Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QwMcsmYcxv.exe

Overview

General Information

Sample name:QwMcsmYcxv.exe
renamed because original name is a hash value
Original sample name:31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe
Analysis ID:1588009
MD5:a8a4aa9c047894582f100213370da8de
SHA1:e7b4d9747c787599947d9944cc90ed36c31984b4
SHA256:31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7
Tags:exeuser-adrian__luca
Infos:

Detection

AsyncRAT, VenomRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AsyncRAT
Yara detected VenomRAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Drops VBS files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries memory information (via WMI often done to detect virtual machines)
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • QwMcsmYcxv.exe (PID: 5060 cmdline: "C:\Users\user\Desktop\QwMcsmYcxv.exe" MD5: A8A4AA9C047894582F100213370DA8DE)
    • vitrailist.exe (PID: 6228 cmdline: "C:\Users\user\Desktop\QwMcsmYcxv.exe" MD5: A8A4AA9C047894582F100213370DA8DE)
      • RegSvcs.exe (PID: 2016 cmdline: "C:\Users\user\Desktop\QwMcsmYcxv.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 6600 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • vitrailist.exe (PID: 5612 cmdline: "C:\Users\user\AppData\Local\savagenesses\vitrailist.exe" MD5: A8A4AA9C047894582F100213370DA8DE)
      • RegSvcs.exe (PID: 2936 cmdline: "C:\Users\user\AppData\Local\savagenesses\vitrailist.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "87.120.120.15", "Ports": "4449", "Version": "Venom RAT + HVNC + Stealer + Grabber  v6.0.3", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "TQLFQ6mc9u7BHgxDjLp81iV3aaBO8VYS", "Mutex": "ykpleyrgtopul", "Certificate": "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", "ServerSignature": "JgLAoU7z2h5ztjgJ107mkXDKXrjqjBaXNgmcHT1JB80YxZazv3rpCpW4vO1BVxX6Z1xN6UZadE4NYMoHerQBaq9xh238WY0SsNjDaDUlFNBWfXRcsImsGP2YvhgirLXO8qPFPrpN8gfruDqI3o4DpSPtlxP6gMxOuIbIWCkqZgk=", "BDOS": "null", "External_config_on_Pastebin": "false"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmprat_win_dcrat_qwqdanchunFind DcRAT samples (qwqdanchun) based on specific stringsSekoia.io
    • 0xf318:$str03: Po_ng
    • 0xdf44:$str04: Pac_ket
    • 0xfabe:$str05: Perfor_mance
    • 0xfb02:$str06: Install_ed
    • 0xa4cd:$str07: get_IsConnected
    • 0xb7c9:$str08: get_ActivatePo_ng
    • 0xc898:$str09: isVM_by_wim_temper
    • 0xf334:$str10: save_Plugin
    • 0xf5e2:$str11: timeout 3 > NUL
    • 0xf678:$str12: ProcessHacker.exe
    • 0xf86a:$str13: Select * from Win32_CacheMemory
    00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
    • 0xf86a:$q1: Select * from Win32_CacheMemory
    • 0xf8aa:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
    • 0xf8f8:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
    • 0xf946:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
    00000007.00000002.2467888095.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Click to see the 5 entries
        SourceRuleDescriptionAuthorStrings
        2.2.vitrailist.exe.11a0000.1.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          2.2.vitrailist.exe.11a0000.1.raw.unpackrat_win_dcrat_qwqdanchunFind DcRAT samples (qwqdanchun) based on specific stringsSekoia.io
          • 0xf318:$str03: Po_ng
          • 0xdf44:$str04: Pac_ket
          • 0xfabe:$str05: Perfor_mance
          • 0xfb02:$str06: Install_ed
          • 0xa4cd:$str07: get_IsConnected
          • 0xb7c9:$str08: get_ActivatePo_ng
          • 0xc898:$str09: isVM_by_wim_temper
          • 0xf334:$str10: save_Plugin
          • 0xf5e2:$str11: timeout 3 > NUL
          • 0xf678:$str12: ProcessHacker.exe
          • 0xf86a:$str13: Select * from Win32_CacheMemory
          2.2.vitrailist.exe.11a0000.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
          • 0xf86a:$q1: Select * from Win32_CacheMemory
          • 0xf8aa:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
          • 0xf8f8:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
          • 0xf946:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
          6.2.vitrailist.exe.1af0000.1.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            6.2.vitrailist.exe.1af0000.1.unpackrat_win_dcrat_qwqdanchunFind DcRAT samples (qwqdanchun) based on specific stringsSekoia.io
            • 0xd518:$str03: Po_ng
            • 0xc144:$str04: Pac_ket
            • 0xdcbe:$str05: Perfor_mance
            • 0xdd02:$str06: Install_ed
            • 0x86cd:$str07: get_IsConnected
            • 0x99c9:$str08: get_ActivatePo_ng
            • 0xaa98:$str09: isVM_by_wim_temper
            • 0xd534:$str10: save_Plugin
            • 0xd7e2:$str11: timeout 3 > NUL
            • 0xd878:$str12: ProcessHacker.exe
            • 0xda6a:$str13: Select * from Win32_CacheMemory
            Click to see the 10 entries

