktopFolder.SHELL32(?), ref: 00917BA3
                                                        • CoCreateInstance.OLE32(0093FD08,00000000,00000001,00966E6C,?), ref: 00917BEF
                                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00917C74
                                                        • CoTaskMemFree.OLE32(?,?), ref: 00917CCC
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00917D57
                                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00917D7A
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00917D81
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00917DD6
                                                        • CoUninitialize.OLE32 ref: 00917DDC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                        • String ID:
                                                        • API String ID: 2762341140-0
                                                        • Opcode ID: 4fddf9abcf251a7faea529abff20eb5fd86c75356fc5de351ccbd314cccf81a2
                                                        • Instruction ID: 481cbb194897823dff37477cc6f6226cf499bfeb3a75a809d753c52bd3c5f435
                                                        • Opcode Fuzzy Hash: 4fddf9abcf251a7faea529abff20eb5fd86c75356fc5de351ccbd314cccf81a2
                                                        • Instruction Fuzzy Hash: D1C10A75A04109AFDB14DFA4C884DAEBBF9FF48314B148499E916EB761D730EE81CB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00935504
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00935515
                                                        • CharNextW.USER32(00000158), ref: 00935544
                                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00935585
                                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0093559B
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 009355AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CharNext
                                                        • String ID:
                                                        • API String ID: 1350042424-0
                                                        • Opcode ID: b4e6dec5b9c5773f46958170756e37aad8f2773460858410fd6128256d90e583
                                                        • Instruction ID: fef0510a668a1a8b7081cb511a9fc1ed0b36e104cdd8ffae3daa965ce3c35b93
                                                        • Opcode Fuzzy Hash: b4e6dec5b9c5773f46958170756e37aad8f2773460858410fd6128256d90e583
                                                        • Instruction Fuzzy Hash: 5E61AC71904609AFDF10CF94CC89AFE7BBAEB0D324F518545F925AB2A0D7749A80DF60
                                                        APIs
                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 008FFAAF
                                                        • SafeArrayAllocData.OLEAUT32(?), ref: 008FFB08
                                                        • VariantInit.OLEAUT32(?), ref: 008FFB1A
                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 008FFB3A
                                                        • VariantCopy.OLEAUT32(?,?), ref: 008FFB8D
                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 008FFBA1
                                                        • VariantClear.OLEAUT32(?), ref: 008FFBB6
                                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 008FFBC3
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 008FFBCC
                                                        • VariantClear.OLEAUT32(?), ref: 008FFBDE
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 008FFBE9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                        • String ID:
                                                        • API String ID: 2706829360-0
                                                        • Opcode ID: 6d324a4ac7b76157a2329e400cf9a6e55f204a175242dcfe3c631bd424769c85
                                                        • Instruction ID: 6cfc9ea3f6cab7461aadbd4936f01d0aec7bf43975c3dd86e1ffe8fa49373920
                                                        • Opcode Fuzzy Hash: 6d324a4ac7b76157a2329e400cf9a6e55f204a175242dcfe3c631bd424769c85
                                                        • Instruction Fuzzy Hash: 12415F75A0421DAFCB00DF68D8589BEBBB9FF48354F008069EA55E7262CB30E945CF91
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00909CA1
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00909D22
                                                        • GetKeyState.USER32(000000A0), ref: 00909D3D
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00909D57
                                                        • GetKeyState.USER32(000000A1), ref: 00909D6C
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00909D84
                                                        • GetKeyState.USER32(00000011), ref: 00909D96
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00909DAE
                                                        • GetKeyState.USER32(00000012), ref: 00909DC0
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00909DD8
                                                        • GetKeyState.USER32(0000005B), ref: 00909DEA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: a896f2b3a0952c2b69b0664ca4e43397767715295a192b5c5e348cd3a5468230
                                                        • Instruction ID: 3057be58393b6c9f5e5a229718ff5967bc373516af63bd8cf14721a20c753166
                                                        • Opcode Fuzzy Hash: a896f2b3a0952c2b69b0664ca4e43397767715295a192b5c5e348cd3a5468230
                                                        • Instruction Fuzzy Hash: DA41CB74948BCA6DFF319764C8043B5FEE8AF11344F04805AEAC6566C3DBA59DC8CB92
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?), ref: 009205BC
                                                        • inet_addr.WSOCK32(?), ref: 0092061C
                                                        • gethostbyname.WSOCK32(?), ref: 00920628
                                                        • IcmpCreateFile.IPHLPAPI ref: 00920636
                                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 009206C6
                                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 009206E5
                                                        • IcmpCloseHandle.IPHLPAPI(?), ref: 009207B9
                                                        • WSACleanup.WSOCK32 ref: 009207BF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                        • String ID: Ping
                                                        • API String ID: 1028309954-2246546115
                                                        • Opcode ID: f1d98f5801a0e7dca33c1cce21880e2d4ff23af102fb38ab0c1cf7c5f0b125f6
                                                        • Instruction ID: 7df781e09faef7c4b7bf0cb75c4fe8485c50d650cbffe7c7cbe741b512bd1720
                                                        • Opcode Fuzzy Hash: f1d98f5801a0e7dca33c1cce21880e2d4ff23af102fb38ab0c1cf7c5f0b125f6
                                                        • Instruction Fuzzy Hash: 03918C755082119FD320CF19E889F1ABBE8EF84318F1485A9F4699B6A3C730ED45CF82
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharLower
                                                        • String ID: cdecl$none$stdcall$winapi
                                                        • API String ID: 707087890-567219261
                                                        • Opcode ID: b24f5a7f53cbccc79bf6cb2f33c7d1601263569aa79f2d8e9a768b6de221b282
                                                        • Instruction ID: c3395c776ed967ad32878f2b96f5f2bfa0337d35552fcdab59e1f97401769050
                                                        • Opcode Fuzzy Hash: b24f5a7f53cbccc79bf6cb2f33c7d1601263569aa79f2d8e9a768b6de221b282
                                                        • Instruction Fuzzy Hash: D251D132A051269BCF24EF6CD8409BFB7A9FF65324B214629E426E72C8DB34DD44C790
                                                        APIs
                                                        • CoInitialize.OLE32 ref: 00923774
                                                        • CoUninitialize.OLE32 ref: 0092377F
                                                        • CoCreateInstance.OLE32(?,00000000,00000017,0093FB78,?), ref: 009237D9
                                                        • IIDFromString.OLE32(?,?), ref: 0092384C
                                                        • VariantInit.OLEAUT32(?), ref: 009238E4
                                                        • VariantClear.OLEAUT32(?), ref: 00923936
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                        • API String ID: 636576611-1287834457
                                                        • Opcode ID: 5a58d1acf41cc01b5f979b8f0bc4784162af7908a19c3c023ab1f3a887786a1f
                                                        • Instruction ID: e72734144def12dfe8c84fdbace3dfaca2ed18940a3edde4ab15c9e6d2432c71
                                                        • Opcode Fuzzy Hash: 5a58d1acf41cc01b5f979b8f0bc4784162af7908a19c3c023ab1f3a887786a1f
                                                        • Instruction Fuzzy Hash: 3761B2B0608721AFD710DF64D848F5AB7E8FF89714F108809F5859B291D778EE48CB92
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 009133CF
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 009133F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: LoadString$_wcslen
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 4099089115-3080491070
                                                        • Opcode ID: c91a3dd9faf48a0966da6b4110d5f2298390954ca112d7e14788fef740c5f655
                                                        • Instruction ID: 89337a33e42828bf1ef940d9d2b238bb2f2011ebd55a4ccf609046e6c9edd726
                                                        • Opcode Fuzzy Hash: c91a3dd9faf48a0966da6b4110d5f2298390954ca112d7e14788fef740c5f655
                                                        • Instruction Fuzzy Hash: 2C51B172904209AAEF15EBA4CD42EEEB778FF05344F104061F109B21A2EB352F98DB61
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                        • API String ID: 1256254125-769500911
                                                        • Opcode ID: 01e2a5453f2d2b6ab669ca890c3ffe4f7da4210f5f372c07a9c2751118139e2a
                                                        • Instruction ID: 91f58376eb723f5cfb3624a3edb5eadb2bdb68f1337eed4f7a117d82a12d4c74
                                                        • Opcode Fuzzy Hash: 01e2a5453f2d2b6ab669ca890c3ffe4f7da4210f5f372c07a9c2751118139e2a
                                                        • Instruction Fuzzy Hash: 3041C532A001279ECB205F7DC9905BE7BA9BF61B68B244629E521D72C4E736CD81C790
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 009153A0
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00915416
                                                        • GetLastError.KERNEL32 ref: 00915420
                                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 009154A7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: 840c2e4d728cb20c45cc793d953fe992b5de0722ce082ddbed83267938f70d3d
                                                        • Instruction ID: fee04e783a75df8a536b88d31bbde2b266bb5667bbdd6ca79f971c1ab091b0e8
                                                        • Opcode Fuzzy Hash: 840c2e4d728cb20c45cc793d953fe992b5de0722ce082ddbed83267938f70d3d
                                                        • Instruction Fuzzy Hash: B4319C75A04608DFDB10DF68C884AEABBB8EB85305F568065E405DB2E2DB71DDC2CB91
                                                        APIs
                                                        • CreateMenu.USER32 ref: 00933C79
                                                        • SetMenu.USER32(?,00000000), ref: 00933C88
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00933D10
                                                        • IsMenu.USER32(?), ref: 00933D24
                                                        • CreatePopupMenu.USER32 ref: 00933D2E
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00933D5B
                                                        • DrawMenuBar.USER32 ref: 00933D63
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                        • String ID: 0$F
                                                        • API String ID: 161812096-3044882817
                                                        • Opcode ID: a2b20aa05cafd0ad5ca05b3f59dd4c99c5228672098abab5ce06450cf92c8b9c
                                                        • Instruction ID: 5b88604d47225fcd36edbbbed70aed9f3a1c5bbe2f957b911b211b60021c5dfc
                                                        • Opcode Fuzzy Hash: a2b20aa05cafd0ad5ca05b3f59dd4c99c5228672098abab5ce06450cf92c8b9c
                                                        • Instruction Fuzzy Hash: D6417AB9A15609EFDB14CF64D844EEA7BB9FF49350F144028F956A73A0D730AA10DF90
                                                        APIs
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                          • Part of subcall function 00903CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00903CCA
                                                        • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00901F64
                                                        • GetDlgCtrlID.USER32 ref: 00901F6F
                                                        • GetParent.USER32 ref: 00901F8B
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00901F8E
                                                        • GetDlgCtrlID.USER32(?), ref: 00901F97
                                                        • GetParent.USER32(?), ref: 00901FAB
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00901FAE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 711023334-1403004172
                                                        • Opcode ID: 5bda3b43e9d6a348e78451426a8ec78931028f69ea78d1dcca2ba9eaa1b98ce7
                                                        • Instruction ID: 5234fb087132bb12b98e2e4c949e34d1dd34c4cb0c0756950f6c6db50dd1d232
                                                        • Opcode Fuzzy Hash: 5bda3b43e9d6a348e78451426a8ec78931028f69ea78d1dcca2ba9eaa1b98ce7
                                                        • Instruction Fuzzy Hash: 3D21CFB0904615BFDF04AFA4CC85EEEBBB9EF06354F004115FAA1A72E1CB385908DB60
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00933A9D
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00933AA0
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00933AC7
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00933AEA
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00933B62
                                                        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00933BAC
                                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00933BC7
                                                        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00933BE2
                                                        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00933BF6
                                                        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00933C13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow
                                                        • String ID:
                                                        • API String ID: 312131281-0
                                                        • Opcode ID: ac1a8b2c35a014b52b1b50f1094f3b9f20268a732da9279f2c4f3b79d83f5298
                                                        • Instruction ID: 428d3d9a0e50d6961b1c8f4dd7cdbfb71f3188e2f7038dee3bebc5c7ac5dab54
                                                        • Opcode Fuzzy Hash: ac1a8b2c35a014b52b1b50f1094f3b9f20268a732da9279f2c4f3b79d83f5298
                                                        • Instruction Fuzzy Hash: 70616A75A40248AFDB10DFA8CC81EEEB7B8EB49704F104199FA15E72A1C774AE81DF50
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 0090B151
                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0090A1E1,?,00000001), ref: 0090B165
                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 0090B16C
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0090A1E1,?,00000001), ref: 0090B17B
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0090B18D
                                                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0090A1E1,?,00000001), ref: 0090B1A6
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0090A1E1,?,00000001), ref: 0090B1B8
                                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0090A1E1,?,00000001), ref: 0090B1FD
                                                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0090A1E1,?,00000001), ref: 0090B212
                                                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0090A1E1,?,00000001), ref: 0090B21D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                        • String ID:
                                                        • API String ID: 2156557900-0
                                                        • Opcode ID: 754efd548a59e12ed9c092d547b6372bdf057596b9c0d66b0e5b251bbb071289
                                                        • Instruction ID: ba1af3493994a57fb9f2d33eae5a78448ad9b944c51365ffe661b94caded63b4
                                                        • Opcode Fuzzy Hash: 754efd548a59e12ed9c092d547b6372bdf057596b9c0d66b0e5b251bbb071289
                                                        • Instruction Fuzzy Hash: D731A0B2528604BFDB109F68DC49B6D7BADBB61315F108405FA19E61D0D7B49E80AF60
                                                        APIs
                                                        • _free.LIBCMT ref: 008D2C94
                                                          • Part of subcall function 008D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,008DD7D1,00000000,00000000,00000000,00000000,?,008DD7F8,00000000,00000007,00000000,?,008DDBF5,00000000), ref: 008D29DE
                                                          • Part of subcall function 008D29C8: GetLastError.KERNEL32(00000000,?,008DD7D1,00000000,00000000,00000000,00000000,?,008DD7F8,00000000,00000007,00000000,?,008DDBF5,00000000,00000000), ref: 008D29F0
                                                        • _free.LIBCMT ref: 008D2CA0
                                                        • _free.LIBCMT ref: 008D2CAB
                                                        • _free.LIBCMT ref: 008D2CB6
                                                        • _free.LIBCMT ref: 008D2CC1
                                                        • _free.LIBCMT ref: 008D2CCC
                                                        • _free.LIBCMT ref: 008D2CD7
                                                        • _free.LIBCMT ref: 008D2CE2
                                                        • _free.LIBCMT ref: 008D2CED
                                                        • _free.LIBCMT ref: 008D2CFB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: b54bfc3ea7412376b5329a86d928811382a360a8114d3cc7afa5c511f839b55d
                                                        • Instruction ID: 5cd4a1cc6c32298d6958daed157c58f96de84db5675dc79462b074ed79887d0f
                                                        • Opcode Fuzzy Hash: b54bfc3ea7412376b5329a86d928811382a360a8114d3cc7afa5c511f839b55d
                                                        • Instruction Fuzzy Hash: AD119276100108BFCB02EF58D892DDD3FA5FF15350F4146A6FA489B322DA31EA50AB91
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 008A1459
                                                        • OleUninitialize.OLE32(?,00000000), ref: 008A14F8
                                                        • UnregisterHotKey.USER32(?), ref: 008A16DD
                                                        • DestroyWindow.USER32(?), ref: 008E24B9
                                                        • FreeLibrary.KERNEL32(?), ref: 008E251E
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 008E254B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                        • String ID: close all
                                                        • API String ID: 469580280-3243417748
                                                        • Opcode ID: 4b70033a9596483a1c17f442ed0dbaa53f475305288b3d059489bf2b037b9201
                                                        • Instruction ID: fb7f55af29d54e88bcaa57d90d645a91f367c719a8f6e873440b6cc030adf329
                                                        • Opcode Fuzzy Hash: 4b70033a9596483a1c17f442ed0dbaa53f475305288b3d059489bf2b037b9201
                                                        • Instruction Fuzzy Hash: 15D18B31701212CFDB29EF19C999A69F7A4FF06704F1542ADE44AEB662CB30AD12CF51
                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00917FAD
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00917FC1
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00917FEB
                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00918005
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00918017
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00918060
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 009180B0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$AttributesFile
                                                        • String ID: *.*
                                                        • API String ID: 769691225-438819550
                                                        • Opcode ID: 0c18cce89b66ac245cbaabed3e464dda32ffa39a9b731cbd43f71dda3c52b265
                                                        • Instruction ID: f4f9e35a27ed1fd7273270d0a668b6f38599c6b9d0bab51c522fa212e11b87c5
                                                        • Opcode Fuzzy Hash: 0c18cce89b66ac245cbaabed3e464dda32ffa39a9b731cbd43f71dda3c52b265
                                                        • Instruction Fuzzy Hash: CB81807260824A9BDB20EF54C844AEAF7E9FB89310F144C5EF885D7260DB35DD85CB52
                                                        APIs
                                                        • SetWindowLongW.USER32(?,000000EB), ref: 008A5C7A
                                                          • Part of subcall function 008A5D0A: GetClientRect.USER32(?,?), ref: 008A5D30
                                                          • Part of subcall function 008A5D0A: GetWindowRect.USER32(?,?), ref: 008A5D71
                                                          • Part of subcall function 008A5D0A: ScreenToClient.USER32(?,?), ref: 008A5D99
                                                        • GetDC.USER32 ref: 008E46F5
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 008E4708
                                                        • SelectObject.GDI32(00000000,00000000), ref: 008E4716
                                                        • SelectObject.GDI32(00000000,00000000), ref: 008E472B
                                                        • ReleaseDC.USER32(?,00000000), ref: 008E4733
                                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 008E47C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                        • String ID: U
                                                        • API String ID: 4009187628-3372436214
                                                        • Opcode ID: 0673b96d9e972b8938d6b18b95d7a54c3e14ff4cb4a65c3ac7ed40f94fce3a24
                                                        • Instruction ID: 311f7f9d5c67dc364ffc02f45d4943e27409120dee1bed0fc302584f0db42e58
                                                        • Opcode Fuzzy Hash: 0673b96d9e972b8938d6b18b95d7a54c3e14ff4cb4a65c3ac7ed40f94fce3a24
                                                        • Instruction Fuzzy Hash: F1710031404249DFDF218F64CD84ABA7BB1FF4B324F145269ED59DA2AAC3308881EF90
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 009135E4
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                        • LoadStringW.USER32(00972390,?,00000FFF,?), ref: 0091360A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: LoadString$_wcslen
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 4099089115-2391861430
                                                        • Opcode ID: 2697a6c473190f42322f8febeba9e6ecac2908f0e7ac5c41e383744f98dbf767
                                                        • Instruction ID: eb2f582d377a5418907570fabbe6576fa461803b2737cccb47eae3a65cc04a69
                                                        • Opcode Fuzzy Hash: 2697a6c473190f42322f8febeba9e6ecac2908f0e7ac5c41e383744f98dbf767
                                                        • Instruction Fuzzy Hash: F6517172904219ABEF15EBA4DC42EEEBB38FF45340F048125F105B25A1EB301B99DF61
                                                        APIs
                                                          • Part of subcall function 008B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 008B9BB2
                                                          • Part of subcall function 008B912D: GetCursorPos.USER32(?), ref: 008B9141
                                                          • Part of subcall function 008B912D: ScreenToClient.USER32(00000000,?), ref: 008B915E
                                                          • Part of subcall function 008B912D: GetAsyncKeyState.USER32(00000001), ref: 008B9183
                                                          • Part of subcall function 008B912D: GetAsyncKeyState.USER32(00000002), ref: 008B919D
                                                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00938B6B
                                                        • ImageList_EndDrag.COMCTL32 ref: 00938B71
                                                        • ReleaseCapture.USER32 ref: 00938B77
                                                        • SetWindowTextW.USER32(?,00000000), ref: 00938C12
                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00938C25
                                                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00938CFF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                        • API String ID: 1924731296-2107944366
                                                        • Opcode ID: 1e9df802e9ce87cb14d27a3496c38d15a41551c947422bd93c794d60221c4461
                                                        • Instruction ID: 5bc40b4e5eedc22de9f881d3cd8b27a4ea8757678041316600da75c043fb3f5f
                                                        • Opcode Fuzzy Hash: 1e9df802e9ce87cb14d27a3496c38d15a41551c947422bd93c794d60221c4461
                                                        • Instruction Fuzzy Hash: 6D517B71108304AFE714DF18DC56FAA77E4FB88754F000629F996A72A1DB70A944DF62
                                                        APIs
                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0091C272
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0091C29A
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0091C2CA
                                                        • GetLastError.KERNEL32 ref: 0091C322
                                                        • SetEvent.KERNEL32(?), ref: 0091C336
                                                        • InternetCloseHandle.WININET(00000000), ref: 0091C341
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                        • String ID:
                                                        • API String ID: 3113390036-3916222277
                                                        • Opcode ID: d3f3a7cf048d7b79f15e3a12a6b94ce793c82d1d6f72eda0d4731fd841de0dac
                                                        • Instruction ID: 3ed2df986a6e183fd21a7ade36b952ded69712d854212fba3890ca7e6c843dd2
                                                        • Opcode Fuzzy Hash: d3f3a7cf048d7b79f15e3a12a6b94ce793c82d1d6f72eda0d4731fd841de0dac
                                                        • Instruction Fuzzy Hash: 94318CF1744608AFD7219FA58C88AEB7BFCEB49744F10891EF456E2200DB34DD859B61
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,008E3AAF,?,?,Bad directive syntax error,0093CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 009098BC
                                                        • LoadStringW.USER32(00000000,?,008E3AAF,?), ref: 009098C3
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00909987
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadMessageModuleString_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                        • API String ID: 858772685-4153970271
                                                        • Opcode ID: 93c575b18eb1e12b6a7d682102bb96ef0c233d253feef0821609523be88665ae
                                                        • Instruction ID: 641f818c03b9d13d5b4e29bb49838fc930e9ed4261e4599e0e3c50a04f7cb897
                                                        • Opcode Fuzzy Hash: 93c575b18eb1e12b6a7d682102bb96ef0c233d253feef0821609523be88665ae
                                                        • Instruction Fuzzy Hash: 4C219F3280421AAFDF15AF94CC06EEE7779FF19304F044429F615A21A2EB719A18DB52
                                                        APIs
                                                        • GetParent.USER32 ref: 009020AB
                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 009020C0
                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0090214D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameParentSend
                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                        • API String ID: 1290815626-3381328864
                                                        • Opcode ID: dc74dcc7728739bbbe013a8502b53ddca410c381034194ae6c6716c4269ea9a9
                                                        • Instruction ID: 2b3cd582cd0b5e9d254d54cd05dcf9784fc2f4440d44bc97db22c2e1bcb5f691
                                                        • Opcode Fuzzy Hash: dc74dcc7728739bbbe013a8502b53ddca410c381034194ae6c6716c4269ea9a9
                                                        • Instruction Fuzzy Hash: 9E11067668C717BDFA152734DC0BDA677ACDF05328F21111AFB04F50E1EA75A8425A14
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                        • String ID:
                                                        • API String ID: 1282221369-0
                                                        • Opcode ID: 4d3f831fdbddd179110602bd61a41d899c5952866762595ead8d0a97243b3b65
                                                        • Instruction ID: 6fa0c22334f09de1b94ec1941b19cf294f0ee7ed247dcf79e593e22bb2db722b
                                                        • Opcode Fuzzy Hash: 4d3f831fdbddd179110602bd61a41d899c5952866762595ead8d0a97243b3b65
                                                        • Instruction Fuzzy Hash: 456135B2908306AFDB21AFB89885AA97BA5FF41320F04436FF944D7382DAB19D01D751
                                                        APIs
                                                        • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00935186
                                                        • ShowWindow.USER32(?,00000000), ref: 009351C7
                                                        • ShowWindow.USER32(?,00000005,?,00000000), ref: 009351CD
                                                        • SetFocus.USER32(?,?,00000005,?,00000000), ref: 009351D1
                                                          • Part of subcall function 00936FBA: DeleteObject.GDI32(00000000), ref: 00936FE6
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0093520D
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0093521A
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0093524D
                                                        • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00935287
                                                        • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00935296
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                        • String ID:
                                                        • API String ID: 3210457359-0
                                                        • Opcode ID: 7606f10135cd9c1499e961050fd459d3de846b3ad00448e7a1724712ad6b456f
                                                        • Instruction ID: 930c9c68d21a1818c46e584520d29d85ac6998869aec6a930049c3f9e88ef6d6
                                                        • Opcode Fuzzy Hash: 7606f10135cd9c1499e961050fd459d3de846b3ad00448e7a1724712ad6b456f
                                                        • Instruction Fuzzy Hash: BD51C370A58A08BFEF309F68CC46BD93BA9FB09325F154411FA25962E0C775E990DF41
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 008F6890
                                                        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 008F68A9
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 008F68B9
                                                        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 008F68D1
                                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 008F68F2
                                                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,008B8874,00000000,00000000,00000000,000000FF,00000000), ref: 008F6901
                                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 008F691E
                                                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,008B8874,00000000,00000000,00000000,000000FF,00000000), ref: 008F692D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                        • String ID:
                                                        • API String ID: 1268354404-0
                                                        • Opcode ID: f55f69dff7347b6f26204aedee9191d16498d4b3709d1b8c545d442df1270776
                                                        • Instruction ID: 81e22eb8af1efcb12c56d932b1a46a4bb977a7a490b8c4c7a5fa37956bba9d7f
                                                        • Opcode Fuzzy Hash: f55f69dff7347b6f26204aedee9191d16498d4b3709d1b8c545d442df1270776
                                                        • Instruction Fuzzy Hash: D2518C70610609EFDB24CF28CC55FAA7BB9FB44764F104618FA56D72A0EB70E990EB50
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0091C182
                                                        • GetLastError.KERNEL32 ref: 0091C195
                                                        • SetEvent.KERNEL32(?), ref: 0091C1A9
                                                          • Part of subcall function 0091C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0091C272
                                                          • Part of subcall function 0091C253: GetLastError.KERNEL32 ref: 0091C322
                                                          • Part of subcall function 0091C253: SetEvent.KERNEL32(?), ref: 0091C336
                                                          • Part of subcall function 0091C253: InternetCloseHandle.WININET(00000000), ref: 0091C341
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                        • String ID:
                                                        • API String ID: 337547030-0
                                                        • Opcode ID: 4d1ed9a20bf6f04a33015e4cbce5b9a292a925d569019903f40bd599d40f99f1
                                                        • Instruction ID: 0485357f0c59950c8b0842c9705da22e058f85a0a3916c2eb7b5cf22fe63c452
                                                        • Opcode Fuzzy Hash: 4d1ed9a20bf6f04a33015e4cbce5b9a292a925d569019903f40bd599d40f99f1
                                                        • Instruction Fuzzy Hash: 91318EB1384A09BFDB219FA5DC44AABBBFDFF58310B00481DF96692610D734E854AF60
                                                        APIs
                                                          • Part of subcall function 00903A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00903A57
                                                          • Part of subcall function 00903A3D: GetCurrentThreadId.KERNEL32 ref: 00903A5E
                                                          • Part of subcall function 00903A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,009025B3), ref: 00903A65
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 009025BD
                                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 009025DB
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 009025DF
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 009025E9
                                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00902601
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00902605
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 0090260F
                                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00902623
                                                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00902627
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                        • String ID:
                                                        • API String ID: 2014098862-0
                                                        • Opcode ID: 6b816ebeab2a4891959c07d052dedb0bae0ab93191e211cbf60a02c661f9fe1f
                                                        • Instruction ID: 3a64674415eb6f9ebebb8cc7b69cab0cafdc3902f9e77f004d00e8fbccdb3f07
                                                        • Opcode Fuzzy Hash: 6b816ebeab2a4891959c07d052dedb0bae0ab93191e211cbf60a02c661f9fe1f
                                                        • Instruction Fuzzy Hash: FE01D4713A8610BBFB1067689C8EF593F5DDB8EB12F100002F318BE0D1C9E22444AE69
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00901449,?,?,00000000), ref: 0090180C
                                                        • HeapAlloc.KERNEL32(00000000,?,00901449,?,?,00000000), ref: 00901813
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00901449,?,?,00000000), ref: 00901828
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00901449,?,?,00000000), ref: 00901830
                                                        • DuplicateHandle.KERNEL32(00000000,?,00901449,?,?,00000000), ref: 00901833
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00901449,?,?,00000000), ref: 00901843
                                                        • GetCurrentProcess.KERNEL32(00901449,00000000,?,00901449,?,?,00000000), ref: 0090184B
                                                        • DuplicateHandle.KERNEL32(00000000,?,00901449,?,?,00000000), ref: 0090184E
                                                        • CreateThread.KERNEL32(00000000,00000000,00901874,00000000,00000000,00000000), ref: 00901868
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                        • String ID:
                                                        • API String ID: 1957940570-0
                                                        • Opcode ID: 3df87dde6f8c6dce8e06f72b4af7cfe4d34a5bed743d98efde5ad4dfbb1e938e
                                                        • Instruction ID: 95c2168df02635c52a5ec963bdf05e5156591fce9c72ad6bd4b2dd6a4ea13a29
                                                        • Opcode Fuzzy Hash: 3df87dde6f8c6dce8e06f72b4af7cfe4d34a5bed743d98efde5ad4dfbb1e938e
                                                        • Instruction Fuzzy Hash: BC01BBB5254708BFE710ABA5DC4DF6B3BACEB89B11F008411FA05EB1A1CA70D810EF20
                                                        APIs
                                                          • Part of subcall function 0090D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0090D501
                                                          • Part of subcall function 0090D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0090D50F
                                                          • Part of subcall function 0090D4DC: CloseHandle.KERNEL32(00000000), ref: 0090D5DC
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0092A16D
                                                        • GetLastError.KERNEL32 ref: 0092A180
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0092A1B3
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0092A268
                                                        • GetLastError.KERNEL32(00000000), ref: 0092A273
                                                        • CloseHandle.KERNEL32(00000000), ref: 0092A2C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 2533919879-2896544425
                                                        • Opcode ID: b2968c2bdbace688269c007cbabba9c89b2bfdb34b09db875ad2b96a52a08953
                                                        • Instruction ID: cfd0dbcc8f1eeaf3c5f2cfbfd255bd750e388a28ccb9136f73a477094d49aff4
                                                        • Opcode Fuzzy Hash: b2968c2bdbace688269c007cbabba9c89b2bfdb34b09db875ad2b96a52a08953
                                                        • Instruction Fuzzy Hash: B861C071208652DFE720DF18D894F15BBE5AF44318F18848CE4668BBA3C776EC45CB92
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00933925
                                                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0093393A
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00933954
                                                        • _wcslen.LIBCMT ref: 00933999
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 009339C6
                                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 009339F4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcslen
                                                        • String ID: SysListView32
                                                        • API String ID: 2147712094-78025650
                                                        • Opcode ID: a77b4141012b7c15ae50b689aac205bc3fd1ea225528a11d908b300d097a8f70
                                                        • Instruction ID: 152071b96905b0210508ac8b4f365c4afca894eaec01971f51ee3d041a7ce62d
                                                        • Opcode Fuzzy Hash: a77b4141012b7c15ae50b689aac205bc3fd1ea225528a11d908b300d097a8f70
                                                        • Instruction Fuzzy Hash: 4F41A171A40219EBEB219F64CC49FEA7BA9FF48354F104526F958E7281D771DA80CF90
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0090BCFD
                                                        • IsMenu.USER32(00000000), ref: 0090BD1D
                                                        • CreatePopupMenu.USER32 ref: 0090BD53
                                                        • GetMenuItemCount.USER32(017754C8), ref: 0090BDA4
                                                        • InsertMenuItemW.USER32(017754C8,?,00000001,00000030), ref: 0090BDCC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                        • String ID: 0$2
                                                        • API String ID: 93392585-3793063076
                                                        • Opcode ID: cced61385f67aee38e95d0c9df975553ac32e16a522bc56e8d09ac43bf04b424
                                                        • Instruction ID: 7af3d0200967ad5a629b0010401900a517df05316cf174f4f4b084e45773dbdb
                                                        • Opcode Fuzzy Hash: cced61385f67aee38e95d0c9df975553ac32e16a522bc56e8d09ac43bf04b424
                                                        • Instruction Fuzzy Hash: 2E519CB0A04206DFDB10DFA8D888BAEFBF8EF85314F148619E551A72D1D7709940CB61
                                                        APIs
                                                        • LoadIconW.USER32(00000000,00007F03), ref: 0090C913
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2457776203-404129466
                                                        • Opcode ID: 37fd62409c2bbba4e5aa6366a1c3a1b266c6d0157ce794fa18ef947aafb92649
                                                        • Instruction ID: 28562c11ecea2c43f6e64c041c61a6732fa299f1260a341b26053e9b2859b460
                                                        • Opcode Fuzzy Hash: 37fd62409c2bbba4e5aa6366a1c3a1b266c6d0157ce794fa18ef947aafb92649
                                                        • Instruction Fuzzy Hash: 56115C72689307BEE7049B14DC83DAE37ACDF15318F20412FF904E62C2E7B49E406269
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$LocalTime
                                                        • String ID:
                                                        • API String ID: 952045576-0
                                                        • Opcode ID: 7410d8b3e635ac3ca9b17e5f90040e2c9764aad9a9c656c9e2d4dc044e500c98
                                                        • Instruction ID: 3210cf231ecb3aef273b51285ddba3ee75adfa2bb33621dd0c8577dca3e9b4a1
                                                        • Opcode Fuzzy Hash: 7410d8b3e635ac3ca9b17e5f90040e2c9764aad9a9c656c9e2d4dc044e500c98
                                                        • Instruction Fuzzy Hash: 23418365C1021865CB11EBB8C88AEDFB7B8FF45710F504866E518E3161FB34E255C7A6
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,008F682C,00000004,00000000,00000000), ref: 008BF953
                                                        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,008F682C,00000004,00000000,00000000), ref: 008FF3D1
                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,008F682C,00000004,00000000,00000000), ref: 008FF454
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ShowWindow
                                                        • String ID:
                                                        • API String ID: 1268545403-0
                                                        • Opcode ID: 98e907d1a26eb5209f266f44beeaf4ab370891c70501a823585f337ab4040918
                                                        • Instruction ID: 3ce1408066632a82c067e61758e9c808c2ceec917931dd2ac6f0d1da4dad232b
                                                        • Opcode Fuzzy Hash: 98e907d1a26eb5209f266f44beeaf4ab370891c70501a823585f337ab4040918
                                                        • Instruction Fuzzy Hash: 9141B331618684BAC7398B398C887BA7F91FF56318F14453CE787E6763D631A880DB11
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00932D1B
                                                        • GetDC.USER32(00000000), ref: 00932D23
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00932D2E
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00932D3A
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00932D76
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00932D87
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00935A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00932DC2
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00932DE1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID:
                                                        • API String ID: 3864802216-0
                                                        • Opcode ID: d3c5a7a9d295abd1c8b01a5693964429b882e72e20149fc4e7cec2adaa3b280f
                                                        • Instruction ID: e8014e0d47745596c92f71d681c9ad9331406f44dc0f64d79c12f4ed08a2881f
                                                        • Opcode Fuzzy Hash: d3c5a7a9d295abd1c8b01a5693964429b882e72e20149fc4e7cec2adaa3b280f
                                                        • Instruction Fuzzy Hash: 6D317CB2215614BFEB218F50CC8AFEB3BADEF09715F044055FE08AA2A1C6759C50CBA4
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: 186c9695db2eb6d5d96f928974b2507a199114c038ac81a4f27d99eca1079bb1
                                                        • Instruction ID: 3ded15ce165a65b2dcf2e1013b926bf659a8f0f5874dbe6ae55c5673b24f4ac2
                                                        • Opcode Fuzzy Hash: 186c9695db2eb6d5d96f928974b2507a199114c038ac81a4f27d99eca1079bb1
                                                        • Instruction Fuzzy Hash: 5521A761A80A09BFDB1455258E96FBB336CFF62388F450024FD05DA6C2F736ED108DA6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                        • API String ID: 0-572801152
                                                        • Opcode ID: d6cd590b611974a6919da587f280a00e1883d1ffcc3a5286cd7c940a94866813
                                                        • Instruction ID: 6bb72e46b02e174fab1026725d02bfedb82d2644dbad5e00decbf71a567edbe4
                                                        • Opcode Fuzzy Hash: d6cd590b611974a6919da587f280a00e1883d1ffcc3a5286cd7c940a94866813
                                                        • Instruction Fuzzy Hash: 4BD1B171A0062ADFDF10CFA8D880BAEB7B9BF48344F158469E915EB285E770DD41CB90
                                                        APIs
                                                        • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,008E17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 008E15CE
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,008E17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 008E1651
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,008E17FB,?,008E17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 008E16E4
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,008E17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 008E16FB
                                                          • Part of subcall function 008D3820: RtlAllocateHeap.NTDLL(00000000,?,00971444,?,008BFDF5,?,?,008AA976,00000010,00971440,008A13FC,?,008A13C6,?,008A1129), ref: 008D3852
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,008E17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 008E1777
                                                        • __freea.LIBCMT ref: 008E17A2
                                                        • __freea.LIBCMT ref: 008E17AE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                        • String ID:
                                                        • API String ID: 2829977744-0
                                                        • Opcode ID: c912adf60400ee8ef606b00f4897c422c662e26f5d36949761fa7efd0ef53db1
                                                        • Instruction ID: a023bd6f37299f6e0b5ca3625fd01f065e6de046b97c3de154fa3a9e7666b03d
                                                        • Opcode Fuzzy Hash: c912adf60400ee8ef606b00f4897c422c662e26f5d36949761fa7efd0ef53db1
                                                        • Instruction Fuzzy Hash: 3B91C371E0429AAADF208EB6CC89EEE7BB5FF4A714F184659E811E7151DB35CC40CB60
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                        • API String ID: 2610073882-625585964
                                                        • Opcode ID: 07fcc9352dc81e554250575195c99dbfe4910c20b56343ef147ebe163359cc69
                                                        • Instruction ID: 2d71b09e1a2397050c6f0200d459880bdd80822e9f841b9fa8afd07b7f694355
                                                        • Opcode Fuzzy Hash: 07fcc9352dc81e554250575195c99dbfe4910c20b56343ef147ebe163359cc69
                                                        • Instruction Fuzzy Hash: B7917F71A00229ABDF20CFA4EC44FAEBBBCEF46714F108559F515AB284D7749945CFA0
                                                        APIs
                                                        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0091125C
                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00911284
                                                        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 009112A8
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 009112D8
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0091135F
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 009113C4
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00911430
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                        • String ID:
                                                        • API String ID: 2550207440-0
                                                        • Opcode ID: 16128c9c8429d29597e7ad551719c97dcf3b8f543d07cbc3f545f334ba4c8893
                                                        • Instruction ID: 7059733b48bdaed8d9bd93577a50f454dda315befd06c6c297111d493443edb6
                                                        • Opcode Fuzzy Hash: 16128c9c8429d29597e7ad551719c97dcf3b8f543d07cbc3f545f334ba4c8893
                                                        • Instruction Fuzzy Hash: 8191DF71A0021DAFDB00DFA8D884BFEB7B9FF45710F144429EA11EB2A1D774A981CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: 7bef0d1ca147783f845a64ddf54d1194ce348697fbe1ced96f5bb7085e70ddcd
                                                        • Instruction ID: 0b97c8c59838dc6609814978455405c5641fd9fd44b3851cfe9b7b67aa3d4fe1
                                                        • Opcode Fuzzy Hash: 7bef0d1ca147783f845a64ddf54d1194ce348697fbe1ced96f5bb7085e70ddcd
                                                        • Instruction Fuzzy Hash: BF91137194421AAFCB14CFA9C884AEEBBB8FF49320F148059E655F7351D274AA42CB60
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 0092396B
                                                        • CharUpperBuffW.USER32(?,?), ref: 00923A7A
                                                        • _wcslen.LIBCMT ref: 00923A8A
                                                        • VariantClear.OLEAUT32(?), ref: 00923C1F
                                                          • Part of subcall function 00910CDF: VariantInit.OLEAUT32(00000000), ref: 00910D1F
                                                          • Part of subcall function 00910CDF: VariantCopy.OLEAUT32(?,?), ref: 00910D28
                                                          • Part of subcall function 00910CDF: VariantClear.OLEAUT32(?), ref: 00910D34
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                        • API String ID: 4137639002-1221869570
                                                        • Opcode ID: 356013880c38c2cb7c1dbac430bdc16aafb289acecf25f607ba377352ec1d062
                                                        • Instruction ID: 8db5d51c964854b5f212dca21168f8b0c52cf1496eb34dabd0c2a6d2ee31b922
                                                        • Opcode Fuzzy Hash: 356013880c38c2cb7c1dbac430bdc16aafb289acecf25f607ba377352ec1d062
                                                        • Instruction Fuzzy Hash: B59169746083159FC704EF28D48096AB7E9FF89314F14882DF88A97351DB35EE45CB92
                                                        APIs
                                                          • Part of subcall function 0090000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,008FFF41,80070057,?,?,?,0090035E), ref: 0090002B
                                                          • Part of subcall function 0090000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008FFF41,80070057,?,?), ref: 00900046
                                                          • Part of subcall function 0090000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008FFF41,80070057,?,?), ref: 00900054
                                                          • Part of subcall function 0090000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008FFF41,80070057,?), ref: 00900064
                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00924C51
                                                        • _wcslen.LIBCMT ref: 00924D59
                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00924DCF
                                                        • CoTaskMemFree.OLE32(?), ref: 00924DDA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                        • String ID: NULL Pointer assignment
                                                        • API String ID: 614568839-2785691316
                                                        • Opcode ID: 8f3801efe8832a9a50633e58a780d15ed8a034a6b5600d485feff370e971a666
                                                        • Instruction ID: 4a552ff3b52c61e04671f4144750f4cbad31a45f60dbb2c4fd39ae1e8e543287
                                                        • Opcode Fuzzy Hash: 8f3801efe8832a9a50633e58a780d15ed8a034a6b5600d485feff370e971a666
                                                        • Instruction Fuzzy Hash: F3912771D0022D9FEF14DFA4D891AEEBBB8FF48300F108569E915A7295DB349A44CFA1
                                                        APIs
                                                        • GetMenu.USER32(?), ref: 00932183
                                                        • GetMenuItemCount.USER32(00000000), ref: 009321B5
                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 009321DD
                                                        • _wcslen.LIBCMT ref: 00932213
                                                        • GetMenuItemID.USER32(?,?), ref: 0093224D
                                                        • GetSubMenu.USER32(?,?), ref: 0093225B
                                                          • Part of subcall function 00903A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00903A57
                                                          • Part of subcall function 00903A3D: GetCurrentThreadId.KERNEL32 ref: 00903A5E
                                                          • Part of subcall function 00903A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,009025B3), ref: 00903A65
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 009322E3
                                                          • Part of subcall function 0090E97B: Sleep.KERNEL32 ref: 0090E9F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                        • String ID:
                                                        • API String ID: 4196846111-0
                                                        • Opcode ID: fc444728218730743329dd4c9a315b4a91ceea619e60848deeb01ade5bdc9b54
                                                        • Instruction ID: 7a97a0cdad1547d72d24ba2d1db967a848fdca00dc919a81152814e6ee0d9ab5
                                                        • Opcode Fuzzy Hash: fc444728218730743329dd4c9a315b4a91ceea619e60848deeb01ade5bdc9b54
                                                        • Instruction Fuzzy Hash: 4F718D75A04205AFCB14EFA8C845AAEB7F5FF88310F148459E926EB351DB34ED418F91
                                                        APIs
                                                        • IsWindow.USER32(017756A8), ref: 00937F37
                                                        • IsWindowEnabled.USER32(017756A8), ref: 00937F43
                                                        • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0093801E
                                                        • SendMessageW.USER32(017756A8,000000B0,?,?), ref: 00938051
                                                        • IsDlgButtonChecked.USER32(?,?), ref: 00938089
                                                        • GetWindowLongW.USER32(017756A8,000000EC), ref: 009380AB
                                                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 009380C3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                        • String ID:
                                                        • API String ID: 4072528602-0
                                                        • Opcode ID: 67df0cc7640db18352d1fda181f0bf3d6dad952267430f75306753141275907e
                                                        • Instruction ID: 08deb6a4ac78d2fb1bae17ed3998f06ba57cdadcff4eacd900e81c1808d7e51b
                                                        • Opcode Fuzzy Hash: 67df0cc7640db18352d1fda181f0bf3d6dad952267430f75306753141275907e
                                                        • Instruction Fuzzy Hash: 6C718BB4608604AFEB359FA4CC84FEABBB9FF4A300F144459F945972A1CB31A845DF20
                                                        APIs
                                                        • GetParent.USER32(?), ref: 0090AEF9
                                                        • GetKeyboardState.USER32(?), ref: 0090AF0E
                                                        • SetKeyboardState.USER32(?), ref: 0090AF6F
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 0090AF9D
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 0090AFBC
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 0090AFFD
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0090B020
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: 66b70c2b0d6060f177735edf987cefbcc7c4389c60329d6898677dcb46569216
                                                        • Instruction ID: 9e8447affd63301ca68c93c6a823eef2ea95f38e2033d43e4ee8ae6fe45b14d1
                                                        • Opcode Fuzzy Hash: 66b70c2b0d6060f177735edf987cefbcc7c4389c60329d6898677dcb46569216
                                                        • Instruction Fuzzy Hash: 7551A3A16187D63DFB368334CC45BBA7EED5B06304F088589E2E9954C2D399ACC4D791
                                                        APIs
                                                        • GetParent.USER32(00000000), ref: 0090AD19
                                                        • GetKeyboardState.USER32(?), ref: 0090AD2E
                                                        • SetKeyboardState.USER32(?), ref: 0090AD8F
                                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0090ADBB
                                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0090ADD8
                                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0090AE17
                                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0090AE38
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: 5b958e3fed8ed948b3d007ec66c7034297a9bf5d3ab7df222d08670f95b802c9
                                                        • Instruction ID: 4e063f510990057ce7a305ddfc82b1bf66880aaabc32894cf4524e19fe152175
                                                        • Opcode Fuzzy Hash: 5b958e3fed8ed948b3d007ec66c7034297a9bf5d3ab7df222d08670f95b802c9
                                                        • Instruction Fuzzy Hash: 5451E5A15187D53DFB378334CC55BBABEED5B46304F088489E1D5568C3D294EC88E7A2
                                                        APIs
                                                        • GetConsoleCP.KERNEL32(008E3CD6,?,?,?,?,?,?,?,?,008D5BA3,?,?,008E3CD6,?,?), ref: 008D5470
                                                        • __fassign.LIBCMT ref: 008D54EB
                                                        • __fassign.LIBCMT ref: 008D5506
                                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,008E3CD6,00000005,00000000,00000000), ref: 008D552C
                                                        • WriteFile.KERNEL32(?,008E3CD6,00000000,008D5BA3,00000000,?,?,?,?,?,?,?,?,?,008D5BA3,?), ref: 008D554B
                                                        • WriteFile.KERNEL32(?,?,00000001,008D5BA3,00000000,?,?,?,?,?,?,?,?,?,008D5BA3,?), ref: 008D5584