            System Summary

            barindex
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs" , ProcessId: 6600, ProcessName: wscript.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs" , ProcessId: 6600, ProcessName: wscript.exe

            Data Obfuscation

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\savagenesses\vitrailist.exe, ProcessId: 6228, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "87.120.120.15", "Ports": "4449", "Version": "Venom RAT + HVNC + Stealer + Grabber v6.0.3", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "TQLFQ6mc9u7BHgxDjLp81iV3aaBO8VYS", "Mutex": "ykpleyrgtopul", "Certificate": "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", "ServerSignature": "JgLAoU7z2h5ztjgJ107mkXDKXrjqjBaXNgmcHT1JB80YxZazv3rpCpW4vO1BVxX6Z1xN6UZadE4NYMoHerQBaq9xh238WY0SsNjDaDUlFNBWfXRcsImsGP2YvhgirLXO8qPFPrpN8gfruDqI3o4DpSPtlxP6gMxOuIbIWCkqZgk=", "BDOS": "null", "External_config_on_Pastebin": "false"}
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeReversingLabs: Detection: 65%
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeVirustotal: Detection: 68%Perma Link
            Source: QwMcsmYcxv.exeReversingLabs: Detection: 65%
            Source: QwMcsmYcxv.exeVirustotal: Detection: 68%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeJoe Sandbox ML: detected
            Source: QwMcsmYcxv.exeJoe Sandbox ML: detected
            Source: QwMcsmYcxv.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: wntdll.pdbUGP source: vitrailist.exe, 00000002.00000003.2193610305.00000000041E0000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000002.00000003.2192225434.0000000004040000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000006.00000003.2346966092.0000000004380000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000006.00000003.2347741531.0000000004520000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: vitrailist.exe, 00000002.00000003.2193610305.00000000041E0000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000002.00000003.2192225434.0000000004040000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000006.00000003.2346966092.0000000004380000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000006.00000003.2347741531.0000000004520000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0103445A
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0103C75C
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103C6D1 FindFirstFileW,FindClose,0_2_0103C6D1
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0103EF95
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0103F0F2
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0103F3F3
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_010337EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_010337EF
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01033B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_01033B12
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0103BCBC
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101445A GetFileAttributesW,FindFirstFileW,FindClose,2_2_0101445A
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_0101C75C
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101C6D1 FindFirstFileW,FindClose,2_2_0101C6D1
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_0101EF95
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_0101F0F2
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_0101F3F3
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_010137EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_010137EF
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_01013B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_01013B12
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_0101BCBC
            Source: global trafficTCP traffic: 192.168.2.6:49227 -> 87.120.120.15:4449
            Source: global trafficTCP traffic: 192.168.2.6:49226 -> 1.1.1.1:53
            Source: Joe Sandbox ViewASN Name: UNACS-AS-BG8000BurgasBG UNACS-AS-BG8000BurgasBG
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: unknownTCP traffic detected without corresponding DNS query: 87.120.120.15
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_010422EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_010422EE
            Source: RegSvcs.exe, 00000003.00000002.3390175396.0000000002383000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: 2.2.vitrailist.exe.11a0000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.vitrailist.exe.1af0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.vitrailist.exe.1af0000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.vitrailist.exe.11a0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2467888095.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: vitrailist.exe PID: 6228, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: vitrailist.exe PID: 5612, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2936, type: MEMORYSTR
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01044164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_01044164
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01044164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_01044164
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_01024164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_01024164
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01043F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_01043F66
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0103001C
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0105CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0105CABC
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0103CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_0103CABC