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                        • String ID:
                                                        • API String ID: 1324828854-0
                                                        • Opcode ID: 8a4d0b8e6d48dc1e60498e4d1f70b679df5823e0bbd1daf822f134f749ffd0a1
                                                        • Instruction ID: b9bfa717adce3c295e551f0d8cbb3416b13c5510b32de90aac5720b50ae5063b
                                                        • Opcode Fuzzy Hash: 8a4d0b8e6d48dc1e60498e4d1f70b679df5823e0bbd1daf822f134f749ffd0a1
                                                        • Instruction Fuzzy Hash: CD51C0B1A00649AFDB11DFA8E851AEEBBF9FF09300F14421BF555E7391D6309A81CB61
                                                        APIs
                                                        • _ValidateLocalCookies.LIBCMT ref: 008C2D4B
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 008C2D53
                                                        • _ValidateLocalCookies.LIBCMT ref: 008C2DE1
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 008C2E0C
                                                        • _ValidateLocalCookies.LIBCMT ref: 008C2E61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: csm
                                                        • API String ID: 1170836740-1018135373
                                                        • Opcode ID: 3185bc61a9ef155b7f9a593442c09ebcde96c1a145a1db18b7802f026dc7097c
                                                        • Instruction ID: 16ac0fcfadccf3bd39fab9ff9e8c8e638127fcbe3ffab34f00e41e9a5a8a58a4
                                                        • Opcode Fuzzy Hash: 3185bc61a9ef155b7f9a593442c09ebcde96c1a145a1db18b7802f026dc7097c
                                                        • Instruction Fuzzy Hash: B4417134A0020DABCF10DF68C845F9EBBB5FF55328F148169E915EB292D731DA15CB91
                                                        APIs
                                                          • Part of subcall function 0092304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0092307A
                                                          • Part of subcall function 0092304E: _wcslen.LIBCMT ref: 0092309B
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00921112
                                                        • WSAGetLastError.WSOCK32 ref: 00921121
                                                        • WSAGetLastError.WSOCK32 ref: 009211C9
                                                        • closesocket.WSOCK32(00000000), ref: 009211F9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 2675159561-0
                                                        • Opcode ID: 5749d12a9ca97160111a0212eda0ea5ad28e0d71ab25cebfb42559270ee1889e
                                                        • Instruction ID: 58265cc49db3e7b05b84c77d5e0ac4fe0d4498bfd4bde41d8a7f6816266d38c4
                                                        • Opcode Fuzzy Hash: 5749d12a9ca97160111a0212eda0ea5ad28e0d71ab25cebfb42559270ee1889e
                                                        • Instruction Fuzzy Hash: 4C413531604614AFEB109F24D884BAAB7E9FF41324F148019FD06AB296C774EE51CFE1
                                                        APIs
                                                          • Part of subcall function 0090DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0090CF22,?), ref: 0090DDFD
                                                          • Part of subcall function 0090DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0090CF22,?), ref: 0090DE16
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0090CF45
                                                        • MoveFileW.KERNEL32(?,?), ref: 0090CF7F
                                                        • _wcslen.LIBCMT ref: 0090D005
                                                        • _wcslen.LIBCMT ref: 0090D01B
                                                        • SHFileOperationW.SHELL32(?), ref: 0090D061
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 3164238972-1173974218
                                                        • Opcode ID: dc441dc3a6c98ac18b92cc7a6122b5a8d42f1a57811ba78511e4be8064c25576
                                                        • Instruction ID: 9112c55064bdb5831fd2a176ae091b446794a2c397ccd1d79dbf96893d9fdfb8
                                                        • Opcode Fuzzy Hash: dc441dc3a6c98ac18b92cc7a6122b5a8d42f1a57811ba78511e4be8064c25576
                                                        • Instruction Fuzzy Hash: 6F4158B19052199FDF12EBA4D981FDE77BDEF48380F0000E6E505E7181EA34A688CB51
                                                        APIs
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00932E1C
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00932E4F
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00932E84
                                                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00932EB6
                                                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00932EE0
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00932EF1
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00932F0B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$MessageSend
                                                        • String ID:
                                                        • API String ID: 2178440468-0
                                                        • Opcode ID: e3183c47b1fda7f3f710f927ce80477e601c9a9f37a9f39321a773dc89982025
                                                        • Instruction ID: b34bb9fd98b045c93153439122c0c331f1a7a4a5afcf05abd1f32ff512d9b292
                                                        • Opcode Fuzzy Hash: e3183c47b1fda7f3f710f927ce80477e601c9a9f37a9f39321a773dc89982025
                                                        • Instruction Fuzzy Hash: B3310435618251AFDB21CF58EC86F6537E9FB8AB10F150164FA059F2B1CB71A881EF41
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00907769
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0090778F
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00907792
                                                        • SysAllocString.OLEAUT32(?), ref: 009077B0
                                                        • SysFreeString.OLEAUT32(?), ref: 009077B9
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 009077DE
                                                        • SysAllocString.OLEAUT32(?), ref: 009077EC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 3abbf2f3d00669ef395dc788fbce33a1bd3eac7a18fc239ac55e679ecba9a4f2
                                                        • Instruction ID: e655ef5a0b02080980439a9249e04a1a24cd8e727492d433003a2d9d03437bb2
                                                        • Opcode Fuzzy Hash: 3abbf2f3d00669ef395dc788fbce33a1bd3eac7a18fc239ac55e679ecba9a4f2
                                                        • Instruction Fuzzy Hash: 91219576A08219AFDB10DFE8CC88CBB77ACEF097A47048425FA15DB1A1D674ED419B60
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00907842
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00907868
                                                        • SysAllocString.OLEAUT32(00000000), ref: 0090786B
                                                        • SysAllocString.OLEAUT32 ref: 0090788C
                                                        • SysFreeString.OLEAUT32 ref: 00907895
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 009078AF
                                                        • SysAllocString.OLEAUT32(?), ref: 009078BD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 5eb4e8d8d7d50aaaf77ed444f19a4e3e0848ca32feaacf249765e88d0601489f
                                                        • Instruction ID: c99884cc0357ffb41dea9258ab48561c98ab7e43db112f3d6926297ae3410023
                                                        • Opcode Fuzzy Hash: 5eb4e8d8d7d50aaaf77ed444f19a4e3e0848ca32feaacf249765e88d0601489f
                                                        • Instruction Fuzzy Hash: 5F216072A08204AFDB109FE8DC8CDBAB7ECEB097607108125FA15DB2A1D674EC41DB64
                                                        APIs
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 009104F2
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0091052E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CreateHandlePipe
                                                        • String ID: nul
                                                        • API String ID: 1424370930-2873401336
                                                        • Opcode ID: de4f728ee910785ad08e49a27e75c7524f07f345aaff24610e7e2e72ef78067e
                                                        • Instruction ID: 2cf62fc4dc2ad37bdd084c3dbb104bcb81f7dece043f5daea9516f1ec1238aef
                                                        • Opcode Fuzzy Hash: de4f728ee910785ad08e49a27e75c7524f07f345aaff24610e7e2e72ef78067e
                                                        • Instruction Fuzzy Hash: D32162756003099BDB209F6ADC44ADA77A9BF84764F204A19F8A1E71E0D7B1D9D0DF20
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 009105C6
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00910601
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CreateHandlePipe
                                                        • String ID: nul
                                                        • API String ID: 1424370930-2873401336
                                                        • Opcode ID: a8294001731fb9783765db8c109af9112ab5079907ba86aa7747841013447272
                                                        • Instruction ID: 12d0ab1cec275e94c5d68ab7303fee74ab7fbf312d32ae26b99d35a696d8100e
                                                        • Opcode Fuzzy Hash: a8294001731fb9783765db8c109af9112ab5079907ba86aa7747841013447272
                                                        • Instruction Fuzzy Hash: 962183756003099BDB209F698C04ADA77E8AFD5760F200B19F8A1E72D0D7F198E0DB10
                                                        APIs
                                                          • Part of subcall function 008A600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 008A604C
                                                          • Part of subcall function 008A600E: GetStockObject.GDI32(00000011), ref: 008A6060
                                                          • Part of subcall function 008A600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 008A606A
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00934112
                                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0093411F
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0093412A
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00934139
                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00934145
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 1025951953-3636473452
                                                        • Opcode ID: 59d3e1d2d5472a6c862c4c04f85069761e069af727e3842e903ca791c9656fe0
                                                        • Instruction ID: 0a80679e3b4fd37297b8e427061e15ced885f712b7e72a3be0a7fe2cb57f23ad
                                                        • Opcode Fuzzy Hash: 59d3e1d2d5472a6c862c4c04f85069761e069af727e3842e903ca791c9656fe0
                                                        • Instruction Fuzzy Hash: B611B2B2150219BFEF118FA4CC86EE77F5DEF18798F014111FA18A2050CA769C61DBA4
                                                        APIs
                                                          • Part of subcall function 008DD7A3: _free.LIBCMT ref: 008DD7CC
                                                        • _free.LIBCMT ref: 008DD82D
                                                          • Part of subcall function 008D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,008DD7D1,00000000,00000000,00000000,00000000,?,008DD7F8,00000000,00000007,00000000,?,008DDBF5,00000000), ref: 008D29DE
                                                          • Part of subcall function 008D29C8: GetLastError.KERNEL32(00000000,?,008DD7D1,00000000,00000000,00000000,00000000,?,008DD7F8,00000000,00000007,00000000,?,008DDBF5,00000000,00000000), ref: 008D29F0
                                                        • _free.LIBCMT ref: 008DD838
                                                        • _free.LIBCMT ref: 008DD843
                                                        • _free.LIBCMT ref: 008DD897
                                                        • _free.LIBCMT ref: 008DD8A2
                                                        • _free.LIBCMT ref: 008DD8AD
                                                        • _free.LIBCMT ref: 008DD8B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                        • Instruction ID: e6cdbbff83eb11a25ee886b417784282e7000e848ce1d81f7d3e9c1ea1d72b58
                                                        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                        • Instruction Fuzzy Hash: E2115E71540B04BAD621BFB9CC47FCB7BDCFF10700F400A26B29DE6292DA65B5059662
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0090DA74
                                                        • LoadStringW.USER32(00000000), ref: 0090DA7B
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0090DA91
                                                        • LoadStringW.USER32(00000000), ref: 0090DA98
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0090DADC
                                                        Strings
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 0090DAB9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message
                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                        • API String ID: 4072794657-3128320259
                                                        • Opcode ID: 512bc596009a64a07dac8900482f791e4ba7b588290e03679ef717d2649ae760
                                                        • Instruction ID: c5b4ec7118f656f08c0adb792391bba7f86767128eaa0d8aba45273c4bceef42
                                                        • Opcode Fuzzy Hash: 512bc596009a64a07dac8900482f791e4ba7b588290e03679ef717d2649ae760
                                                        • Instruction Fuzzy Hash: 450186F25042087FE7109BE09D89EEB336CE708305F400895B746F2081EA749E845F74
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(0176E2A0,0176E2A0), ref: 0091097B
                                                        • EnterCriticalSection.KERNEL32(0176E280,00000000), ref: 0091098D
                                                        • TerminateThread.KERNEL32(00000000,000001F6), ref: 0091099B
                                                        • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 009109A9
                                                        • CloseHandle.KERNEL32(00000000), ref: 009109B8
                                                        • InterlockedExchange.KERNEL32(0176E2A0,000001F6), ref: 009109C8
                                                        • LeaveCriticalSection.KERNEL32(0176E280), ref: 009109CF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: 94e93e376c0f4693f16c99a78cba30d7c07d69b6f75822a68c7a4c8948ab2181
                                                        • Instruction ID: 9147b1c1a85f465a84c9835cb082bfa767090baffdeeecf4bdc0a21c38386735
                                                        • Opcode Fuzzy Hash: 94e93e376c0f4693f16c99a78cba30d7c07d69b6f75822a68c7a4c8948ab2181
                                                        • Instruction Fuzzy Hash: D2F03171556902BBD7415F94EE8CBD67B39FF45702F401015F101608A1C7B5D4B5DF90
                                                        APIs
                                                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00921DC0
                                                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00921DE1
                                                        • WSAGetLastError.WSOCK32 ref: 00921DF2
                                                        • htons.WSOCK32(?,?,?,?,?), ref: 00921EDB
                                                        • inet_ntoa.WSOCK32(?), ref: 00921E8C
                                                          • Part of subcall function 009039E8: _strlen.LIBCMT ref: 009039F2
                                                          • Part of subcall function 00923224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0091EC0C), ref: 00923240
                                                        • _strlen.LIBCMT ref: 00921F35
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                        • String ID:
                                                        • API String ID: 3203458085-0
                                                        • Opcode ID: bb4a885f77227d7525136db8ed37cad59f1d25b06ccc5db2a06cfd32593570fc
                                                        • Instruction ID: b43b7f1211f5185c60e97986ea9473df60d1341f2d6e91b7cbb11555faa07eaf
                                                        • Opcode Fuzzy Hash: bb4a885f77227d7525136db8ed37cad59f1d25b06ccc5db2a06cfd32593570fc
                                                        • Instruction Fuzzy Hash: 87B1E230604310AFD324DF28D881E6A77A9FF95318F58895CF4669B2E2DB31ED41CB92
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 008A5D30
                                                        • GetWindowRect.USER32(?,?), ref: 008A5D71
                                                        • ScreenToClient.USER32(?,?), ref: 008A5D99
                                                        • GetClientRect.USER32(?,?), ref: 008A5ED7
                                                        • GetWindowRect.USER32(?,?), ref: 008A5EF8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Rect$Client$Window$Screen
                                                        • String ID:
                                                        • API String ID: 1296646539-0
                                                        • Opcode ID: 4079413759e47e5442ad35e57606513046ce0c9eae95cca072f2da6a1bb2cba1
                                                        • Instruction ID: be24bac2a53c9a92c7f6bda2cb2d8ccf9133e6f731a3266eb4c7e3f2da11ae60
                                                        • Opcode Fuzzy Hash: 4079413759e47e5442ad35e57606513046ce0c9eae95cca072f2da6a1bb2cba1
                                                        • Instruction Fuzzy Hash: 23B18A74A00B8ADBDB10CFA9C4807EEB7F1FF59310F14941AE8A9D7650DB30AA90DB50
                                                        APIs
                                                        • __allrem.LIBCMT ref: 008D00BA
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008D00D6
                                                        • __allrem.LIBCMT ref: 008D00ED
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008D010B
                                                        • __allrem.LIBCMT ref: 008D0122
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008D0140
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                        • String ID:
                                                        • API String ID: 1992179935-0
                                                        • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                        • Instruction ID: ef7e757fa4810399844e21c7b5c4d3d93d70fddccc6b19c433a7dd6890ebf859
                                                        • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                        • Instruction Fuzzy Hash: 9081D372A00B06ABEB249A6DCC41B6A73F9FF51364F24422FF551D7382EB70D9008B91
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,008C82D9,008C82D9,?,?,?,008D644F,00000001,00000001,8BE85006), ref: 008D6258
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,008D644F,00000001,00000001,8BE85006,?,?,?), ref: 008D62DE
                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 008D63D8
                                                        • __freea.LIBCMT ref: 008D63E5
                                                          • Part of subcall function 008D3820: RtlAllocateHeap.NTDLL(00000000,?,00971444,?,008BFDF5,?,?,008AA976,00000010,00971440,008A13FC,?,008A13C6,?,008A1129), ref: 008D3852
                                                        • __freea.LIBCMT ref: 008D63EE
                                                        • __freea.LIBCMT ref: 008D6413
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1414292761-0
                                                        • Opcode ID: 9618f7dd8ebeeda02b0194736ccaf57453a38a056a3672d5d17e2a622b6151f8
                                                        • Instruction ID: 14579566d660f441a3132bc2caec52cffabba22c130acd126506d6cb2f55c07d
                                                        • Opcode Fuzzy Hash: 9618f7dd8ebeeda02b0194736ccaf57453a38a056a3672d5d17e2a622b6151f8
                                                        • Instruction Fuzzy Hash: E851F172A0021AABDB298F64DC81EAF77AAFF44710F15432AFC05D6341EB34DC60D661
                                                        APIs
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                          • Part of subcall function 0092C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0092B6AE,?,?), ref: 0092C9B5
                                                          • Part of subcall function 0092C998: _wcslen.LIBCMT ref: 0092C9F1
                                                          • Part of subcall function 0092C998: _wcslen.LIBCMT ref: 0092CA68
                                                          • Part of subcall function 0092C998: _wcslen.LIBCMT ref: 0092CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0092BCCA
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0092BD25
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0092BD6A
                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0092BD99
                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0092BDF3
                                                        • RegCloseKey.ADVAPI32(?), ref: 0092BDFF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                        • String ID:
                                                        • API String ID: 1120388591-0
                                                        • Opcode ID: a9ccca95ba25516a727642d7f966ea019190a901a1693c080799c7858c027c95
                                                        • Instruction ID: 3fabb8e4ee5ef131a61c427be6ba3d488e5d5174bdfa6cf4e920a6f0af2f1280
                                                        • Opcode Fuzzy Hash: a9ccca95ba25516a727642d7f966ea019190a901a1693c080799c7858c027c95
                                                        • Instruction Fuzzy Hash: 2C81C370208241EFD714DF24D891E6ABBE9FF85308F14895CF5958B2A2DB31ED45CB92
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000035), ref: 008FF7B9
                                                        • SysAllocString.OLEAUT32(00000001), ref: 008FF860
                                                        • VariantCopy.OLEAUT32(008FFA64,00000000), ref: 008FF889
                                                        • VariantClear.OLEAUT32(008FFA64), ref: 008FF8AD
                                                        • VariantCopy.OLEAUT32(008FFA64,00000000), ref: 008FF8B1
                                                        • VariantClear.OLEAUT32(?), ref: 008FF8BB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCopy$AllocInitString
                                                        • String ID:
                                                        • API String ID: 3859894641-0
                                                        • Opcode ID: 284416152509522045a7174b738e297919039693952a2f3a931b716a189ca71b
                                                        • Instruction ID: 7b2a752471a63c5e96030709caf84490e2a4c3a60f103a05ae79a334b9f17bfe
                                                        • Opcode Fuzzy Hash: 284416152509522045a7174b738e297919039693952a2f3a931b716a189ca71b
                                                        • Instruction Fuzzy Hash: BE51D531610318BADF20AB79D895B39B7A4FF45314B248466EB05DF293DBB08C40DB57
                                                        APIs
                                                          • Part of subcall function 008A7620: _wcslen.LIBCMT ref: 008A7625
                                                          • Part of subcall function 008A6B57: _wcslen.LIBCMT ref: 008A6B6A
                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 009194E5
                                                        • _wcslen.LIBCMT ref: 00919506
                                                        • _wcslen.LIBCMT ref: 0091952D
                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00919585
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$FileName$OpenSave
                                                        • String ID: X
                                                        • API String ID: 83654149-3081909835
                                                        • Opcode ID: baa0acbaea406dce8b99f83fa08ad03a90a75f5ad1627749c29d6c424016c15d
                                                        • Instruction ID: 4fd3a883c718e3b5f5efbaca4be2797a40994b09b0bf7981bd946d7cb067ab30
                                                        • Opcode Fuzzy Hash: baa0acbaea406dce8b99f83fa08ad03a90a75f5ad1627749c29d6c424016c15d
                                                        • Instruction Fuzzy Hash: 31E1B4316083118FD724DF28C891AAAB7E5FF85314F04896DF8999B3A2DB31DD45CB92
                                                        APIs
                                                          • Part of subcall function 008B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 008B9BB2
                                                        • BeginPaint.USER32(?,?,?), ref: 008B9241
                                                        • GetWindowRect.USER32(?,?), ref: 008B92A5
                                                        • ScreenToClient.USER32(?,?), ref: 008B92C2
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 008B92D3
                                                        • EndPaint.USER32(?,?,?,?,?), ref: 008B9321
                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 008F71EA
                                                          • Part of subcall function 008B9339: BeginPath.GDI32(00000000), ref: 008B9357
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                        • String ID:
                                                        • API String ID: 3050599898-0
                                                        • Opcode ID: 93a14f5843d7a17c3c1829d1c9190f1b4fd7a619a159a1d4d1de82f59347cfbe
                                                        • Instruction ID: fc23920d0188a577f6c181f49d0769c4430fe3f7d0e78b4aede35cf3392e5520
                                                        • Opcode Fuzzy Hash: 93a14f5843d7a17c3c1829d1c9190f1b4fd7a619a159a1d4d1de82f59347cfbe
                                                        • Instruction Fuzzy Hash: 0641A171108205AFD711DF28DC85FB67BE8FB49324F140229FAA8D72A1C7319885EB62
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0091080C
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00910847
                                                        • EnterCriticalSection.KERNEL32(?), ref: 00910863
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 009108DC
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 009108F3
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00910921
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3368777196-0
                                                        • Opcode ID: 753d6fe5e38741cd9d8b6fe98dca4760d50d6f11017666ef528dd3e40c4dc1e3
                                                        • Instruction ID: 22f3cdc35975a0d9c9170f5e1afa4e2047e247f0c45923fa9f6d3409f85b4f45
                                                        • Opcode Fuzzy Hash: 753d6fe5e38741cd9d8b6fe98dca4760d50d6f11017666ef528dd3e40c4dc1e3
                                                        • Instruction Fuzzy Hash: 0F415B71A04209EBDF14AF64DC85AAA7779FF44310F1440A9E904EE297D771DEA0DBA0
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,008FF3AB,00000000,?,?,00000000,?,008F682C,00000004,00000000,00000000), ref: 0093824C
                                                        • EnableWindow.USER32(00000000,00000000), ref: 00938272
                                                        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 009382D1
                                                        • ShowWindow.USER32(00000000,00000004), ref: 009382E5
                                                        • EnableWindow.USER32(00000000,00000001), ref: 0093830B
                                                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0093832F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$Show$Enable$MessageSend
                                                        • String ID:
                                                        • API String ID: 642888154-0
                                                        • Opcode ID: fbffd21d142ead15e4b01476fe9a1a15df7e0a730b26a9abf8c91f965d04dd74
                                                        • Instruction ID: 6fd1733e5dc063b9052f41e01a17192b7bca2a08036174d1366cf32badf60d77
                                                        • Opcode Fuzzy Hash: fbffd21d142ead15e4b01476fe9a1a15df7e0a730b26a9abf8c91f965d04dd74
                                                        • Instruction Fuzzy Hash: C041D331605740AFDB25CF18DC99BE67BE4FB0A754F1801A8FA184B2A2CB31A842DF40
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00904C95
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00904CB2
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00904CEA
                                                        • _wcslen.LIBCMT ref: 00904D08
                                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00904D10
                                                        • _wcsstr.LIBVCRUNTIME ref: 00904D1A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                        • String ID:
                                                        • API String ID: 72514467-0
                                                        • Opcode ID: 3f36b1e68c85346f02ecf3598b02bc1087e51ca9ab906a0ab5bf2a6c0b643909
                                                        • Instruction ID: 811c6e4aa299783eff0896eba5c88739f6ea4bbf3a84d99d0acdb0d2538a03b9
                                                        • Opcode Fuzzy Hash: 3f36b1e68c85346f02ecf3598b02bc1087e51ca9ab906a0ab5bf2a6c0b643909
                                                        • Instruction Fuzzy Hash: D32129B22042117FEB155B399C0AE7B7BACEF45750F10402DFA05DA1D2DA71DC0097A1
                                                        APIs
                                                          • Part of subcall function 008A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,008A3A97,?,?,008A2E7F,?,?,?,00000000), ref: 008A3AC2
                                                        • _wcslen.LIBCMT ref: 0091587B
                                                        • CoInitialize.OLE32(00000000), ref: 00915995
                                                        • CoCreateInstance.OLE32(0093FCF8,00000000,00000001,0093FB68,?), ref: 009159AE
                                                        • CoUninitialize.OLE32 ref: 009159CC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 3172280962-24824748
                                                        • Opcode ID: cbc0902ae4acfe419a484f62d9ad1560584a080e01e8eeacbdfae8d3106f93c1
                                                        • Instruction ID: 4b1c7c87e9f9f214b7baa4158c5643c133d28abd208335d922b795e05293d2ef
                                                        • Opcode Fuzzy Hash: cbc0902ae4acfe419a484f62d9ad1560584a080e01e8eeacbdfae8d3106f93c1
                                                        • Instruction Fuzzy Hash: F2D16471608605DFC714DF18C480A6ABBE5FF89714F16885DF88A9B361DB31EC85CB92
                                                        APIs
                                                          • Part of subcall function 00900FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00900FCA
                                                          • Part of subcall function 00900FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00900FD6
                                                          • Part of subcall function 00900FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00900FE5
                                                          • Part of subcall function 00900FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00900FEC
                                                          • Part of subcall function 00900FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00901002
                                                        • GetLengthSid.ADVAPI32(?,00000000,00901335), ref: 009017AE
                                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 009017BA
                                                        • HeapAlloc.KERNEL32(00000000), ref: 009017C1
                                                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 009017DA
                                                        • GetProcessHeap.KERNEL32(00000000,00000000,00901335), ref: 009017EE
                                                        • HeapFree.KERNEL32(00000000), ref: 009017F5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                        • String ID:
                                                        • API String ID: 3008561057-0
                                                        • Opcode ID: 8c4d4dd50dbdaeee60e0d7d5a17f539c03e28f6dcc0dc38ac892fa7246c5e120
                                                        • Instruction ID: 5f0ad9d64192912d14d1a78049685444457ffa69a37434b136ebb23ca6dfe3a6
                                                        • Opcode Fuzzy Hash: 8c4d4dd50dbdaeee60e0d7d5a17f539c03e28f6dcc0dc38ac892fa7246c5e120
                                                        • Instruction Fuzzy Hash: 1411BB72618605FFDB149FA4CC49BAF7BEDEB46355F104018F481A7290C736A940EF60
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 009014FF
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00901506
                                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00901515
                                                        • CloseHandle.KERNEL32(00000004), ref: 00901520
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0090154F
                                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00901563
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 1413079979-0
                                                        • Opcode ID: ede2967bc3aee6f6579259262eb4090a06de5d112c9e8615145f39a64ecd87d1
                                                        • Instruction ID: 3e3950938c569fa3931691b6e672503f3b9f3aea4bb572b5eb1d92cd020f4c0e
                                                        • Opcode Fuzzy Hash: ede2967bc3aee6f6579259262eb4090a06de5d112c9e8615145f39a64ecd87d1
                                                        • Instruction Fuzzy Hash: 401126B2604249EFDF118FA8DD49BDE7BADEF48748F044025FA05A20A0C3758E64EB60
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,008C3379,008C2FE5), ref: 008C3390
                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 008C339E
                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 008C33B7
                                                        • SetLastError.KERNEL32(00000000,?,008C3379,008C2FE5), ref: 008C3409
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastValue___vcrt_
                                                        • String ID:
                                                        • API String ID: 3852720340-0
                                                        • Opcode ID: 01ef60f5077909088d8263a911faecceed53d5b1251fe439a2cefd90c7b6dd22
                                                        • Instruction ID: ec98d23145acf024dcbf4d652b570b714672c0100b4a607b24eefae11c8c56c6
                                                        • Opcode Fuzzy Hash: 01ef60f5077909088d8263a911faecceed53d5b1251fe439a2cefd90c7b6dd22
                                                        • Instruction Fuzzy Hash: EC01DE7221C311BAAA2427787C95F662AB4FB25379720822EF410C12F0EE71CD037688
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,008D5686,008E3CD6,?,00000000,?,008D5B6A,?,?,?,?,?,008CE6D1,?,00968A48), ref: 008D2D78
                                                        • _free.LIBCMT ref: 008D2DAB
                                                        • _free.LIBCMT ref: 008D2DD3
                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,008CE6D1,?,00968A48,00000010,008A4F4A,?,?,00000000,008E3CD6), ref: 008D2DE0
                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,008CE6D1,?,00968A48,00000010,008A4F4A,?,?,00000000,008E3CD6), ref: 008D2DEC
                                                        • _abort.LIBCMT ref: 008D2DF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_free$_abort
                                                        • String ID:
                                                        • API String ID: 3160817290-0
                                                        • Opcode ID: 0046606d3867eb1bd1bdd4fe631c36ed72bb8a7151b64ea26909c3fd6e25152d
                                                        • Instruction ID: ee4e9c7714fa456b3c399a60ebdf2661d027135d9cf88ce07fc5c71e7df34a21
                                                        • Opcode Fuzzy Hash: 0046606d3867eb1bd1bdd4fe631c36ed72bb8a7151b64ea26909c3fd6e25152d
                                                        • Instruction Fuzzy Hash: 24F0A971508A046BC212373D6C06E2A2756FBE27A5F25471BF864D23D1EF6488016262
                                                        APIs
                                                          • Part of subcall function 008B9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 008B9693
                                                          • Part of subcall function 008B9639: SelectObject.GDI32(?,00000000), ref: 008B96A2
                                                          • Part of subcall function 008B9639: BeginPath.GDI32(?), ref: 008B96B9
                                                          • Part of subcall function 008B9639: SelectObject.GDI32(?,00000000), ref: 008B96E2
                                                        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00938A4E
                                                        • LineTo.GDI32(?,00000003,00000000), ref: 00938A62
                                                        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00938A70
                                                        • LineTo.GDI32(?,00000000,00000003), ref: 00938A80
                                                        • EndPath.GDI32(?), ref: 00938A90
                                                        • StrokePath.GDI32(?), ref: 00938AA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                        • String ID:
                                                        • API String ID: 43455801-0
                                                        • Opcode ID: f07d18d362f9ff86a308a5187f66bcf1a156aeb41aa58cfa82d3b4add4193b3d
                                                        • Instruction ID: 16586adb1e84b40fe933af3cb8e8e4e4b06f4550021e6b8db98e486d47d56747
                                                        • Opcode Fuzzy Hash: f07d18d362f9ff86a308a5187f66bcf1a156aeb41aa58cfa82d3b4add4193b3d
                                                        • Instruction Fuzzy Hash: 96111B7601454CFFDF129F94DC88EAA7F6DEB08390F008012FA19AA1A1C7719D55EFA0
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00905218
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00905229
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00905230
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00905238
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0090524F
                                                        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00905261
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$Release
                                                        • String ID:
                                                        • API String ID: 1035833867-0
                                                        • Opcode ID: 167cc44d116802eb4485962bc01cac0af4c062c7f27d7a48ee864a8668f3e5d9
                                                        • Instruction ID: d2545a954d8b02b6094a04b6056d49ebc4768bf4c1d21e3f150a2b9239a4ec61
                                                        • Opcode Fuzzy Hash: 167cc44d116802eb4485962bc01cac0af4c062c7f27d7a48ee864a8668f3e5d9
                                                        • Instruction Fuzzy Hash: A8014FB5A04B19BBEB109BA99C49A5EBFB8EF48751F044065FA04F7291DA709C00DFA0
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 008A1BF4
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 008A1BFC
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 008A1C07
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 008A1C12
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 008A1C1A
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 008A1C22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: eb24e6d3ff6dbcc9dac1410533ba595d62a8b5767a51c6233968cf1710c0ddb0
                                                        • Instruction ID: 5ed4f2b734faaf2c920252cb2c010ce5ca459c47fe71eeed20cce87d707465be
                                                        • Opcode Fuzzy Hash: eb24e6d3ff6dbcc9dac1410533ba595d62a8b5767a51c6233968cf1710c0ddb0
                                                        • Instruction Fuzzy Hash: 660167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CFE5
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0090EB30
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0090EB46
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 0090EB55
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0090EB64
                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0090EB6E
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0090EB75
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: d2d009bddcc6fa5afea3f255b6f49026e764261bec1b711acb0c22c2a9f9fd71
                                                        • Instruction ID: 3fea2bcf98804e006c48cc18b4bbb8cb624ac77e2602b644c8ae76f13124b8bd
                                                        • Opcode Fuzzy Hash: d2d009bddcc6fa5afea3f255b6f49026e764261bec1b711acb0c22c2a9f9fd71
                                                        • Instruction Fuzzy Hash: 03F03AB2254959BBE7215BA29C0EEEF3A7CEFCAB15F004158F601E1091D7A05A01EBB5
                                                        APIs
                                                        • GetClientRect.USER32(?), ref: 008F7452
                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 008F7469
                                                        • GetWindowDC.USER32(?), ref: 008F7475
                                                        • GetPixel.GDI32(00000000,?,?), ref: 008F7484
                                                        • ReleaseDC.USER32(?,00000000), ref: 008F7496
                                                        • GetSysColor.USER32(00000005), ref: 008F74B0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                        • String ID:
                                                        • API String ID: 272304278-0
                                                        • Opcode ID: 9d05f8e344646797a0da5802384d00a846a238a6cab6adc734459fbedd8ba787
                                                        • Instruction ID: 05e6577d1c9c5c5daaec36daa2e9af429b75de8f145fd3de95bb41e6682b566d
                                                        • Opcode Fuzzy Hash: 9d05f8e344646797a0da5802384d00a846a238a6cab6adc734459fbedd8ba787
                                                        • Instruction Fuzzy Hash: 08018B72418A09FFEB105FA4DC09BAA7BB5FB04315F100060FA15A21A0CB311E51BF10
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0090187F
                                                        • UnloadUserProfile.USERENV(?,?), ref: 0090188B
                                                        • CloseHandle.KERNEL32(?), ref: 00901894
                                                        • CloseHandle.KERNEL32(?), ref: 0090189C
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 009018A5
                                                        • HeapFree.KERNEL32(00000000), ref: 009018AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                        • String ID:
                                                        • API String ID: 146765662-0
                                                        • Opcode ID: 7fdadb07fe35a711cc0acc92d4fb4e535cc39ff4711932a9dfd5e7fc3efd19a1
                                                        • Instruction ID: 4c90c6e28d5282f7e7a2b42856ca850415b3a6c538a6ae5b258bf4b38ac6df8e
                                                        • Opcode Fuzzy Hash: 7fdadb07fe35a711cc0acc92d4fb4e535cc39ff4711932a9dfd5e7fc3efd19a1
                                                        • Instruction Fuzzy Hash: 41E0C2B6018901BBDA015BE1ED0C90ABB29FB49B22B108220F225A1070CB329430FF50
                                                        APIs
                                                          • Part of subcall function 008A7620: _wcslen.LIBCMT ref: 008A7625
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0090C6EE
                                                        • _wcslen.LIBCMT ref: 0090C735
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0090C79C
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0090C7CA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info_wcslen$Default
                                                        • String ID: 0
                                                        • API String ID: 1227352736-4108050209
                                                        • Opcode ID: cab3d003850737a565dfa4285137d111f637834f6711a5886a911bbded8d123c
                                                        • Instruction ID: 4d342003d2f7a1be2124c3705cad8c28f86f589ad9c2fcb1fb4f01d8c875e2cc
                                                        • Opcode Fuzzy Hash: cab3d003850737a565dfa4285137d111f637834f6711a5886a911bbded8d123c
                                                        • Instruction Fuzzy Hash: 5151CEB26183019FD7249F28C885B6B77E8EF89310F040B2DF995E32E1DB74D9449B52
                                                        APIs
                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 0092AEA3
                                                          • Part of subcall function 008A7620: _wcslen.LIBCMT ref: 008A7625
                                                        • GetProcessId.KERNEL32(00000000), ref: 0092AF38
                                                        • CloseHandle.KERNEL32(00000000), ref: 0092AF67
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CloseExecuteHandleProcessShell_wcslen
                                                        • String ID: <$@
                                                        • API String ID: 146682121-1426351568
                                                        • Opcode ID: 4e3aa6bb4f17b95926185ba288a357687a37e9a33d6d10137e0a03c61d9e5053
                                                        • Instruction ID: 118e2a946243ac8a824a530de45e6de88a873aa4f3101c2b8cdd895e22179ca2
                                                        • Opcode Fuzzy Hash: 4e3aa6bb4f17b95926185ba288a357687a37e9a33d6d10137e0a03c61d9e5053
                                                        • Instruction Fuzzy Hash: 46719B71A00625DFDB14EF58D484A9EBBF4FF09300F048499E816AB7A2CB74ED45CB92
                                                        APIs
                                                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00907206
                                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0090723C
                                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0090724D
                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 009072CF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                                        • String ID: DllGetClassObject
                                                        • API String ID: 753597075-1075368562
                                                        • Opcode ID: 5281702a46e59a73c2745009420f5576f8e905fa5e2273b69f0b8a61f2be0fb9
                                                        • Instruction ID: 33bdcd2cf5a8beda71de7d0ddd723e91eca7cfbbc63198ea2523feb09fddf82e
                                                        • Opcode Fuzzy Hash: 5281702a46e59a73c2745009420f5576f8e905fa5e2273b69f0b8a61f2be0fb9
                                                        • Instruction Fuzzy Hash: 2F4186B1904204EFDB15CF98C884B9ABBB9EF44320F1584A9BD159F24AD7B0ED44DBA0
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00933E35
                                                        • IsMenu.USER32(?), ref: 00933E4A
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00933E92
                                                        • DrawMenuBar.USER32 ref: 00933EA5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$DrawInfoInsert
                                                        • String ID: 0
                                                        • API String ID: 3076010158-4108050209
                                                        • Opcode ID: 202372ab023b6662598cc166e606d17e1096151f5155819c2203790e405f584f
                                                        • Instruction ID: 5b47bcd05fdf94f7eed854c5907e4ed89642da0ef8edf514b26aa5a0940ab6f0
                                                        • Opcode Fuzzy Hash: 202372ab023b6662598cc166e606d17e1096151f5155819c2203790e405f584f
                                                        • Instruction Fuzzy Hash: 88416775A14209AFDB20DF64D884EAABBB9FF48350F048129F906A7250D730EE41DF61
                                                        APIs
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                          • Part of subcall function 00903CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00903CCA
                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00901E66
                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00901E79
                                                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00901EA9
                                                          • Part of subcall function 008A6B57: _wcslen.LIBCMT ref: 008A6B6A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen$ClassName
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 2081771294-1403004172
                                                        • Opcode ID: be28c70231fed2904cf858d9684841ff5eb492baf65cbb6ecb0dfe182a181d6e
                                                        • Instruction ID: 49f602dccf5e06a98654c4f7b552add4ce1acc879394de007e25ced2975f22b6
                                                        • Opcode Fuzzy Hash: be28c70231fed2904cf858d9684841ff5eb492baf65cbb6ecb0dfe182a181d6e
                                                        • Instruction Fuzzy Hash: 8321B571A00104BFEB14AB68DC46CFFB7BDEF46364B144529F865E71E1DB384A0A9A20
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00932F8D
                                                        • LoadLibraryW.KERNEL32(?), ref: 00932F94
                                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00932FA9
                                                        • DestroyWindow.USER32(?), ref: 00932FB1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyLibraryLoadWindow
                                                        • String ID: SysAnimate32
                                                        • API String ID: 3529120543-1011021900
                                                        • Opcode ID: bd191d559ebb069c31b2e6b20986c906c5acbc243e40a4a379bd2c44b40b68b1
                                                        • Instruction ID: 6092be820a0190795863df689e5635504daeedd24efab0f5da4531348d8328c1
                                                        • Opcode Fuzzy Hash: bd191d559ebb069c31b2e6b20986c906c5acbc243e40a4a379bd2c44b40b68b1
                                                        • Instruction Fuzzy Hash: 7E219D72214205ABEB114FA4DC81FBB7BBDEF59368F104618FA50E61A0D771DC91AF60
                                                        APIs
                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,008C4D1E,008D28E9,?,008C4CBE,008D28E9,009688B8,0000000C,008C4E15,008D28E9,00000002), ref: 008C4D8D
                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 008C4DA0
                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,008C4D1E,008D28E9,?,008C4CBE,008D28E9,009688B8,0000000C,008C4E15,008D28E9,00000002,00000000), ref: 008C4DC3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: 07d7f7a75e1b849285b719a3ebad5fdce6aea5e738b8ae93d07ca0c29ed9441b
                                                        • Instruction ID: e92002d9f51b6e272be3538c7711bb9f5afc5cabf50b755815dfa757644739fa
                                                        • Opcode Fuzzy Hash: 07d7f7a75e1b849285b719a3ebad5fdce6aea5e738b8ae93d07ca0c29ed9441b
                                                        • Instruction Fuzzy Hash: F2F0AF75A14208BBDB109F90DC09FADBBB5EF44751F0000A8FA06E2260CB709A80EF91
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,008A4EDD,?,00971418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 008A4E9C
                                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 008A4EAE
                                                        • FreeLibrary.KERNEL32(00000000,?,?,008A4EDD,?,00971418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 008A4EC0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                        • API String ID: 145871493-3689287502
                                                        • Opcode ID: ec66fdffab3810a85c8d2bfd32194bb62b0b4f4269be21cc70fb0a9df67703bb
                                                        • Instruction ID: 813dfe94f731920a829d359a3ed41e22d8cbfbb5d8e1d6021af4514a59ad5b46
                                                        • Opcode Fuzzy Hash: ec66fdffab3810a85c8d2bfd32194bb62b0b4f4269be21cc70fb0a9df67703bb
                                                        • Instruction Fuzzy Hash: 98E08676A199225BA72117656C18A5B6554FFC2B72B050115FD05F2100DBA0CD01AAE1
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,008E3CDE,?,00971418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 008A4E62
                                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 008A4E74
                                                        • FreeLibrary.KERNEL32(00000000,?,?,008E3CDE,?,00971418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 008A4E87
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                        • API String ID: 145871493-1355242751
                                                        • Opcode ID: 103a80e717c7146643b55378db3e1bac2734388915f6ceaf4b296caa59f14f1f
                                                        • Instruction ID: 64fb1c674ce9a11f7f3afd8d42db19c03e60af0f256221b3bc12a300d9172031
                                                        • Opcode Fuzzy Hash: 103a80e717c7146643b55378db3e1bac2734388915f6ceaf4b296caa59f14f1f
                                                        • Instruction Fuzzy Hash: E8D0C23651AE21576A221B247C08D8B6A18FFC2B253450111B805F2110CFA0CD11EAD0
                                                        APIs
                                                        • GetCurrentProcessId.KERNEL32 ref: 0092A427
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0092A435
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0092A468
                                                        • CloseHandle.KERNEL32(?), ref: 0092A63D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                                        • String ID:
                                                        • API String ID: 3488606520-0
                                                        • Opcode ID: 5d76207a7855f05f5ae80b06f1d18a7c6b238955a2b689a3d550f0b315ada58c
                                                        • Instruction ID: d3cad6daf184deeb77367f2964e4f9fb2bffd8e00590b9701d046af671069547
                                                        • Opcode Fuzzy Hash: 5d76207a7855f05f5ae80b06f1d18a7c6b238955a2b689a3d550f0b315ada58c
                                                        • Instruction Fuzzy Hash: 18A17B716047009FE720DF28D886F2AB7E5AB84714F14881DF55ADB792DBB0EC418B92
                                                        APIs
                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00943700), ref: 008DBB91
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0097121C,000000FF,00000000,0000003F,00000000,?,?), ref: 008DBC09
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00971270,000000FF,?,0000003F,00000000,?), ref: 008DBC36
                                                        • _free.LIBCMT ref: 008DBB7F
                                                          • Part of subcall function 008D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,008DD7D1,00000000,00000000,00000000,00000000,?,008DD7F8,00000000,00000007,00000000,?,008DDBF5,00000000), ref: 008D29DE
                                                          • Part of subcall function 008D29C8: GetLastError.KERNEL32(00000000,?,008DD7D1,00000000,00000000,00000000,00000000,?,008DD7F8,00000000,00000007,00000000,?,008DDBF5,00000000,00000000), ref: 008D29F0
                                                        • _free.LIBCMT ref: 008DBD4B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                        • String ID:
                                                        • API String ID: 1286116820-0
                                                        • Opcode ID: 3af952b5eb72adfdc461fb7916aafd68c2fa11d75c2116f0623b650c63c01a0e
                                                        • Instruction ID: 3daba803b0b04f003c49fd525b7e0c15dae1430c8ac7d77890551a4a35ebfb8c
                                                        • Opcode Fuzzy Hash: 3af952b5eb72adfdc461fb7916aafd68c2fa11d75c2116f0623b650c63c01a0e
                                                        • Instruction Fuzzy Hash: C651D772914209EFCB14EF6D9C819AEB7B8FF40360B11436BE464D73A1EB709E40AB51
                                                        APIs
                                                          • Part of subcall function 0090DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0090CF22,?), ref: 0090DDFD
                                                          • Part of subcall function 0090DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0090CF22,?), ref: 0090DE16
                                                          • Part of subcall function 0090E199: GetFileAttributesW.KERNEL32(?,0090CF95), ref: 0090E19A
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0090E473
                                                        • MoveFileW.KERNEL32(?,?), ref: 0090E4AC
                                                        • _wcslen.LIBCMT ref: 0090E5EB
                                                        • _wcslen.LIBCMT ref: 0090E603
                                                        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0090E650
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                        • String ID:
                                                        • API String ID: 3183298772-0
                                                        • Opcode ID: 5277daee30946f57f9c9e9c0314f7e971074b4ef0cf2ba886339eb75afd97d9d
                                                        • Instruction ID: 31a06ba8f535a3c561461550a167be04384ee96591b48005fedebdbbfa0eabe3
                                                        • Opcode Fuzzy Hash: 5277daee30946f57f9c9e9c0314f7e971074b4ef0cf2ba886339eb75afd97d9d
                                                        • Instruction Fuzzy Hash: C8515FB24087459FD724EB94D881ADBB3ECEF85340F00492EF589D3191EE75E6888B66
                                                        APIs
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                          • Part of subcall function 0092C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0092B6AE,?,?), ref: 0092C9B5
                                                          • Part of subcall function 0092C998: _wcslen.LIBCMT ref: 0092C9F1
                                                          • Part of subcall function 0092C998: _wcslen.LIBCMT ref: 0092CA68
                                                          • Part of subcall function 0092C998: _wcslen.LIBCMT ref: 0092CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0092BAA5
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0092BB00
                                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0092BB63
                                                        • RegCloseKey.ADVAPI32(?,?), ref: 0092BBA6
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0092BBB3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                        • String ID:
                                                        • API String ID: 826366716-0
                                                        • Opcode ID: b084cfaadcbc064758c9540b196140c7f33e10a02067994db68a3c5811d12c72
                                                        • Instruction ID: 0e49a3186391af7a0a0debd50d81ae201614786cae2e49a28fc35c11182a0cf5
                                                        • Opcode Fuzzy Hash: b084cfaadcbc064758c9540b196140c7f33e10a02067994db68a3c5811d12c72
                                                        • Instruction Fuzzy Hash: F561C271208241EFD714DF14D490E2ABBE9FF85308F14896CF4998B2A2DB31ED45CB92
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00908BCD
                                                        • VariantClear.OLEAUT32 ref: 00908C3E
                                                        • VariantClear.OLEAUT32 ref: 00908C9D
                                                        • VariantClear.OLEAUT32(?), ref: 00908D10
                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00908D3B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ChangeInitType
                                                        • String ID:
                                                        • API String ID: 4136290138-0
                                                        • Opcode ID: af0c27b9c972ea647d54a8558991288101f443775590f30185df2cf839eec069
                                                        • Instruction ID: 05b4721c853361c6eb486c5b8f0b8e63a1ce9ec5883a8d90b817dacbdc050ce8
                                                        • Opcode Fuzzy Hash: af0c27b9c972ea647d54a8558991288101f443775590f30185df2cf839eec069