            System Summary

            barindex
            Source: 2.2.vitrailist.exe.11a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
            Source: 2.2.vitrailist.exe.11a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 6.2.vitrailist.exe.1af0000.1.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
            Source: 6.2.vitrailist.exe.1af0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
            Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 6.2.vitrailist.exe.1af0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
            Source: 6.2.vitrailist.exe.1af0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 2.2.vitrailist.exe.11a0000.1.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
            Source: 2.2.vitrailist.exe.11a0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
            Source: 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
            Source: 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: This is a third-party compiled AutoIt script.0_2_00FD3B3A
            Source: QwMcsmYcxv.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: QwMcsmYcxv.exe, 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_9ebe339d-8
            Source: QwMcsmYcxv.exe, 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_569f768f-4
            Source: QwMcsmYcxv.exe, 00000000.00000003.2154130436.00000000037E3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fbe0d0eb-3
            Source: QwMcsmYcxv.exe, 00000000.00000003.2154130436.00000000037E3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_2aceb43d-0
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: This is a third-party compiled AutoIt script.2_2_00FB3B3A
            Source: vitrailist.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: vitrailist.exe, 00000002.00000002.2194720849.0000000001064000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_4372a714-3
            Source: vitrailist.exe, 00000002.00000002.2194720849.0000000001064000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_cd270d5f-0
            Source: vitrailist.exe, 00000006.00000000.2302227161.0000000001064000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c7607427-a
            Source: vitrailist.exe, 00000006.00000000.2302227161.0000000001064000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_52ff4584-4
            Source: QwMcsmYcxv.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e9242de3-3
            Source: QwMcsmYcxv.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_0896d5e2-b
            Source: vitrailist.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_a10555ca-f
            Source: vitrailist.exe.0.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_eb30bd11-c
            Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_008970A8 NtProtectVirtualMemory,3_2_008970A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00896C52 NtProtectVirtualMemory,3_2_00896C52
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01846CC0 NtProtectVirtualMemory,7_2_01846CC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0184686A NtProtectVirtualMemory,7_2_0184686A
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0103A1EF
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01028310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_01028310
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_010351BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_010351BD
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_010151BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,2_2_010151BD
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FDE6A00_2_00FDE6A0
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FFD9750_2_00FFD975
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FDFCE00_2_00FDFCE0
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FF21C50_2_00FF21C5
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_010503DA0_2_010503DA
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_010062D20_2_010062D2
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FF25FA0_2_00FF25FA
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0100242E0_2_0100242E
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FE66E10_2_00FE66E1
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0100878F0_2_0100878F
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0102E6160_2_0102E616
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FE88080_2_00FE8808
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_010068440_2_01006844
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_010508570_2_01050857
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_010388890_2_01038889
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FFCB210_2_00FFCB21
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01006DB60_2_01006DB6
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FE6F9E0_2_00FE6F9E
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FE30300_2_00FE3030
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FFF1D90_2_00FFF1D9
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FF31870_2_00FF3187
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FD12870_2_00FD1287
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FF14840_2_00FF1484
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FE55200_2_00FE5520
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FF76960_2_00FF7696
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FE57600_2_00FE5760
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FF19780_2_00FF1978
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01009AB50_2_01009AB5
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01057DDB0_2_01057DDB
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FFBDA60_2_00FFBDA6
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FF1D900_2_00FF1D90
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FE3FE00_2_00FE3FE0
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FDDF000_2_00FDDF00
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_012EA4B00_2_012EA4B0
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FBE6A02_2_00FBE6A0
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FDD9752_2_00FDD975
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FBFCE02_2_00FBFCE0
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FD21C52_2_00FD21C5
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FE62D22_2_00FE62D2
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_010303DA2_2_010303DA
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FE242E2_2_00FE242E
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FD25FA2_2_00FD25FA
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FC66E12_2_00FC66E1
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0100E6162_2_0100E616
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FE878F2_2_00FE878F
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FE68442_2_00FE6844
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FC88082_2_00FC8808
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_010308572_2_01030857
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_010188892_2_01018889
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FDCB212_2_00FDCB21
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FE6DB62_2_00FE6DB6
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FC6F9E2_2_00FC6F9E
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FC30302_2_00FC3030
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FDF1D92_2_00FDF1D9
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FD31872_2_00FD3187
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FB12872_2_00FB1287
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FD14842_2_00FD1484
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FC55202_2_00FC5520
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FD76962_2_00FD7696
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FC57602_2_00FC5760