                                                        • Instruction Fuzzy Hash: 77517CB5A10619EFCB10CF68C884AAAB7F9FF89310B158559F945DB390E730E911CF90
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00918BAE
                                                        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00918BDA
                                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00918C32
                                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00918C57
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00918C5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String
                                                        • String ID:
                                                        • API String ID: 2832842796-0
                                                        • Opcode ID: 25cb0aabe174e774059864df3a76c6362ebf51cadaf87f627a4460286ae33b83
                                                        • Instruction ID: 276487dbee38c681812c5e57802a5b530f0057cefa242c01a91988e4bcd19115
                                                        • Opcode Fuzzy Hash: 25cb0aabe174e774059864df3a76c6362ebf51cadaf87f627a4460286ae33b83
                                                        • Instruction Fuzzy Hash: 3F515B35A006189FDB00DF68C881AAEBBF5FF49314F088458E849AB362CB35ED51DF91
                                                        APIs
                                                        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00928F40
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00928FD0
                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00928FEC
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00929032
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00929052
                                                          • Part of subcall function 008BF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00911043,?,761DE610), ref: 008BF6E6
                                                          • Part of subcall function 008BF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,008FFA64,00000000,00000000,?,?,00911043,?,761DE610,?,008FFA64), ref: 008BF70D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                        • String ID:
                                                        • API String ID: 666041331-0
                                                        • Opcode ID: ab3ac587ab8e7533759321eb7d300f3ed881512eaa3e69ced2561025fa0079dc
                                                        • Instruction ID: ffe29bd329b9c865c70c0b280e8912ebc9687dfc3f695408b77fec0ee0d770f2
                                                        • Opcode Fuzzy Hash: ab3ac587ab8e7533759321eb7d300f3ed881512eaa3e69ced2561025fa0079dc
                                                        • Instruction Fuzzy Hash: D9514934A05215DFD700DF58C4948AEBBF5FF49314F0880A8E80AAB762DB31ED86CB91
                                                        APIs
                                                        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00936C33
                                                        • SetWindowLongW.USER32(?,000000EC,?), ref: 00936C4A
                                                        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00936C73
                                                        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0091AB79,00000000,00000000), ref: 00936C98
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00936CC7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$MessageSendShow
                                                        • String ID:
                                                        • API String ID: 3688381893-0
                                                        • Opcode ID: ce6178c59ee9d3b6aa0d3e32240435f02d2fd806ff6cf9fe42ba4434b177c0e8
                                                        • Instruction ID: 4214c965cf6208e5ef4080dfb7b33720ee9295f443b8f725616dbd42a416fb12
                                                        • Opcode Fuzzy Hash: ce6178c59ee9d3b6aa0d3e32240435f02d2fd806ff6cf9fe42ba4434b177c0e8
                                                        • Instruction Fuzzy Hash: 9441C775A08104BFDB24CF28CC55FA5BBA9EB09350F159268FAD9A72E0C371ED41DE50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: 8e8611cbcb1a6d66dc78b8ed8e5fab3bc0ea18286ee703cb94c500d5fc1eb78d
                                                        • Instruction ID: ae2da2fbd4f71bbbbe59a4ca48aecf3a7f313f622e24b814e276c6b7c3571ffc
                                                        • Opcode Fuzzy Hash: 8e8611cbcb1a6d66dc78b8ed8e5fab3bc0ea18286ee703cb94c500d5fc1eb78d
                                                        • Instruction Fuzzy Hash: C441D672A00204AFCB24DF78C881A6DB7B5FF99314F1546A9E615EB351D631ED01DB81
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 008B9141
                                                        • ScreenToClient.USER32(00000000,?), ref: 008B915E
                                                        • GetAsyncKeyState.USER32(00000001), ref: 008B9183
                                                        • GetAsyncKeyState.USER32(00000002), ref: 008B919D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorScreen
                                                        • String ID:
                                                        • API String ID: 4210589936-0
                                                        • Opcode ID: d13a4a808a5a3408c2fcab879fb2235d5dd1f56ef4317ded42def5f422839864
                                                        • Instruction ID: 41c1fbd5360483edd79a08d2725a4bafbb923d688535278cf7dd4c7ad6ff3bae
                                                        • Opcode Fuzzy Hash: d13a4a808a5a3408c2fcab879fb2235d5dd1f56ef4317ded42def5f422839864
                                                        • Instruction Fuzzy Hash: 6B41AE71A0860AFBDF159F68C844BFEB774FF05324F208219E565E6290C7346994DF91
                                                        APIs
                                                        • GetInputState.USER32 ref: 009138CB
                                                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00913922
                                                        • TranslateMessage.USER32(?), ref: 0091394B
                                                        • DispatchMessageW.USER32(?), ref: 00913955
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00913966
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                        • String ID:
                                                        • API String ID: 2256411358-0
                                                        • Opcode ID: 9915ad801767bd9938fa114692e05d9f130e8319add8d75bbb645259469a7664
                                                        • Instruction ID: f187232c96ed66111174191ad54e3e7de881e9f733440bb0384724d3695a3181
                                                        • Opcode Fuzzy Hash: 9915ad801767bd9938fa114692e05d9f130e8319add8d75bbb645259469a7664
                                                        • Instruction Fuzzy Hash: 9D31D771718349DFEB39CB399849FF63BBCEB05300F048569E466921A0E3B4AAC5DB11
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0091C21E,00000000), ref: 0091CF38
                                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 0091CF6F
                                                        • GetLastError.KERNEL32(?,00000000,?,?,?,0091C21E,00000000), ref: 0091CFB4
                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,0091C21E,00000000), ref: 0091CFC8
                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,0091C21E,00000000), ref: 0091CFF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                        • String ID:
                                                        • API String ID: 3191363074-0
                                                        • Opcode ID: 2837f159fe9bd73e004b8b8e932ec31aeaae6fe221d74c33bdca6e2a8aa43465
                                                        • Instruction ID: 32e0a28c57af78f569d608bc2289204b4edbd4588148abb2f13455d8d223c8ea
                                                        • Opcode Fuzzy Hash: 2837f159fe9bd73e004b8b8e932ec31aeaae6fe221d74c33bdca6e2a8aa43465
                                                        • Instruction Fuzzy Hash: 52314FB1644609AFDB20DFA5C884AEBBBFDEB14351B10442EF516E2251D730ED86DB60
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00901915
                                                        • PostMessageW.USER32(00000001,00000201,00000001), ref: 009019C1
                                                        • Sleep.KERNEL32(00000000,?,?,?), ref: 009019C9
                                                        • PostMessageW.USER32(00000001,00000202,00000000), ref: 009019DA
                                                        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 009019E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleep$RectWindow
                                                        • String ID:
                                                        • API String ID: 3382505437-0
                                                        • Opcode ID: e0ba3c33a4679f4e16532ad222eed2f6577f9441a40770f8440866522f1a99b3
                                                        • Instruction ID: d70fb4b4fa6fb39d5f7f098c8fe09eb838668d4974a4ef5d6ffb3bacd39b222e
                                                        • Opcode Fuzzy Hash: e0ba3c33a4679f4e16532ad222eed2f6577f9441a40770f8440866522f1a99b3
                                                        • Instruction Fuzzy Hash: 9D31D172A00219EFCB00CFA8DD99ADE3BB5EB45315F104229F931A72D1C7709D44DB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00935745
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 0093579D
                                                        • _wcslen.LIBCMT ref: 009357AF
                                                        • _wcslen.LIBCMT ref: 009357BA
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00935816
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen
                                                        • String ID:
                                                        • API String ID: 763830540-0
                                                        • Opcode ID: 52c71ad7541b4e1fa5489207900159fbfad433e0533531d2099f0f4a62e37e2c
                                                        • Instruction ID: a61686e8538dd3ca20ff28258ceddeefdb7c8094bcfbc74e3b03bb95be689522
                                                        • Opcode Fuzzy Hash: 52c71ad7541b4e1fa5489207900159fbfad433e0533531d2099f0f4a62e37e2c
                                                        • Instruction Fuzzy Hash: E221D2719046189BDB209FA4CC89AEE7BBDFF08324F108216E929EA190D7708A85CF51
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 00920951
                                                        • GetForegroundWindow.USER32 ref: 00920968
                                                        • GetDC.USER32(00000000), ref: 009209A4
                                                        • GetPixel.GDI32(00000000,?,00000003), ref: 009209B0
                                                        • ReleaseDC.USER32(00000000,00000003), ref: 009209E8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: bedd4360ab7aec1f1b73775ceb0201d1c7552b898d0c7e7f7277bd910cbe8b42
                                                        • Instruction ID: 53c7e3360dc8b6cea30d2cfefd7e1fccc8bd90cc760f0b29c783398fc2f1e867
                                                        • Opcode Fuzzy Hash: bedd4360ab7aec1f1b73775ceb0201d1c7552b898d0c7e7f7277bd910cbe8b42
                                                        • Instruction Fuzzy Hash: 83216F75A00614AFD704EF69D885AAEBBE9EF85740F048468E84AE7762CB70AC44DF50
                                                        APIs
                                                        • GetEnvironmentStringsW.KERNEL32 ref: 008DCDC6
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 008DCDE9
                                                          • Part of subcall function 008D3820: RtlAllocateHeap.NTDLL(00000000,?,00971444,?,008BFDF5,?,?,008AA976,00000010,00971440,008A13FC,?,008A13C6,?,008A1129), ref: 008D3852
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 008DCE0F
                                                        • _free.LIBCMT ref: 008DCE22
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 008DCE31
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                        • String ID:
                                                        • API String ID: 336800556-0
                                                        • Opcode ID: 5032335c54e29bb350981ac7b56a1133d0349b0f1ca5101b13fc37f1f780e47d
                                                        • Instruction ID: 31a465e0de5cd190fb57e8e9b1b790a14ef3d12bea555ab3be048cbc21a6a544
                                                        • Opcode Fuzzy Hash: 5032335c54e29bb350981ac7b56a1133d0349b0f1ca5101b13fc37f1f780e47d
                                                        • Instruction Fuzzy Hash: F101D8F26056167F232116BAAC48D7BBB6DFEC6BA1315032BF905D7300DB608D01E6B1
                                                        APIs
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 008B9693
                                                        • SelectObject.GDI32(?,00000000), ref: 008B96A2
                                                        • BeginPath.GDI32(?), ref: 008B96B9
                                                        • SelectObject.GDI32(?,00000000), ref: 008B96E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: 836418272c9f21caf40007e0b56a2e3800ae82b4f8d71b900954da8a57c673a9
                                                        • Instruction ID: 6fba6e1375b124e15aa1354815571f11118b16d09c9252a8677151d66b8b6bd7
                                                        • Opcode Fuzzy Hash: 836418272c9f21caf40007e0b56a2e3800ae82b4f8d71b900954da8a57c673a9
                                                        • Instruction Fuzzy Hash: 4221B372829309EBDB108F6CEC047E97BB4FB61355F100216F654E62B0D3705886EF90
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 008B98CC
                                                        • SetTextColor.GDI32(?,?), ref: 008B98D6
                                                        • SetBkMode.GDI32(?,00000001), ref: 008B98E9
                                                        • GetStockObject.GDI32(00000005), ref: 008B98F1
                                                        • GetWindowLongW.USER32(?,000000EB), ref: 008B9952
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Color$LongModeObjectStockTextWindow
                                                        • String ID:
                                                        • API String ID: 1860813098-0
                                                        • Opcode ID: 162ba42c083d00564e27180124c1a4c539a85e694e23811dd2e87ec26b9543e7
                                                        • Instruction ID: 74762c2b8313bd11a258293a60c24563c02dc3db5c4ce822964935c04dcd51a4
                                                        • Opcode Fuzzy Hash: 162ba42c083d00564e27180124c1a4c539a85e694e23811dd2e87ec26b9543e7
                                                        • Instruction Fuzzy Hash: B621D1726492809FDB228F29EC55AE53F60FB16331B08019DE7D2DB2B2C7364981DB10
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: 46e7530d65647f6d141438e2cf599ae2dd55a709ede3c7d144740670fa7b68e0
                                                        • Instruction ID: cc7eac5dbc1e8b010a631e68eb5a12d3cb08eba7efc81f0565333045649f8cdb
                                                        • Opcode Fuzzy Hash: 46e7530d65647f6d141438e2cf599ae2dd55a709ede3c7d144740670fa7b68e0
                                                        • Instruction Fuzzy Hash: 0201B9A1681605BFD71855249E96FBB736DEF6239CF014024FD08DA2C2F774EE10AAA1
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,008CF2DE,008D3863,00971444,?,008BFDF5,?,?,008AA976,00000010,00971440,008A13FC,?,008A13C6), ref: 008D2DFD
                                                        • _free.LIBCMT ref: 008D2E32
                                                        • _free.LIBCMT ref: 008D2E59
                                                        • SetLastError.KERNEL32(00000000,008A1129), ref: 008D2E66
                                                        • SetLastError.KERNEL32(00000000,008A1129), ref: 008D2E6F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_free
                                                        • String ID:
                                                        • API String ID: 3170660625-0
                                                        • Opcode ID: ef4ce6fa96fd9408be92b8404c3130e6d241224803bcea38ed62811f15e1b395
                                                        • Instruction ID: 46c76a60386301cf038ec66e64d245822e9498511f3c71475acaacee1fe96fe0
                                                        • Opcode Fuzzy Hash: ef4ce6fa96fd9408be92b8404c3130e6d241224803bcea38ed62811f15e1b395
                                                        • Instruction Fuzzy Hash: 4C01F472609A006BC61267386C45E2B2759FBF13B6B25472BF425E33D3EBB0CC016122
                                                        APIs
                                                        • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,008FFF41,80070057,?,?,?,0090035E), ref: 0090002B
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008FFF41,80070057,?,?), ref: 00900046
                                                        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008FFF41,80070057,?,?), ref: 00900054
                                                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008FFF41,80070057,?), ref: 00900064
                                                        • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,008FFF41,80070057,?,?), ref: 00900070
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                                        • String ID:
                                                        • API String ID: 3897988419-0
                                                        • Opcode ID: 362df0e0339734f6e7d2121ceb2a69d1f2ba7b62b4f087e74ad0129632ff6226
                                                        • Instruction ID: 2aba48274c6fe5fa54fd22abe1c7681d8aae7f7199fbeadb6488e261cd537492
                                                        • Opcode Fuzzy Hash: 362df0e0339734f6e7d2121ceb2a69d1f2ba7b62b4f087e74ad0129632ff6226
                                                        • Instruction Fuzzy Hash: C801A2B6610604BFDB104F68DC08BAA7AFDEF84791F144124F905E2250DB75DE40DBA0
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 0090E997
                                                        • QueryPerformanceFrequency.KERNEL32(?), ref: 0090E9A5
                                                        • Sleep.KERNEL32(00000000), ref: 0090E9AD
                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 0090E9B7
                                                        • Sleep.KERNEL32 ref: 0090E9F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: a7eda483eb58c66cd5bd608ae74acdebbfd121ab8b8219faa6ffd3eb09c9cd6d
                                                        • Instruction ID: 699a86768726dea1dd7bca041aa6344fdfbe7a2c0695706a42a911e225120f9b
                                                        • Opcode Fuzzy Hash: a7eda483eb58c66cd5bd608ae74acdebbfd121ab8b8219faa6ffd3eb09c9cd6d
                                                        • Instruction Fuzzy Hash: 05015771C09A2DDFCF00ABE5D849AEDBB78FB09301F000946E512B2290CB349650ABA1
                                                        APIs
                                                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00901114
                                                        • GetLastError.KERNEL32(?,00000000,00000000,?,?,00900B9B,?,?,?), ref: 00901120
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00900B9B,?,?,?), ref: 0090112F
                                                        • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00900B9B,?,?,?), ref: 00901136
                                                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0090114D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 842720411-0
                                                        • Opcode ID: 1e77497275e2f6dc8428e545c46e470a62ee5470ba0b325a5a6cc32553dd93b0
                                                        • Instruction ID: d1105a821413b499e34c3bc10b3639dbc91740d9b8d5ea9549bd3990393eb419
                                                        • Opcode Fuzzy Hash: 1e77497275e2f6dc8428e545c46e470a62ee5470ba0b325a5a6cc32553dd93b0
                                                        • Instruction Fuzzy Hash: FB0119B5214615BFDB154FA5DC49A6A3B6EEF893A0B204419FA45E73A0DB31DC00AF60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00900FCA
                                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00900FD6
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00900FE5
                                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00900FEC
                                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00901002
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: c918651e07f71c7d6fd7faaeb7d7f4067a241c8dee2e25b33393193188589e1c
                                                        • Instruction ID: 0dc1237d26d594aa47392153fc4e5dec0913fefe95286d9ae08cd031d879c2cc
                                                        • Opcode Fuzzy Hash: c918651e07f71c7d6fd7faaeb7d7f4067a241c8dee2e25b33393193188589e1c
                                                        • Instruction Fuzzy Hash: 2DF049B5214701AFDB224FA49C49F563BADEF89762F104414FA85E72A1CA70DC50AF60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0090102A
                                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00901036
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00901045
                                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0090104C
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00901062
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: 96c2ed976fa3eeacd162d0404c739a6c52b412db2d85061cbdda08f537fa1bc0
                                                        • Instruction ID: 18970afcc610d3e14b844a97e517afa91fc01eab594285f44f220973c79c9eb2
                                                        • Opcode Fuzzy Hash: 96c2ed976fa3eeacd162d0404c739a6c52b412db2d85061cbdda08f537fa1bc0
                                                        • Instruction Fuzzy Hash: ABF06DB5214701EFDB215FA4EC49F563BADEF89B61F100414FA85E7290CA70D850AF60
                                                        APIs
                                                        • CloseHandle.KERNEL32(?,?,?,?,0091017D,?,009132FC,?,00000001,008E2592,?), ref: 00910324
                                                        • CloseHandle.KERNEL32(?,?,?,?,0091017D,?,009132FC,?,00000001,008E2592,?), ref: 00910331
                                                        • CloseHandle.KERNEL32(?,?,?,?,0091017D,?,009132FC,?,00000001,008E2592,?), ref: 0091033E
                                                        • CloseHandle.KERNEL32(?,?,?,?,0091017D,?,009132FC,?,00000001,008E2592,?), ref: 0091034B
                                                        • CloseHandle.KERNEL32(?,?,?,?,0091017D,?,009132FC,?,00000001,008E2592,?), ref: 00910358
                                                        • CloseHandle.KERNEL32(?,?,?,?,0091017D,?,009132FC,?,00000001,008E2592,?), ref: 00910365
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle
                                                        • String ID:
                                                        • API String ID: 2962429428-0
                                                        • Opcode ID: 8e31735e56c5c1e74a90c26e15472e798bbd5a29463b21347815cd9021d6a295
                                                        • Instruction ID: 095103d8820fea49e929da173605c66b57ecf5c5cb6b60cdf20857c5a38ccc1a
                                                        • Opcode Fuzzy Hash: 8e31735e56c5c1e74a90c26e15472e798bbd5a29463b21347815cd9021d6a295
                                                        • Instruction Fuzzy Hash: 4F01A272900B199FCB30AF66D880452F7F9BF903153158A3FD1A652931C3B2A996DF80
                                                        APIs
                                                        • _free.LIBCMT ref: 008DD752
                                                          • Part of subcall function 008D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,008DD7D1,00000000,00000000,00000000,00000000,?,008DD7F8,00000000,00000007,00000000,?,008DDBF5,00000000), ref: 008D29DE
                                                          • Part of subcall function 008D29C8: GetLastError.KERNEL32(00000000,?,008DD7D1,00000000,00000000,00000000,00000000,?,008DD7F8,00000000,00000007,00000000,?,008DDBF5,00000000,00000000), ref: 008D29F0
                                                        • _free.LIBCMT ref: 008DD764
                                                        • _free.LIBCMT ref: 008DD776
                                                        • _free.LIBCMT ref: 008DD788
                                                        • _free.LIBCMT ref: 008DD79A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: caf7627b778383241384037fdff42a9417d50ace8bbb14e521d53d867793d4b7
                                                        • Instruction ID: 979a293d8cc32564ba72f73aad0cfcd8a989916de26bd1a7a2f97fc58eb7e340
                                                        • Opcode Fuzzy Hash: caf7627b778383241384037fdff42a9417d50ace8bbb14e521d53d867793d4b7
                                                        • Instruction Fuzzy Hash: 3AF06272554304BB8625FB68F9C1D267BDDFB44310B940A4BF098D7701C730FC80AA61
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00905C58
                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00905C6F
                                                        • MessageBeep.USER32(00000000), ref: 00905C87
                                                        • KillTimer.USER32(?,0000040A), ref: 00905CA3
                                                        • EndDialog.USER32(?,00000001), ref: 00905CBD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                        • String ID:
                                                        • API String ID: 3741023627-0
                                                        • Opcode ID: 8bbe411ee2846fa80fbbd1a8ca129cb0c98f2e03f81eda8746239c23be18ca9f
                                                        • Instruction ID: d06f18121d98c0fc6f2eb90f409d6a737d3780f1917523a406023caba6b34051
                                                        • Opcode Fuzzy Hash: 8bbe411ee2846fa80fbbd1a8ca129cb0c98f2e03f81eda8746239c23be18ca9f
                                                        • Instruction Fuzzy Hash: DF01D171500B14AFFB205B10DE4FFA67BB8BB00B09F011559E583B10E0DBF4A9849F90
                                                        APIs
                                                        • _free.LIBCMT ref: 008D22BE
                                                          • Part of subcall function 008D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,008DD7D1,00000000,00000000,00000000,00000000,?,008DD7F8,00000000,00000007,00000000,?,008DDBF5,00000000), ref: 008D29DE
                                                          • Part of subcall function 008D29C8: GetLastError.KERNEL32(00000000,?,008DD7D1,00000000,00000000,00000000,00000000,?,008DD7F8,00000000,00000007,00000000,?,008DDBF5,00000000,00000000), ref: 008D29F0
                                                        • _free.LIBCMT ref: 008D22D0
                                                        • _free.LIBCMT ref: 008D22E3
                                                        • _free.LIBCMT ref: 008D22F4
                                                        • _free.LIBCMT ref: 008D2305
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 664c4bcad3cdb378f624335297d29918f67c7d7d71263ed02381d06b93b75718
                                                        • Instruction ID: d07eaa8655b1b0bf172b208b6c25ed50ee288356b6d2d7ff21ab6f011108293f
                                                        • Opcode Fuzzy Hash: 664c4bcad3cdb378f624335297d29918f67c7d7d71263ed02381d06b93b75718
                                                        • Instruction Fuzzy Hash: 67F0D0B64291109BC622BF6CBC11D583F65F72CB51745064BF418D7372CB710591BBA5
                                                        APIs
                                                        • EndPath.GDI32(?), ref: 008B95D4
                                                        • StrokeAndFillPath.GDI32(?,?,008F71F7,00000000,?,?,?), ref: 008B95F0
                                                        • SelectObject.GDI32(?,00000000), ref: 008B9603
                                                        • DeleteObject.GDI32 ref: 008B9616
                                                        • StrokePath.GDI32(?), ref: 008B9631
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: 42c200347a3e5b7f4c8ba2b31d50a930ee7698bcec92fd86015795a363b1c5b6
                                                        • Instruction ID: fc58a768d9a7e59905463722601aa4371eb2de4b1ef1aa6db02611cce1330f94
                                                        • Opcode Fuzzy Hash: 42c200347a3e5b7f4c8ba2b31d50a930ee7698bcec92fd86015795a363b1c5b6
                                                        • Instruction Fuzzy Hash: 14F0193602D648EBDB265F69ED1C7A83F61FB11362F048214F669A51F0C7308992FF20
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: __freea$_free
                                                        • String ID: a/p$am/pm
                                                        • API String ID: 3432400110-3206640213
                                                        • Opcode ID: 607a1f304f305a8c0b8d3a3733abe10e084f30f911dbabba2b6cb2ce2aa5661e
                                                        • Instruction ID: 89b4f002e4fd4eb0442494bb488060f846a3e4c82c7ce36cf46b6b01f78c35ef
                                                        • Opcode Fuzzy Hash: 607a1f304f305a8c0b8d3a3733abe10e084f30f911dbabba2b6cb2ce2aa5661e
                                                        • Instruction Fuzzy Hash: 0FD1CF3190020AAADF289F68C85DBBAB7B1FF05704F28435BE905DBB51D7799D80CB91
                                                        APIs
                                                          • Part of subcall function 008C0242: EnterCriticalSection.KERNEL32(0097070C,00971884,?,?,008B198B,00972518,?,?,?,008A12F9,00000000), ref: 008C024D
                                                          • Part of subcall function 008C0242: LeaveCriticalSection.KERNEL32(0097070C,?,008B198B,00972518,?,?,?,008A12F9,00000000), ref: 008C028A
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                          • Part of subcall function 008C00A3: __onexit.LIBCMT ref: 008C00A9
                                                        • __Init_thread_footer.LIBCMT ref: 00927BFB
                                                          • Part of subcall function 008C01F8: EnterCriticalSection.KERNEL32(0097070C,?,?,008B8747,00972514), ref: 008C0202
                                                          • Part of subcall function 008C01F8: LeaveCriticalSection.KERNEL32(0097070C,?,008B8747,00972514), ref: 008C0235
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                        • String ID: 5$G$Variable must be of type 'Object'.
                                                        • API String ID: 535116098-3733170431
                                                        • Opcode ID: b5a845dacad87f2dbaaf7862d2987f462714af4043e2f94bd3146530fb17192f
                                                        • Instruction ID: 8a352c2c2e9b341d1529319ce023f22cd6560aa75bf97cb16fd96c5020e49ed3
                                                        • Opcode Fuzzy Hash: b5a845dacad87f2dbaaf7862d2987f462714af4043e2f94bd3146530fb17192f
                                                        • Instruction Fuzzy Hash: 57918A70A04219EFCB14EF98E8919ADB7B5FF45300F108459F846AB3A6DB31AE41CB52
                                                        APIs
                                                          • Part of subcall function 0090B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,009021D0,?,?,00000034,00000800,?,00000034), ref: 0090B42D
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00902760
                                                          • Part of subcall function 0090B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,009021FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0090B3F8
                                                          • Part of subcall function 0090B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0090B355
                                                          • Part of subcall function 0090B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00902194,00000034,?,?,00001004,00000000,00000000), ref: 0090B365
                                                          • Part of subcall function 0090B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00902194,00000034,?,?,00001004,00000000,00000000), ref: 0090B37B
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 009027CD
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0090281A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                        • String ID: @
                                                        • API String ID: 4150878124-2766056989
                                                        • Opcode ID: 05c0fad8981e2b8401c7c0a3a41eb4aa5f95cd5f9b6a613a876c4bfd5160ec88
                                                        • Instruction ID: 06126a71050f6bf3fe7829e1f25c21111dc34b82ae198a667e4b77eb1a2a79ec
                                                        • Opcode Fuzzy Hash: 05c0fad8981e2b8401c7c0a3a41eb4aa5f95cd5f9b6a613a876c4bfd5160ec88
                                                        • Instruction Fuzzy Hash: 0B414C76901218AFDB10DFA4CD46BEEBBB8EF49300F108095FA55B7191DB706E45CBA1
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Y8Q1voljvb.exe,00000104), ref: 008D1769
                                                        • _free.LIBCMT ref: 008D1834
                                                        • _free.LIBCMT ref: 008D183E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _free$FileModuleName
                                                        • String ID: C:\Users\user\Desktop\Y8Q1voljvb.exe
                                                        • API String ID: 2506810119-1666914315
                                                        • Opcode ID: 31cd0de53061c45b3628a845fce2bc81acbaccc8e8555966f6f2394edc987b41
                                                        • Instruction ID: f0a1a7a39d0c59dc7f2243f0ed5d041099038e8dcb8f14d3152b876acc64d598
                                                        • Opcode Fuzzy Hash: 31cd0de53061c45b3628a845fce2bc81acbaccc8e8555966f6f2394edc987b41
                                                        • Instruction Fuzzy Hash: A0316F75A04218BBDF21DB99D889D9EBBFCFF95710B144267F404D7312D6708A40EB91
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0090C306
                                                        • DeleteMenu.USER32(?,00000007,00000000), ref: 0090C34C
                                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00971990,017754C8), ref: 0090C395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem
                                                        • String ID: 0
                                                        • API String ID: 135850232-4108050209
                                                        • Opcode ID: 16524dcd04f2572f7fa8183051b95a5a1057b26cc41fc3bb63a024c43c75c299
                                                        • Instruction ID: 94bcfb0217da53e202c9587ccccf5608a562287b8355b86e9067020dcd81702c
                                                        • Opcode Fuzzy Hash: 16524dcd04f2572f7fa8183051b95a5a1057b26cc41fc3bb63a024c43c75c299
                                                        • Instruction Fuzzy Hash: C541A0B12183019FDB20DF29D884B5ABBE8EF85321F148B1DF9A5972D1D730E904CB62
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0093CC08,00000000,?,?,?,?), ref: 009344AA
                                                        • GetWindowLongW.USER32 ref: 009344C7
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 009344D7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID: SysTreeView32
                                                        • API String ID: 847901565-1698111956
                                                        • Opcode ID: b1faa37f096567bb82f38ec8c7ff50aa918ef0ee6f1215c7bd2c9aad708907ca
                                                        • Instruction ID: 7ea707590ce6278e30360a07f89b9b1ad02336a77fd06cf1373a3778de46ed9e
                                                        • Opcode Fuzzy Hash: b1faa37f096567bb82f38ec8c7ff50aa918ef0ee6f1215c7bd2c9aad708907ca
                                                        • Instruction Fuzzy Hash: 1131AB72214605AFDB209E38DC45BEA7BA9EB09338F214725F979E22E0D770EC519B50
                                                        APIs
                                                          • Part of subcall function 0092335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00923077,?,?), ref: 00923378
                                                        • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0092307A
                                                        • _wcslen.LIBCMT ref: 0092309B
                                                        • htons.WSOCK32(00000000,?,?,00000000), ref: 00923106
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                        • String ID: 255.255.255.255
                                                        • API String ID: 946324512-2422070025
                                                        • Opcode ID: f3a20b438c9ae6ac08abf08970e6b3cf479e0fc949fae867f7ea749c6e557955
                                                        • Instruction ID: 0273c18833a827c373f4c43c0d8743670ba571f2bf3358837859294adb26ea5a
                                                        • Opcode Fuzzy Hash: f3a20b438c9ae6ac08abf08970e6b3cf479e0fc949fae867f7ea749c6e557955
                                                        • Instruction Fuzzy Hash: 0E31D0352042219FCB20CF68E486EAA77E4EF15318F24C459E8158B396CB3AEE45CB71
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00933F40
                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00933F54
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00933F78
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window
                                                        • String ID: SysMonthCal32
                                                        • API String ID: 2326795674-1439706946
                                                        • Opcode ID: 1c779fa67568c1c345a2247d849f3f8100744a6f5f5ca908f4d945dc45367973
                                                        • Instruction ID: 2d6ad234f5db79aac0115f1a9c16b935e3f00467bef11c5b3fe33310678305ac
                                                        • Opcode Fuzzy Hash: 1c779fa67568c1c345a2247d849f3f8100744a6f5f5ca908f4d945dc45367973
                                                        • Instruction Fuzzy Hash: E621BF32650219BFEF218F94CC46FEA3B79EB88718F114214FA15BB1D0D6B5AC909B90
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00934705
                                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00934713
                                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0093471A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 4014797782-2298589950
                                                        • Opcode ID: f31bc6e15e4e04362dab25efc66d6d5083b863172b7aba7126b53e811022792f
                                                        • Instruction ID: 4357b0a8b60b9ff911187ba552f0b6636da18df6059fb0b0d03dddedc28ae1e3
                                                        • Opcode Fuzzy Hash: f31bc6e15e4e04362dab25efc66d6d5083b863172b7aba7126b53e811022792f
                                                        • Instruction Fuzzy Hash: 8C215EB5604209AFEB10DF68DC81DA737ADEB5A3A8B050059FA059B251CB70FC51DE60
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                        • API String ID: 176396367-2734436370
                                                        • Opcode ID: cec53f04963e62eb57d0fc6c03bf86cd3473494b4d4cf518aafca28e7f7fea4c
                                                        • Instruction ID: 1260e3fad5442fd90a363d593365916baedcb062c3e2b6de58678d82fe68eecc
                                                        • Opcode Fuzzy Hash: cec53f04963e62eb57d0fc6c03bf86cd3473494b4d4cf518aafca28e7f7fea4c
                                                        • Instruction Fuzzy Hash: 9F213872104611AED331AA299C16FB773ECEF91300F10442AF949DB1C3EB66DD41D296
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00933840
                                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00933850
                                                        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00933876
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: 7ab8711ebcac30e30584158067bf1da0818618f8e93ed45f2d1131258d7d6e8b
                                                        • Instruction ID: e53f7fe929fbb601f3dde5981ef44579231648897e94669a9ad68321bddd8886
                                                        • Opcode Fuzzy Hash: 7ab8711ebcac30e30584158067bf1da0818618f8e93ed45f2d1131258d7d6e8b
                                                        • Instruction Fuzzy Hash: 5B21A172654218BBEF218FA4DC85FBB376EEF89764F11C124F905AB190C671DC528BA0
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00914A08
                                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00914A5C
                                                        • SetErrorMode.KERNEL32(00000000,?,?,0093CC08), ref: 00914AD0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume
                                                        • String ID: %lu
                                                        • API String ID: 2507767853-685833217
                                                        • Opcode ID: 8bb39496aaf81c86ce2f8f42d8e8ba8cc8ccf236267d493424109ceb6e47fd3b
                                                        • Instruction ID: eaa645135d95816b93d31f45fee326e20d83ae1a27acf1ff38927aa40cf6047a
                                                        • Opcode Fuzzy Hash: 8bb39496aaf81c86ce2f8f42d8e8ba8cc8ccf236267d493424109ceb6e47fd3b
                                                        • Instruction Fuzzy Hash: 9C318F75A04108AFDB10DF58C885EAA7BF8FF09318F1480A4F909EB252D771EE45DB62
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0093424F
                                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00934264
                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00934271
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: msctls_trackbar32
                                                        • API String ID: 3850602802-1010561917
                                                        • Opcode ID: 7267bf1df6ff0816974b9b812188c12957739dde21cd8d76f53a0d45ee0b139b
                                                        • Instruction ID: 31053619b3e0d70db68087b0989187e6bec88f4b2e439997b334f4a36f038c64
                                                        • Opcode Fuzzy Hash: 7267bf1df6ff0816974b9b812188c12957739dde21cd8d76f53a0d45ee0b139b
                                                        • Instruction Fuzzy Hash: B4110631240208BFEF205F69CC06FAB3BACEF95B58F020514FA55F20A0D271EC619B10
                                                        APIs
                                                          • Part of subcall function 008A6B57: _wcslen.LIBCMT ref: 008A6B6A
                                                          • Part of subcall function 00902DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00902DC5
                                                          • Part of subcall function 00902DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00902DD6
                                                          • Part of subcall function 00902DA7: GetCurrentThreadId.KERNEL32 ref: 00902DDD
                                                          • Part of subcall function 00902DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00902DE4
                                                        • GetFocus.USER32 ref: 00902F78
                                                          • Part of subcall function 00902DEE: GetParent.USER32(00000000), ref: 00902DF9
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00902FC3
                                                        • EnumChildWindows.USER32(?,0090303B), ref: 00902FEB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                        • String ID: %s%d
                                                        • API String ID: 1272988791-1110647743
                                                        • Opcode ID: 0db2ce897d24747e4328f7ca41018035717a3bae9b0ad5195c33fa8b469554e8
                                                        • Instruction ID: 1cbb73910fd4c66609212be36dcee249d86a3eac32900ce4efbe76aba928e9ff
                                                        • Opcode Fuzzy Hash: 0db2ce897d24747e4328f7ca41018035717a3bae9b0ad5195c33fa8b469554e8
                                                        • Instruction Fuzzy Hash: B81190B1600205ABDF157F648C8AEED776EAF84318F049075B909AB2D2DE3099459B70
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 009358C1
                                                        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 009358EE
                                                        • DrawMenuBar.USER32(?), ref: 009358FD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Menu$InfoItem$Draw
                                                        • String ID: 0
                                                        • API String ID: 3227129158-4108050209
                                                        • Opcode ID: cf0504648e12d53e2010009152bcdc272c7a5c705a39e54325acb06800c4f3eb
                                                        • Instruction ID: a701943c0fb6234cad32916fa0a36aa5d223cffbdadb5bb355708549ad8a0d3c
                                                        • Opcode Fuzzy Hash: cf0504648e12d53e2010009152bcdc272c7a5c705a39e54325acb06800c4f3eb
                                                        • Instruction Fuzzy Hash: F6018B71504208EFDB209F11DC48BAFBBB9FB49360F008099F848DA261DB308A80EF21
                                                        APIs
                                                        • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 008FD3BF
                                                        • FreeLibrary.KERNEL32 ref: 008FD3E5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeLibraryProc
                                                        • String ID: GetSystemWow64DirectoryW$X64
                                                        • API String ID: 3013587201-2590602151
                                                        • Opcode ID: f392740da7ad44bcb4f2270d2122e7d6669e276c8392ae01ddd26256952632e9
                                                        • Instruction ID: a440f2b90334d1f9b2ec10789574f91878514baf1154bf08e6a46473b522f1be
                                                        • Opcode Fuzzy Hash: f392740da7ad44bcb4f2270d2122e7d6669e276c8392ae01ddd26256952632e9
                                                        • Instruction Fuzzy Hash: 33F020A2809B299BE73112708C549BA3352FF00B05B548029AB02F6249E720DC45ABD3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4806d44924b9b17b2ee6495fc086abe4c3440ae3859738e10957a591ead2c03c
                                                        • Instruction ID: 8eae75f19c30ab7de9bd3886025bcd6c261d8e7a8a46062b4c65bcde94a9c779
                                                        • Opcode Fuzzy Hash: 4806d44924b9b17b2ee6495fc086abe4c3440ae3859738e10957a591ead2c03c
                                                        • Instruction Fuzzy Hash: C2C12B75A0020AEFDB15CF98C894BAEB7B9FF88704F108598E515EB291D731DE41DB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: __alldvrm$_strrchr
                                                        • String ID:
                                                        • API String ID: 1036877536-0
                                                        • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                        • Instruction ID: c2f97a41250226596964ec8a8226450f4290435edfaae378c4e120611d222d7f
                                                        • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                        • Instruction Fuzzy Hash: FAA12572A0078A9FDB25CF18C891BAEBBE5FF61350F18426EE585DB381C6348D81C751
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInitInitializeUninitialize
                                                        • String ID:
                                                        • API String ID: 1998397398-0
                                                        • Opcode ID: 382b565123d7d6d0e635be0815adfd9d1c820f88639425132e7e9f99cb9fce95
                                                        • Instruction ID: 59205bf8a46ca652832df316f592c066a8f2347aea4da1a7a2bef34b8e90cb37
                                                        • Opcode Fuzzy Hash: 382b565123d7d6d0e635be0815adfd9d1c820f88639425132e7e9f99cb9fce95
                                                        • Instruction Fuzzy Hash: 6EA15D756043109FD710EF28D885A2AB7E9FF89710F048859F98ADB366DB34ED01CB92
                                                        APIs
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0093FC08,?), ref: 009005F0
                                                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0093FC08,?), ref: 00900608
                                                        • CLSIDFromProgID.OLE32(?,?,00000000,0093CC40,000000FF,?,00000000,00000800,00000000,?,0093FC08,?), ref: 0090062D
                                                        • _memcmp.LIBVCRUNTIME ref: 0090064E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: FromProg$FreeTask_memcmp
                                                        • String ID:
                                                        • API String ID: 314563124-0
                                                        • Opcode ID: 9572124b67247b26923c627310628fa666d54973cc18ee04ad9744aca9bf6cb5
                                                        • Instruction ID: bd7c4cd2a6d43e465851d6576604f0dab86998134bfc16051ca460f9f53ef0a8
                                                        • Opcode Fuzzy Hash: 9572124b67247b26923c627310628fa666d54973cc18ee04ad9744aca9bf6cb5
                                                        • Instruction Fuzzy Hash: 4281E875A00109EFCB04DF94C984EEEB7BAFF89315F204558F506AB290DB71AE06CB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: 8ecaafd4eddc9a7e6089908ec6f5ee64a61da8e224a0e8e5757ebe8e34d15148
                                                        • Instruction ID: 95e0df1a3eba4bbdf6790cf1a05bfe993dd5a0b211da71d6a1f692f721ffcaf0
                                                        • Opcode Fuzzy Hash: 8ecaafd4eddc9a7e6089908ec6f5ee64a61da8e224a0e8e5757ebe8e34d15148
                                                        • Instruction Fuzzy Hash: 5F413A31600554ABEF217BBE8C49BAE3BB6FF43334F14422AF418D23D2E67488419267
                                                        APIs
                                                        • GetWindowRect.USER32(0177DC18,?), ref: 009362E2
                                                        • ScreenToClient.USER32(?,?), ref: 00936315
                                                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00936382
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientMoveRectScreen
                                                        • String ID:
                                                        • API String ID: 3880355969-0
                                                        • Opcode ID: 7dcd17ee3fde7a4bd1c50699fc4ca1206e4c3f37573779db197a252bb5ca9084
                                                        • Instruction ID: ee8c54f7e9a1718529b6995fad12445d51d03a08e0d1a0f60a0b2b65eb12e94f
                                                        • Opcode Fuzzy Hash: 7dcd17ee3fde7a4bd1c50699fc4ca1206e4c3f37573779db197a252bb5ca9084
                                                        • Instruction Fuzzy Hash: EB512975A00209AFDF14DF68D881AAE7BBAFB45360F108169F9659B2A0D730ED81DF50
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00921AFD
                                                        • WSAGetLastError.WSOCK32 ref: 00921B0B
                                                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00921B8A
                                                        • WSAGetLastError.WSOCK32 ref: 00921B94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$socket
                                                        • String ID:
                                                        • API String ID: 1881357543-0
                                                        • Opcode ID: cb6bbfa7ca57ab4c6b89e1af6ede0ac0dbeecae3d26cc0164a3893a9c88fc81e
                                                        • Instruction ID: a56b2af6e4d9612e7fe4743ee1e6a246907ebc34831a990d4f8281925d040916
                                                        • Opcode Fuzzy Hash: cb6bbfa7ca57ab4c6b89e1af6ede0ac0dbeecae3d26cc0164a3893a9c88fc81e
                                                        • Instruction Fuzzy Hash: 8341F074600200AFE720AF28D886F2A77E5EB44708F548448F91A9F7D7E772ED41CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 388e18e054701a0d3e1f4aaf335733847804b313a42ed2947b1401b14e082062
                                                        • Instruction ID: 7badada756d7fd85f66ebaa0e467f52ddca7bb17b0b174905abaade70d9f6469
                                                        • Opcode Fuzzy Hash: 388e18e054701a0d3e1f4aaf335733847804b313a42ed2947b1401b14e082062
                                                        • Instruction Fuzzy Hash: 3D41CF75A00244EFE724DE3CC841BAABBAAFB88720F11462FF141DB382D77199018791
                                                        APIs
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00915783
                                                        • GetLastError.KERNEL32(?,00000000), ref: 009157A9
                                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 009157CE
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 009157FA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 3321077145-0
                                                        • Opcode ID: bbcda836b6600244e121f94fd970b1bfbe309e05bac2537320c09a9b581f50d6
                                                        • Instruction ID: 51906b4e2e2d014bf4eaf03d8b8375a0b1cd442963a00031d98dce946e20dcbd
                                                        • Opcode Fuzzy Hash: bbcda836b6600244e121f94fd970b1bfbe309e05bac2537320c09a9b581f50d6
                                                        • Instruction Fuzzy Hash: B2411F39600614DFDB11EF19C545A5EBBE6FF89310B19C488E84AAB762CB34FD40DB91
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,008C6D71,00000000,00000000,008C82D9,?,008C82D9,?,00000001,008C6D71,8BE85006,00000001,008C82D9,008C82D9), ref: 008DD910
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 008DD999
                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 008DD9AB
                                                        • __freea.LIBCMT ref: 008DD9B4
                                                          • Part of subcall function 008D3820: RtlAllocateHeap.NTDLL(00000000,?,00971444,?,008BFDF5,?,?,008AA976,00000010,00971440,008A13FC,?,008A13C6,?,008A1129), ref: 008D3852
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                        • String ID:
                                                        • API String ID: 2652629310-0
                                                        • Opcode ID: 2c5cddd5e7b34bb44133d9fcd1e58b6ad0ab26b3b985dd43e4e12724065cc8b4
                                                        • Instruction ID: 00710c0cc3e5b5dc7becf3dbd30357b73bfa212be6445b713aedd54a74a51b89
                                                        • Opcode Fuzzy Hash: 2c5cddd5e7b34bb44133d9fcd1e58b6ad0ab26b3b985dd43e4e12724065cc8b4
                                                        • Instruction Fuzzy Hash: 2531D072A0020ABBDF249F68DC91EAE7BA5FB40310F054269FC04E7250EB36DD50DB91
                                                        APIs
                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00935352
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00935375
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00935382
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 009353A8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$InvalidateMessageRectSend
                                                        • String ID:
                                                        • API String ID: 3340791633-0
                                                        • Opcode ID: fd6e5f814914ccd4f1496ce1d39db65a857cfe4832a563f73858a6862287421a
                                                        • Instruction ID: 68e47fe6b47f4d935e47636401d840bb5f46057c017dedf502ed6440898bdf1a
                                                        • Opcode Fuzzy Hash: fd6e5f814914ccd4f1496ce1d39db65a857cfe4832a563f73858a6862287421a
                                                        • Instruction Fuzzy Hash: 6231C575A59A08EFEB349F18CC06BE8776AEB0D3D0F594501FA10961E1C7B49D80EF42
                                                        APIs
                                                        • GetKeyboardState.USER32(?,7707C0D0,?,00008000), ref: 0090ABF1
                                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 0090AC0D