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FD19782_2_00FD1978
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FE9AB52_2_00FE9AB5
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_01037DDB2_2_01037DDB
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FDBDA62_2_00FDBDA6
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FD1D902_2_00FD1D90
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FC3FE02_2_00FC3FE0
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FBDF002_2_00FBDF00
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_01A89C682_2_01A89C68
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_008964D83_2_008964D8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_008952403_2_00895240
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00895B103_2_00895B10
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_008964C83_2_008964C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00896C523_2_00896C52
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00894EF83_2_00894EF8
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 6_2_01BD97B06_2_01BD97B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_018460F07_2_018460F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_018457287_2_01845728
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01844E587_2_01844E58
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_018460E07_2_018460E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0184686A7_2_0184686A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01844B107_2_01844B10
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: String function: 00FB7DE1 appears 35 times
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: String function: 00FD0AE3 appears 70 times
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: String function: 00FD8900 appears 42 times
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: String function: 00FF8900 appears 42 times
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: String function: 00FD7DE1 appears 35 times
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: String function: 00FF0AE3 appears 70 times
            Source: QwMcsmYcxv.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 2.2.vitrailist.exe.11a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
            Source: 2.2.vitrailist.exe.11a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 6.2.vitrailist.exe.1af0000.1.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
            Source: 6.2.vitrailist.exe.1af0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
            Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 6.2.vitrailist.exe.1af0000.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
            Source: 6.2.vitrailist.exe.1af0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 2.2.vitrailist.exe.11a0000.1.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
            Source: 2.2.vitrailist.exe.11a0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
            Source: 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
            Source: 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@10/8@0/1
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103A06A GetLastError,FormatMessageW,0_2_0103A06A
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_010281CB AdjustTokenPrivileges,CloseHandle,0_2_010281CB
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_010287E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_010287E1
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_010081CB AdjustTokenPrivileges,CloseHandle,2_2_010081CB
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_010087E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,2_2_010087E1
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0103B333
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0104EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0104EE0D
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103C397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0103C397
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FD4E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00FD4E89
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeFile created: C:\Users\user\AppData\Local\savagenessesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\ykpleyrgtopul
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeFile created: C:\Users\user\AppData\Local\Temp\aut4777.tmpJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs"
            Source: QwMcsmYcxv.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: QwMcsmYcxv.exeReversingLabs: Detection: 65%
            Source: QwMcsmYcxv.exeVirustotal: Detection: 68%
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeFile read: C:\Users\user\Desktop\QwMcsmYcxv.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\QwMcsmYcxv.exe "C:\Users\user\Desktop\QwMcsmYcxv.exe"
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeProcess created: C:\Users\user\AppData\Local\savagenesses\vitrailist.exe "C:\Users\user\Desktop\QwMcsmYcxv.exe"
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\QwMcsmYcxv.exe"
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\savagenesses\vitrailist.exe "C:\Users\user\AppData\Local\savagenesses\vitrailist.exe"
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\savagenesses\vitrailist.exe"
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeProcess created: C:\Users\user\AppData\Local\savagenesses\vitrailist.exe "C:\Users\user\Desktop\QwMcsmYcxv.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\QwMcsmYcxv.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\savagenesses\vitrailist.exe "C:\Users\user\AppData\Local\savagenesses\vitrailist.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\savagenesses\vitrailist.exe" Jump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: QwMcsmYcxv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: QwMcsmYcxv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: QwMcsmYcxv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: QwMcsmYcxv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: QwMcsmYcxv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: QwMcsmYcxv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: QwMcsmYcxv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: wntdll.pdbUGP source: vitrailist.exe, 00000002.00000003.2193610305.00000000041E0000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000002.00000003.2192225434.0000000004040000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000006.00000003.2346966092.0000000004380000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000006.00000003.2347741531.0000000004520000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: vitrailist.exe, 00000002.00000003.2193610305.00000000041E0000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000002.00000003.2192225434.0000000004040000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000006.00000003.2346966092.0000000004380000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000006.00000003.2347741531.0000000004520000.00000004.00001000.00020000.00000000.sdmp
            Source: QwMcsmYcxv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: QwMcsmYcxv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: QwMcsmYcxv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: QwMcsmYcxv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: QwMcsmYcxv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FD4B37 LoadLibraryA,GetProcAddress,0_2_00FD4B37
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FF8945 push ecx; ret 0_2_00FF8958
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FD8945 push ecx; ret 2_2_00FD8958
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01841270 push edi; ret 7_2_01841282
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeFile created: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeJump to dropped file