                                                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 0090AC74
                                                        • SendInput.USER32(00000001,?,0000001C,7707C0D0,?,00008000), ref: 0090ACC6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 3bb0ef27bb883d212ec6a44d9ba7d98e22cdbb6862a64a78f635a98b8670afb0
                                                        • Instruction ID: 428d155513763f1690146663b0514c28b182645b7071428eabdd40eefad75dec
                                                        • Opcode Fuzzy Hash: 3bb0ef27bb883d212ec6a44d9ba7d98e22cdbb6862a64a78f635a98b8670afb0
                                                        • Instruction Fuzzy Hash: C5312470A04728AFFF35CB658C097FE7BA9AB89310F05471AE4C5961D1C3788D8197D2
                                                        APIs
                                                        • ClientToScreen.USER32(?,?), ref: 0093769A
                                                        • GetWindowRect.USER32(?,?), ref: 00937710
                                                        • PtInRect.USER32(?,?,00938B89), ref: 00937720
                                                        • MessageBeep.USER32(00000000), ref: 0093778C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: 00ea199bd289b865f8b49f332a6a3b74cd1719e6a4e35fb0e1a6fba81b8456f0
                                                        • Instruction ID: 182fa0473dd92b5ba9a80ff003670deb422c88702bb8eb9869e65cb3227c96b2
                                                        • Opcode Fuzzy Hash: 00ea199bd289b865f8b49f332a6a3b74cd1719e6a4e35fb0e1a6fba81b8456f0
                                                        • Instruction Fuzzy Hash: DA41AEB5609219EFCB21CF98D895FA9B7F5FF49314F1440A8E5169B261C330E942DF90
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 009316EB
                                                          • Part of subcall function 00903A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00903A57
                                                          • Part of subcall function 00903A3D: GetCurrentThreadId.KERNEL32 ref: 00903A5E
                                                          • Part of subcall function 00903A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,009025B3), ref: 00903A65
                                                        • GetCaretPos.USER32(?), ref: 009316FF
                                                        • ClientToScreen.USER32(00000000,?), ref: 0093174C
                                                        • GetForegroundWindow.USER32 ref: 00931752
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: 8645950bc59b298bfe7d7245cade2619e92bdbfffe5379a9f47bdc6b6249cf0b
                                                        • Instruction ID: 4f940a589185f28efb29e6a31f815262127e7326d1b079181abf793eec4077a4
                                                        • Opcode Fuzzy Hash: 8645950bc59b298bfe7d7245cade2619e92bdbfffe5379a9f47bdc6b6249cf0b
                                                        • Instruction Fuzzy Hash: C3315071E00109AFD700DFA9C881DAEB7FDFF89304B548069E416E7611EA319E45CFA1
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0090D501
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0090D50F
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 0090D52F
                                                        • CloseHandle.KERNEL32(00000000), ref: 0090D5DC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 420147892-0
                                                        • Opcode ID: 7dedfbd8c199a064793a8447c758bcc1d57999cca72614c9043c9d96e3d7effe
                                                        • Instruction ID: 23aec0889eedeb5002fa7185ad7d14c25772809deddcb79847a152afbbaaf6e6
                                                        • Opcode Fuzzy Hash: 7dedfbd8c199a064793a8447c758bcc1d57999cca72614c9043c9d96e3d7effe
                                                        • Instruction Fuzzy Hash: 5C317E711082009FD304EF94CC81AAFBBE8FF9A354F14092DF581962A1EB71A945DB93
                                                        APIs
                                                          • Part of subcall function 008B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 008B9BB2
                                                        • GetCursorPos.USER32(?), ref: 00939001
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,008F7711,?,?,?,?,?), ref: 00939016
                                                        • GetCursorPos.USER32(?), ref: 0093905E
                                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,008F7711,?,?,?), ref: 00939094
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                        • String ID:
                                                        • API String ID: 2864067406-0
                                                        • Opcode ID: 63edf49b1bb08b460545ccda31c54e9e9f23cddc0c65fb2ca608ed86d8ec253b
                                                        • Instruction ID: 1ec2a7fc95b5555c73709164ec20dbd0eb3fabe2a6eb0d047da48692d5ef8b03
                                                        • Opcode Fuzzy Hash: 63edf49b1bb08b460545ccda31c54e9e9f23cddc0c65fb2ca608ed86d8ec253b
                                                        • Instruction Fuzzy Hash: 4621BF36615118EFCB298F98C858FEA3BB9EB49360F004055F90597261C3719D90EF60
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(?,0093CB68), ref: 0090D2FB
                                                        • GetLastError.KERNEL32 ref: 0090D30A
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0090D319
                                                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0093CB68), ref: 0090D376
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast
                                                        • String ID:
                                                        • API String ID: 2267087916-0
                                                        • Opcode ID: 802bf77f3833d8dcf5cb9f0ec00db042c1ad2a0e4d86669828eb9fd07cba7b4f
                                                        • Instruction ID: e6a4b4055bffe489523d6dca259c16fda3a0155affa44ca533ea822def29b2d9
                                                        • Opcode Fuzzy Hash: 802bf77f3833d8dcf5cb9f0ec00db042c1ad2a0e4d86669828eb9fd07cba7b4f
                                                        • Instruction Fuzzy Hash: A2217F7150A3019FC710DF68C88186AB7E8FE96768F104A1DF4A9D72E1D731DA46CB93
                                                        APIs
                                                          • Part of subcall function 00901014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0090102A
                                                          • Part of subcall function 00901014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00901036
                                                          • Part of subcall function 00901014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00901045
                                                          • Part of subcall function 00901014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0090104C
                                                          • Part of subcall function 00901014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00901062
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 009015BE
                                                        • _memcmp.LIBVCRUNTIME ref: 009015E1
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00901617
                                                        • HeapFree.KERNEL32(00000000), ref: 0090161E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                        • String ID:
                                                        • API String ID: 1592001646-0
                                                        • Opcode ID: f55000c8e80c7b692fa3176f8d1d1cc5061a17803d5a88f049f0edc3a0d72aa0
                                                        • Instruction ID: 6bee8ebb9c5663809c43a63fe9f58e8bf591bbd7c5eb915e078ba52a9b67e4c3
                                                        • Opcode Fuzzy Hash: f55000c8e80c7b692fa3176f8d1d1cc5061a17803d5a88f049f0edc3a0d72aa0
                                                        • Instruction Fuzzy Hash: F4214872E00109EFDF14DFA4CD49BEEB7B8EF84354F184459E441AB281E771AA45DBA0
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0093280A
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00932824
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00932832
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00932840
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$AttributesLayered
                                                        • String ID:
                                                        • API String ID: 2169480361-0
                                                        • Opcode ID: ea1222cb3dc72c5671e0b974fd16b2b736bf978109175bd1298787d7719a3443
                                                        • Instruction ID: 48b95077e9951dde59fc28654ea7643a39b4942ab00000776c95bcf2d54642c1
                                                        • Opcode Fuzzy Hash: ea1222cb3dc72c5671e0b974fd16b2b736bf978109175bd1298787d7719a3443
                                                        • Instruction Fuzzy Hash: C421B031608611AFE7149B24C855FAA7B99FF86324F148158F426CB6E2CB75FC82CF91
                                                        APIs
                                                          • Part of subcall function 00908D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0090790A,?,000000FF,?,00908754,00000000,?,0000001C,?,?), ref: 00908D8C
                                                          • Part of subcall function 00908D7D: lstrcpyW.KERNEL32(00000000,?,?,0090790A,?,000000FF,?,00908754,00000000,?,0000001C,?,?,00000000), ref: 00908DB2
                                                          • Part of subcall function 00908D7D: lstrcmpiW.KERNEL32(00000000,?,0090790A,?,000000FF,?,00908754,00000000,?,0000001C,?,?), ref: 00908DE3
                                                        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00908754,00000000,?,0000001C,?,?,00000000), ref: 00907923
                                                        • lstrcpyW.KERNEL32(00000000,?,?,00908754,00000000,?,0000001C,?,?,00000000), ref: 00907949
                                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00908754,00000000,?,0000001C,?,?,00000000), ref: 00907984
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: lstrcmpilstrcpylstrlen
                                                        • String ID: cdecl
                                                        • API String ID: 4031866154-3896280584
                                                        • Opcode ID: f1f263f91c526f292b91fa2ea15771d06f977a9fd4394761fc035ebea6550f0b
                                                        • Instruction ID: 23b9c6f62ae0c5054ae950cf99e4e14224cd9c19ff22ea55044bb70c2bf5f59e
                                                        • Opcode Fuzzy Hash: f1f263f91c526f292b91fa2ea15771d06f977a9fd4394761fc035ebea6550f0b
                                                        • Instruction Fuzzy Hash: E811E43A204201AFCB155F78C845E7BB7A9FF853A0B00402AF942CB2A4EB319811D7A1
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00937D0B
                                                        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00937D2A
                                                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00937D42
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0091B7AD,00000000), ref: 00937D6B
                                                          • Part of subcall function 008B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 008B9BB2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID:
                                                        • API String ID: 847901565-0
                                                        • Opcode ID: 6ce69214151e82104c88c1cdce84669b835b34f1e574c1f6f81444daa91f2bde
                                                        • Instruction ID: db391f67abcce8fb7662f7bd232ee0b46defd15677a233bb11e8a18aadca3f14
                                                        • Opcode Fuzzy Hash: 6ce69214151e82104c88c1cdce84669b835b34f1e574c1f6f81444daa91f2bde
                                                        • Instruction Fuzzy Hash: CD11D2B2118655AFCB208F68DC04AA67BA8AF45360F118724F939D72F0D7308951EF50
                                                        APIs
                                                        • SendMessageW.USER32(?,00001060,?,00000004), ref: 009356BB
                                                        • _wcslen.LIBCMT ref: 009356CD
                                                        • _wcslen.LIBCMT ref: 009356D8
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00935816
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen
                                                        • String ID:
                                                        • API String ID: 455545452-0
                                                        • Opcode ID: b1ba712644eead9c3642cd5f52b08c28060ecb67bc23cb6c1581961873ed46a8
                                                        • Instruction ID: bd22d7acb7ecd04194e686aa6bfd4ef04c6175f4f78f93a713c90b27c3908558
                                                        • Opcode Fuzzy Hash: b1ba712644eead9c3642cd5f52b08c28060ecb67bc23cb6c1581961873ed46a8
                                                        • Instruction Fuzzy Hash: 5811037560061896DB20DF65CC86AEE77BCFF09764F50442AF905D6091EB74CA84CF60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7eb9c67d6e5ab88c37a402a435400e0308baec5bf3508f6fd63cdbd4560d8ca3
                                                        • Instruction ID: fd783765e961b270c1c96c689536ca4fd9c8146918471acbfc80b3bbbb87c01a
                                                        • Opcode Fuzzy Hash: 7eb9c67d6e5ab88c37a402a435400e0308baec5bf3508f6fd63cdbd4560d8ca3
                                                        • Instruction Fuzzy Hash: 7F014FB2219A1A7EFA2126B86CC5F67671EFF513B8B340327F521E13D2DB608C40A561
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00901A47
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00901A59
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00901A6F
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00901A8A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 24167ada9014aa724f02c677121b5de5686c55f3a126e221efb24b1966966e5d
                                                        • Instruction ID: d34deb2e8c2f2621d00756277af96903a9bf4bc76f91fa3df6b94d8fdbfad89a
                                                        • Opcode Fuzzy Hash: 24167ada9014aa724f02c677121b5de5686c55f3a126e221efb24b1966966e5d
                                                        • Instruction Fuzzy Hash: B011F77AA01219FFEF119BA5CD85FADBBB8EB08754F200091EA04B7290D6716E50DB94
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 0090E1FD
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 0090E230
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0090E246
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0090E24D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                        • String ID:
                                                        • API String ID: 2880819207-0
                                                        • Opcode ID: 0e0099c390c996c0fe1f4bfbdb290cf3ea5f85a0a3873f70dde96a131fabd4f7
                                                        • Instruction ID: 5588df4665368a71fac795fccd6ca66686e3d15dc2049e587a44dbfe6004bf93
                                                        • Opcode Fuzzy Hash: 0e0099c390c996c0fe1f4bfbdb290cf3ea5f85a0a3873f70dde96a131fabd4f7
                                                        • Instruction Fuzzy Hash: 181108B691C214BFC7019BAC9C09A9E7FACEB45314F004619F824E32D0D270CD009BA0
                                                        APIs
                                                        • CreateThread.KERNEL32(00000000,?,008CCFF9,00000000,00000004,00000000), ref: 008CD218
                                                        • GetLastError.KERNEL32 ref: 008CD224
                                                        • __dosmaperr.LIBCMT ref: 008CD22B
                                                        • ResumeThread.KERNEL32(00000000), ref: 008CD249
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                        • String ID:
                                                        • API String ID: 173952441-0
                                                        • Opcode ID: 54635bd63a5abd0069cc75af25a92ca9cea6fd3664268439ae8283cada0bb15a
                                                        • Instruction ID: a9fcaae43ff0d3cdc999326d1d977147e77532f5ab25e21b31a0b5f397f75cc9
                                                        • Opcode Fuzzy Hash: 54635bd63a5abd0069cc75af25a92ca9cea6fd3664268439ae8283cada0bb15a
                                                        • Instruction Fuzzy Hash: 3C01C476415608BBD7116BA9DC09FAA7A79FF81330F10422EF925D21D1CB71D901D7A1
                                                        APIs
                                                          • Part of subcall function 008B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 008B9BB2
                                                        • GetClientRect.USER32(?,?), ref: 00939F31
                                                        • GetCursorPos.USER32(?), ref: 00939F3B
                                                        • ScreenToClient.USER32(?,?), ref: 00939F46
                                                        • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00939F7A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Client$CursorLongProcRectScreenWindow
                                                        • String ID:
                                                        • API String ID: 4127811313-0
                                                        • Opcode ID: a4ba8ef61c2021d0a86113a356fe0d2d431f2d713ca81f63afdec2bd8bef6cb2
                                                        • Instruction ID: 33361adbd2e6514694a8b3d3cf93eb8eca8569b24bd95da8c91ceb46d91761db
                                                        • Opcode Fuzzy Hash: a4ba8ef61c2021d0a86113a356fe0d2d431f2d713ca81f63afdec2bd8bef6cb2
                                                        • Instruction Fuzzy Hash: D911457290461AABDB10EFA8D889AEE77B8FB45311F004451F912E3140D770BE81DFA1
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 008A604C
                                                        • GetStockObject.GDI32(00000011), ref: 008A6060
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 008A606A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CreateMessageObjectSendStockWindow
                                                        • String ID:
                                                        • API String ID: 3970641297-0
                                                        • Opcode ID: 32ce4b28c8f24cea31a3f38d0fdb8055ce9d0d8fb566ce961dab533aec0f7e6c
                                                        • Instruction ID: 6436c48961b5fa6d3af1a0b09e0e869706eb48340f1e72fc337e8e760016581d
                                                        • Opcode Fuzzy Hash: 32ce4b28c8f24cea31a3f38d0fdb8055ce9d0d8fb566ce961dab533aec0f7e6c
                                                        • Instruction Fuzzy Hash: 4011A1B3105909BFEF124FA49C44EEA7B69FF19364F040101FA15A2020D7329CA0EF90
                                                        APIs
                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 008C3B56
                                                          • Part of subcall function 008C3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 008C3AD2
                                                          • Part of subcall function 008C3AA3: ___AdjustPointer.LIBCMT ref: 008C3AED
                                                        • _UnwindNestedFrames.LIBCMT ref: 008C3B6B
                                                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 008C3B7C
                                                        • CallCatchBlock.LIBVCRUNTIME ref: 008C3BA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                        • String ID:
                                                        • API String ID: 737400349-0
                                                        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                        • Instruction ID: 1cc7737da65ab2aa85d9baf5fd505c2770a5766a9c5c64dbab58bbef61d863cc
                                                        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                        • Instruction Fuzzy Hash: 9E01E932100149BBDF125E99CC46EEB7B7DFF58764F048018FE48A6121C732E962DBA1
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,008A13C6,00000000,00000000,?,008D301A,008A13C6,00000000,00000000,00000000,?,008D328B,00000006,FlsSetValue), ref: 008D30A5
                                                        • GetLastError.KERNEL32(?,008D301A,008A13C6,00000000,00000000,00000000,?,008D328B,00000006,FlsSetValue,00942290,FlsSetValue,00000000,00000364,?,008D2E46), ref: 008D30B1
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,008D301A,008A13C6,00000000,00000000,00000000,?,008D328B,00000006,FlsSetValue,00942290,FlsSetValue,00000000), ref: 008D30BF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad$ErrorLast
                                                        • String ID:
                                                        • API String ID: 3177248105-0
                                                        • Opcode ID: 722afac2ef4c2b2cd9ca902657cfe287248dfe5c8056033fbd320d7b153c5724
                                                        • Instruction ID: 30ba5eb35ab83f3037ba43c39225607176545f0ca76a4a4cc1a6cfdf327ee006
                                                        • Opcode Fuzzy Hash: 722afac2ef4c2b2cd9ca902657cfe287248dfe5c8056033fbd320d7b153c5724
                                                        • Instruction Fuzzy Hash: 7E01F772319A26ABCB314B78AC449577B98FF45B61B140721F915F3340C721DD01CBE1
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0090747F
                                                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00907497
                                                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 009074AC
                                                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 009074CA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Type$Register$FileLoadModuleNameUser
                                                        • String ID:
                                                        • API String ID: 1352324309-0
                                                        • Opcode ID: 19a0812e4e19fb69c30d7397543eb8d5d42d0043da7f1c7f7864dc273bea441d
                                                        • Instruction ID: fce25cdf612cec4a581b4902131027a704ed5d8dd6f5979bf8d262cffc0a861e
                                                        • Opcode Fuzzy Hash: 19a0812e4e19fb69c30d7397543eb8d5d42d0043da7f1c7f7864dc273bea441d
                                                        • Instruction Fuzzy Hash: 9D11A1B5A09714DFE7208F94DC08B92BBFDEB00B10F108969A656D61A1D7B4F904DF60
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0090ACD3,?,00008000), ref: 0090B0C4
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0090ACD3,?,00008000), ref: 0090B0E9
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0090ACD3,?,00008000), ref: 0090B0F3
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0090ACD3,?,00008000), ref: 0090B126
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CounterPerformanceQuerySleep
                                                        • String ID:
                                                        • API String ID: 2875609808-0
                                                        • Opcode ID: d110ef8cca97b1c818562756d85c4f222bd1de6261fa2528eec7debfc7e57004
                                                        • Instruction ID: f80aebaf962f2ac4ee49fac5f32e885cea9a3c94e1dee395cd009f466a4ce5fd
                                                        • Opcode Fuzzy Hash: d110ef8cca97b1c818562756d85c4f222bd1de6261fa2528eec7debfc7e57004
                                                        • Instruction Fuzzy Hash: C8116D71C0992DEFCF00AFE4E9A8AEEBBB8FF09711F114485D941B2285CB3456609B91
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00902DC5
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00902DD6
                                                        • GetCurrentThreadId.KERNEL32 ref: 00902DDD
                                                        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00902DE4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 2710830443-0
                                                        • Opcode ID: 26970910dd4b66e7c48fef952df71823fa1aeded70824ca44c0f349edfa02550
                                                        • Instruction ID: 0e57d3950f306960e5e50f2d27ef6328ffadcd224a8212486e9fc908c4859936
                                                        • Opcode Fuzzy Hash: 26970910dd4b66e7c48fef952df71823fa1aeded70824ca44c0f349edfa02550
                                                        • Instruction Fuzzy Hash: 98E092B1119B24BBDB201BB29C0EFEB3E6CEF42BA5F000015F105E10C09AA4CC40EBB0
                                                        APIs
                                                          • Part of subcall function 008B9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 008B9693
                                                          • Part of subcall function 008B9639: SelectObject.GDI32(?,00000000), ref: 008B96A2
                                                          • Part of subcall function 008B9639: BeginPath.GDI32(?), ref: 008B96B9
                                                          • Part of subcall function 008B9639: SelectObject.GDI32(?,00000000), ref: 008B96E2
                                                        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00938887
                                                        • LineTo.GDI32(?,?,?), ref: 00938894
                                                        • EndPath.GDI32(?), ref: 009388A4
                                                        • StrokePath.GDI32(?), ref: 009388B2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                        • String ID:
                                                        • API String ID: 1539411459-0
                                                        • Opcode ID: 3a72b3eb3150806a66a3a2649eabce9f88266d674878f1cd504835e3a0083e13
                                                        • Instruction ID: ba58d64036fb9ded1404524c19a286c24ad7a67817312b3eea709f9979491a07
                                                        • Opcode Fuzzy Hash: 3a72b3eb3150806a66a3a2649eabce9f88266d674878f1cd504835e3a0083e13
                                                        • Instruction Fuzzy Hash: 15F03A36059A58FBDB125F98AC09FCA3B69AF06310F048000FB12750E2C7755551EFA5
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 008B98CC
                                                        • SetTextColor.GDI32(?,?), ref: 008B98D6
                                                        • SetBkMode.GDI32(?,00000001), ref: 008B98E9
                                                        • GetStockObject.GDI32(00000005), ref: 008B98F1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Color$ModeObjectStockText
                                                        • String ID:
                                                        • API String ID: 4037423528-0
                                                        • Opcode ID: 0a257fbeb738324487c04047a366ddcf903866bf388eadc0b747d51a9907e990
                                                        • Instruction ID: e0a05e632155c53d31e7cf927a45c6b1d0f4646b7f24ba44e8f136c3590b5804
                                                        • Opcode Fuzzy Hash: 0a257fbeb738324487c04047a366ddcf903866bf388eadc0b747d51a9907e990
                                                        • Instruction Fuzzy Hash: 0AE0657125C644AAEB215B74AC09BE83F10FB11335F048219F7F5A40E1C3714640AF10
                                                        APIs
                                                        • GetCurrentThread.KERNEL32 ref: 00901634
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,009011D9), ref: 0090163B
                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,009011D9), ref: 00901648
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,009011D9), ref: 0090164F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CurrentOpenProcessThreadToken
                                                        • String ID:
                                                        • API String ID: 3974789173-0
                                                        • Opcode ID: 5101f121087f3586a8df58ba3d9bb06ee3f4065d67850ac05fb284754dacea7a
                                                        • Instruction ID: 6b16eedb30e3fdd3c9a26028d7e06ccbc5de24270477d9c7dee27a3048e9fcd9
                                                        • Opcode Fuzzy Hash: 5101f121087f3586a8df58ba3d9bb06ee3f4065d67850ac05fb284754dacea7a
                                                        • Instruction Fuzzy Hash: 2DE08CB2616211EBDB201FA0AE0DB873B7CAF44792F148808F245E9080E7348444DF60
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 008FD858
                                                        • GetDC.USER32(00000000), ref: 008FD862
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 008FD882
                                                        • ReleaseDC.USER32(?), ref: 008FD8A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: c7f674f7d920f50440bad140d8b92d462d015fd7473a5c3849a0a9d17d7df94b
                                                        • Instruction ID: c4776e625d0abbfb80b4742536761044f75ca752235ba73b966d78bffa521b33
                                                        • Opcode Fuzzy Hash: c7f674f7d920f50440bad140d8b92d462d015fd7473a5c3849a0a9d17d7df94b
                                                        • Instruction Fuzzy Hash: E6E01AB1814A09EFCF41AFA0D80D66DBBB2FB08314F108419F946F7260CB389901AF40
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 008FD86C
                                                        • GetDC.USER32(00000000), ref: 008FD876
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 008FD882
                                                        • ReleaseDC.USER32(?), ref: 008FD8A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: e95fe4faa5c8bbc87fd7e7e6e466b74c6b13f5e8d1b86834883bc45a13db3961
                                                        • Instruction ID: 078104afb3e4e1f5e590e0643fa2d63719a90e5e17bc3341dd1018b797d0aff8
                                                        • Opcode Fuzzy Hash: e95fe4faa5c8bbc87fd7e7e6e466b74c6b13f5e8d1b86834883bc45a13db3961
                                                        • Instruction Fuzzy Hash: E9E01AB1814A05EFCF40AFA0D80D66DBBB1FB08314F108008F846F7260CB385901AF40
                                                        APIs
                                                          • Part of subcall function 008A7620: _wcslen.LIBCMT ref: 008A7625
                                                        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00914ED4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Connection_wcslen
                                                        • String ID: *$LPT
                                                        • API String ID: 1725874428-3443410124
                                                        • Opcode ID: e4529fa824abecc82f038c4c000bffc3ab7c9590ad090039a2be4d7cc5ba251a
                                                        • Instruction ID: b272a6b41b82a6d0dbde330f9bb70f19709c0da9b97ad02b2c6dc9c17333cecd
                                                        • Opcode Fuzzy Hash: e4529fa824abecc82f038c4c000bffc3ab7c9590ad090039a2be4d7cc5ba251a
                                                        • Instruction Fuzzy Hash: 1B915F75A002089FDB14DF58C484EAABBF5FF49304F198099E40A9F7A2D735ED86CB91
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 008CE30D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__start
                                                        • String ID: pow
                                                        • API String ID: 3213639722-2276729525
                                                        • Opcode ID: e251327da6f83d6c452b7e8e5cbed98b118830491c51bc2f337d5c6792c4ca7e
                                                        • Instruction ID: 40a509fba8cd9213e4abf55d22f245782b9caa99441ccea693c45f596991c0ce
                                                        • Opcode Fuzzy Hash: e251327da6f83d6c452b7e8e5cbed98b118830491c51bc2f337d5c6792c4ca7e
                                                        • Instruction Fuzzy Hash: EC515B61A1C20596DB157728C901B7A2BB4FB40B44F704EAEF095C23ADFB34DC859A46
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: #
                                                        • API String ID: 0-1885708031
                                                        • Opcode ID: 3b713f8239acf5b0ec5e05e9bbaa5f42f53f9714275492eb3a3c00f363a49d46
                                                        • Instruction ID: d9fe28c4567c76b24c56d7d09e06051133b810b490f46bf119ceb01a72aec80e
                                                        • Opcode Fuzzy Hash: 3b713f8239acf5b0ec5e05e9bbaa5f42f53f9714275492eb3a3c00f363a49d46
                                                        • Instruction Fuzzy Hash: 0251117550424ADFEB25EF38C081AFA7BA4FF16310F244065F991DB2E0D6349D42CBA1
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 008BF2A2
                                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 008BF2BB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: d90f4c6d8b719c1c302abf5a751ea0b0799162a2dd96ab09ac42b78d26ec0a44
                                                        • Instruction ID: c4b46e7de06069fc9c88f7d9b32ecc776d4c2322e4018914b8886e1a4ff00966
                                                        • Opcode Fuzzy Hash: d90f4c6d8b719c1c302abf5a751ea0b0799162a2dd96ab09ac42b78d26ec0a44
                                                        • Instruction Fuzzy Hash: 3E51277141C7449FE320AF15DC86BABBBF8FB85300F81885DF29981195EB709529CB67
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 009257E0
                                                        • _wcslen.LIBCMT ref: 009257EC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper_wcslen
                                                        • String ID: CALLARGARRAY
                                                        • API String ID: 157775604-1150593374
                                                        • Opcode ID: 5fd050a434fa4e9abf624e31070e1164a44abeec4f2641d7fb1b3b829fb18554
                                                        • Instruction ID: d5aa725d50d6b4e1fa7ca365c580dd8d3d0a0f4950ad1dd1baf8270d506af6c3
                                                        • Opcode Fuzzy Hash: 5fd050a434fa4e9abf624e31070e1164a44abeec4f2641d7fb1b3b829fb18554
                                                        • Instruction Fuzzy Hash: C1419F71E002199FCB14DFA8D8819BEBBF9FF59324F114029E505AB2A5E7749D81CB90
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 0091D130
                                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0091D13A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_wcslen
                                                        • String ID: |
                                                        • API String ID: 596671847-2343686810
                                                        • Opcode ID: 76f617bec89dd20001a6abcb07dfdac06d4535f67bdf64522435beaf086410af
                                                        • Instruction ID: 25b7fc70911911ce7adb75f622289336887e29e50753fe52c89c1f1582dd90c7
                                                        • Opcode Fuzzy Hash: 76f617bec89dd20001a6abcb07dfdac06d4535f67bdf64522435beaf086410af
                                                        • Instruction Fuzzy Hash: 4B314C71D01219ABDF15EFE4CC85AEEBFB9FF05300F100019F815A6165E735AA56CB51
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?), ref: 00933621
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0093365C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$DestroyMove
                                                        • String ID: static
                                                        • API String ID: 2139405536-2160076837
                                                        • Opcode ID: 49cbefd1398c3efd2720494e999698b6a55cbe16ad15c1f6d6cb617761fede03
                                                        • Instruction ID: b78255602c9139348874e05eac2919c6f128e8417f1e926b3d6b92508dfa3caf
                                                        • Opcode Fuzzy Hash: 49cbefd1398c3efd2720494e999698b6a55cbe16ad15c1f6d6cb617761fede03
                                                        • Instruction Fuzzy Hash: 2B319E71110604AEDB109F68DC82FFB73ADFF88724F009619F8A9D7290DA34AD91DB60
                                                        APIs
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0093461F
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00934634
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: f98bbcea383669641a2062378ca14ca28ef03f869fcb20b9499f48dc55650ad3
                                                        • Instruction ID: 5076625689e7088e00a265647d5e43607026b8b128e6b57c9e6fff36720673a7
                                                        • Opcode Fuzzy Hash: f98bbcea383669641a2062378ca14ca28ef03f869fcb20b9499f48dc55650ad3
                                                        • Instruction Fuzzy Hash: 7D312575A0030A9FDB14CFA9C981BDABBB9FF09304F11406AE904AB381D770A941CF90
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0093327C
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00933287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: 97bf060b60fe331f4a5aed6a0ec766babef0966d6e18031e9261337be18af037
                                                        • Instruction ID: 46394975ef7a4c45f04009d1283c3a04c6674e80112bd03a60c5a6e379ccdbee
                                                        • Opcode Fuzzy Hash: 97bf060b60fe331f4a5aed6a0ec766babef0966d6e18031e9261337be18af037
                                                        • Instruction Fuzzy Hash: 1911B2713442087FFF219E94DC81EBB376FEB94364F108228F928A7290D6719D619B60
                                                        APIs
                                                          • Part of subcall function 008A600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 008A604C
                                                          • Part of subcall function 008A600E: GetStockObject.GDI32(00000011), ref: 008A6060
                                                          • Part of subcall function 008A600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 008A606A
                                                        • GetWindowRect.USER32(00000000,?), ref: 0093377A
                                                        • GetSysColor.USER32(00000012), ref: 00933794
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                        • String ID: static
                                                        • API String ID: 1983116058-2160076837
                                                        • Opcode ID: cda1ffa0c4a255187afa9af9c5bdb8d1989775ebf29c9179a9cabad4b644ec03
                                                        • Instruction ID: f44105a1078fa3615a8e9e47b3596ea46066fcda9ed5f342a56914f3c0b0c0a4
                                                        • Opcode Fuzzy Hash: cda1ffa0c4a255187afa9af9c5bdb8d1989775ebf29c9179a9cabad4b644ec03
                                                        • Instruction Fuzzy Hash: B01129B2654609AFDF00DFA8CC46AEA7BF8FB08314F004914F956E2250E735E8619B50
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0091CD7D
                                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0091CDA6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Internet$OpenOption
                                                        • String ID: <local>
                                                        • API String ID: 942729171-4266983199
                                                        • Opcode ID: 1ed8ad703ff236353010a6058f488740babb6b040362f12232f9562d2abaeceb
                                                        • Instruction ID: 0bb294f8946951fc1f56020068640a5c1d2fb353577bf049dac693c20190dbd1
                                                        • Opcode Fuzzy Hash: 1ed8ad703ff236353010a6058f488740babb6b040362f12232f9562d2abaeceb
                                                        • Instruction Fuzzy Hash: 0A1106F93856397AD7344B669C44EE7BEADEF127A4F004226B109930C0D3749880D6F0
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 009334AB
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 009334BA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: edit
                                                        • API String ID: 2978978980-2167791130
                                                        • Opcode ID: 1c50a7c67fda0fb1853b3197bb74a760765f6f983e4fc8a40cbf20d997f29e54
                                                        • Instruction ID: 2f8b3956dd451d2018cd540e0e844aa6af0af87f900d1f9090f4579917f7b021
                                                        • Opcode Fuzzy Hash: 1c50a7c67fda0fb1853b3197bb74a760765f6f983e4fc8a40cbf20d997f29e54
                                                        • Instruction Fuzzy Hash: 98118F71150208ABEB114F64DC48AEB376EEB45378F508724F965A31E0C775DC919F51
                                                        APIs
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                        • CharUpperBuffW.USER32(?,?,?), ref: 00906CB6
                                                        • _wcslen.LIBCMT ref: 00906CC2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: STOP
                                                        • API String ID: 1256254125-2411985666
                                                        • Opcode ID: 3e755a174b08a52ef43a6c1b9d5a55d030425ff6902ba179ea2fa6c41b3dc30a
                                                        • Instruction ID: 9ceebe66d2ee91fcee7795c69726a40b4b594620ebfd934621984c280d0c2028
                                                        • Opcode Fuzzy Hash: 3e755a174b08a52ef43a6c1b9d5a55d030425ff6902ba179ea2fa6c41b3dc30a
                                                        • Instruction Fuzzy Hash: 3B0104326045368FEB209FBDDC809BF37B8FB61710B000928E992D61D0EB31D960C650
                                                        APIs
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                          • Part of subcall function 00903CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00903CCA
                                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00901D4C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: e915feec8f48ba5effcf4622ac971004ca9a66f694a218affa9242a9d362c0b8
                                                        • Instruction ID: 77897a90b8617c976dcd0a9c9303bd16be497c7744f701cf83ae73eb00b5e9c7
                                                        • Opcode Fuzzy Hash: e915feec8f48ba5effcf4622ac971004ca9a66f694a218affa9242a9d362c0b8
                                                        • Instruction Fuzzy Hash: C801D871605624AFDB08EBA4CC51DFE736CFF47754B040919F862A72C1EA3459088761
                                                        APIs
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                          • Part of subcall function 00903CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00903CCA
                                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00901C46
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: 6b4819fd159e77f9e8b967607e35882060abf6db475c42d408b8654a7121e607
                                                        • Instruction ID: 5b17854c90011b4594b3bf87bb8f8d8fb4f132c1311ca8863a169a9b91746104
                                                        • Opcode Fuzzy Hash: 6b4819fd159e77f9e8b967607e35882060abf6db475c42d408b8654a7121e607
                                                        • Instruction Fuzzy Hash: 7401AC756451146FEB08E7A4C952AFF77ACDB52340F140015F886B71C1EA24DF48D672
                                                        APIs
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                          • Part of subcall function 00903CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00903CCA
                                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00901CC8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: 77416a1be1d1612624e18f9b1fd5ab52876e1a7c807a121e29614a9570b40feb
                                                        • Instruction ID: 76df0603c21e564ee72804b0557f3fee56619c58567a69e12d8fa8c54b2574bd
                                                        • Opcode Fuzzy Hash: 77416a1be1d1612624e18f9b1fd5ab52876e1a7c807a121e29614a9570b40feb
                                                        • Instruction Fuzzy Hash: C601DB716401246BEB04E7A4CA11AFE73ACEB12380F140015F881B32C1EA24DF08D672
                                                        APIs
                                                          • Part of subcall function 008A9CB3: _wcslen.LIBCMT ref: 008A9CBD
                                                          • Part of subcall function 00903CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00903CCA
                                                        • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00901DD3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: 216ed18a7c9f6437f4e7088d24a0ee200ccc2e0e8b996235f9d2bfd7e27e41f5
                                                        • Instruction ID: f7ed3b7e50462e8976d60af3e23a36bbbd0fc51836ecc4845e6f62a6435f9bc4
                                                        • Opcode Fuzzy Hash: 216ed18a7c9f6437f4e7088d24a0ee200ccc2e0e8b996235f9d2bfd7e27e41f5
                                                        • Instruction Fuzzy Hash: A4F02871B546246BEB04F7A8CC52FFF737CFB42394F040915F862A32C1DE645A088261
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: 3, 3, 16, 1
                                                        • API String ID: 176396367-3042988571
                                                        • Opcode ID: 79b47d5d5f378c346f7a6dabe6feef1e57de2485973049f68ac4ae2e47b68975
                                                        • Instruction ID: c6988d3806c9ee3a66bd5c4a1ed8578cb83bbaf8721e42f54044658cfd940802
                                                        • Opcode Fuzzy Hash: 79b47d5d5f378c346f7a6dabe6feef1e57de2485973049f68ac4ae2e47b68975
                                                        • Instruction Fuzzy Hash: 0BE0E51260423010923122AABCC1EBF9A9EDEC5750B10282EF981D227EEAA4CDD193A1
                                                        APIs
                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00900B23
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: Message
                                                        • String ID: AutoIt$Error allocating memory.
                                                        • API String ID: 2030045667-4017498283
                                                        • Opcode ID: f8041144c7c2e59cc5496c5675fc8eecb0762297c9f302af48ab78619ae5af61
                                                        • Instruction ID: 5c5c29708b5a40ebb67e1ceb8fc61881f286a34b354af3fcd16b312c2d195f10
                                                        • Opcode Fuzzy Hash: f8041144c7c2e59cc5496c5675fc8eecb0762297c9f302af48ab78619ae5af61
                                                        • Instruction Fuzzy Hash: CDE020712447183AD21437587C03FC97BC4DF05F65F10042AFB98E55C38BE164900BEA
                                                        APIs
                                                          • Part of subcall function 008BF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,008C0D71,?,?,?,008A100A), ref: 008BF7CE
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,008A100A), ref: 008C0D75
                                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,008A100A), ref: 008C0D84
                                                        Strings
                                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 008C0D7F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                        • API String ID: 55579361-631824599
                                                        • Opcode ID: 650152f8a5b2b9309a9fbdc7fd0b4c8ec5f46c8de5fcb847d11067176664b842
                                                        • Instruction ID: e410ab48ce855bdb99cffb74994e6b2ef1e2b7131c5c85762b32413bcf0b6680
                                                        • Opcode Fuzzy Hash: 650152f8a5b2b9309a9fbdc7fd0b4c8ec5f46c8de5fcb847d11067176664b842
                                                        • Instruction Fuzzy Hash: 06E06DB02007518BD7309FBCD8047427BF0FB00784F004A6DE996C6651DBB4E4489F91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: LocalTime
                                                        • String ID: %.3d$X64
                                                        • API String ID: 481472006-1077770165
                                                        • Opcode ID: cbdb59b31a72b4084501f086e116621be69b618920afb643e1c4a7b20a1b8685
                                                        • Instruction ID: 4ae411575f28b265853d3c9ba85740ec6eafb0602145b17648941840b0083dde
                                                        • Opcode Fuzzy Hash: cbdb59b31a72b4084501f086e116621be69b618920afb643e1c4a7b20a1b8685
                                                        • Instruction Fuzzy Hash: EAD012A180830CE9CB5097F0DC458FAB37DFB08309F508452FB06E1141E634E5086BA2
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0093232C
                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0093233F
                                                          • Part of subcall function 0090E97B: Sleep.KERNEL32 ref: 0090E9F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 9ce6823a5c4cd8732cf66e00f0e32fd920a434326a883a5e1a3a53c314da2d49
                                                        • Instruction ID: a9da5ddf389402b376fbd38d9f1d1f87392af50b1117115f704144078e8dfa49
                                                        • Opcode Fuzzy Hash: 9ce6823a5c4cd8732cf66e00f0e32fd920a434326a883a5e1a3a53c314da2d49
                                                        • Instruction Fuzzy Hash: 4CD012763A8710BBE764B770DC0FFC67A159B40B14F0049167755BA1D0C9F0A841DF54
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0093236C
                                                        • PostMessageW.USER32(00000000), ref: 00932373
                                                          • Part of subcall function 0090E97B: Sleep.KERNEL32 ref: 0090E9F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: ee968174cd8f586d6d9cefb3d076c19fa9bee445d3ca1f22653a8b7b714cee7d
                                                        • Instruction ID: c056e351f977dd5eaa8e8508f433260d8b619884cda8a853d474b6dde63a3c39
                                                        • Opcode Fuzzy Hash: ee968174cd8f586d6d9cefb3d076c19fa9bee445d3ca1f22653a8b7b714cee7d
                                                        • Instruction Fuzzy Hash: E4D0C9723997107AE664A7709C0FFC676159B45B14F0049167655BA1D0C9A0A8419B58
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 008DBE93
                                                        • GetLastError.KERNEL32 ref: 008DBEA1
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 008DBEFC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1317987696.00000000008A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1317966263.00000000008A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.000000000093C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318064297.0000000000962000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318130157.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1318163650.0000000000974000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_8a0000_Y8Q1voljvb.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                        • String ID:
                                                        • API String ID: 1717984340-0
                                                        • Opcode ID: f2185053aedcfc411159e5aa9712b49662e3f5e74c2d473dc04b8d6b9622b913
                                                        • Instruction ID: d9f7416d26fa1b128dba90d2ff1547a85647aa86adbe288b9ab265971b79e966
                                                        • Opcode Fuzzy Hash: f2185053aedcfc411159e5aa9712b49662e3f5e74c2d473dc04b8d6b9622b913
                                                        • Instruction Fuzzy Hash: D841C335604246EFDB218FA9CC44AAA7BA5FF41320F16426AF959D73A1DF308D00DB61