            Boot Survival

            barindex
            Source: Yara matchFile source: 2.2.vitrailist.exe.11a0000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.vitrailist.exe.1af0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.vitrailist.exe.1af0000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.vitrailist.exe.11a0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2467888095.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: vitrailist.exe PID: 6228, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: vitrailist.exe PID: 5612, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2936, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbsJump to dropped file
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbsJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbsJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FD48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00FD48D7
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01055376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_01055376
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FB48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_00FB48D7
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_01035376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_01035376
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FF3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00FF3187
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 2.2.vitrailist.exe.11a0000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.vitrailist.exe.1af0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.vitrailist.exe.1af0000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.vitrailist.exe.11a0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2467888095.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: vitrailist.exe PID: 6228, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: vitrailist.exe PID: 5612, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2936, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_CacheMemory
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_CacheMemory
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeAPI/Special instruction interceptor: Address: 1A8988C
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeAPI/Special instruction interceptor: Address: 1BD93D4
            Source: vitrailist.exe, 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2467888095.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-105247
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeAPI coverage: 4.6 %
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeAPI coverage: 4.8 %
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0103445A
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0103C75C
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103C6D1 FindFirstFileW,FindClose,0_2_0103C6D1
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0103EF95
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0103F0F2
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0103F3F3
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_010337EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_010337EF
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01033B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_01033B12
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0103BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0103BCBC
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101445A GetFileAttributesW,FindFirstFileW,FindClose,2_2_0101445A
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_0101C75C
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101C6D1 FindFirstFileW,FindClose,2_2_0101C6D1
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_0101EF95
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_0101F0F2
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_0101F3F3
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_010137EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_010137EF
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_01013B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_01013B12
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_0101BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_0101BCBC
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FD49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00FD49A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: wscript.exe, 00000005.00000002.2304035285.000001A73DA0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
            Source: RegSvcs.exe, 00000003.00000002.3392396385.0000000004916000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01043F09 BlockInput,0_2_01043F09
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FD3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00FD3B3A
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01005A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_01005A7C
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FD4B37 LoadLibraryA,GetProcAddress,0_2_00FD4B37
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_012EA340 mov eax, dword ptr fs:[00000030h]0_2_012EA340
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_012EA3A0 mov eax, dword ptr fs:[00000030h]0_2_012EA3A0
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_012E8D30 mov eax, dword ptr fs:[00000030h]0_2_012E8D30
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_01A884E8 mov eax, dword ptr fs:[00000030h]2_2_01A884E8
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_01A89B58 mov eax, dword ptr fs:[00000030h]2_2_01A89B58
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_01A89AF8 mov eax, dword ptr fs:[00000030h]2_2_01A89AF8
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 6_2_01BD8030 mov eax, dword ptr fs:[00000030h]6_2_01BD8030
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 6_2_01BD96A0 mov eax, dword ptr fs:[00000030h]6_2_01BD96A0
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 6_2_01BD9640 mov eax, dword ptr fs:[00000030h]6_2_01BD9640
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0102810A GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_0102810A
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FFA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FFA155
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FFA124 SetUnhandledExceptionFilter,0_2_00FFA124
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FDA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00FDA155
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_00FDA124 SetUnhandledExceptionFilter,2_2_00FDA124
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 3F4008Jump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1049008Jump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_010287B1 LogonUserW,0_2_010287B1
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FD3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00FD3B3A
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FD48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00FD48D7
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01034C27 mouse_event,0_2_01034C27
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\QwMcsmYcxv.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\savagenesses\vitrailist.exe "C:\Users\user\AppData\Local\savagenesses\vitrailist.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\savagenesses\vitrailist.exe" Jump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01027CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_01027CAF
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_0102874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0102874B
            Source: QwMcsmYcxv.exe, vitrailist.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: QwMcsmYcxv.exe, vitrailist.exeBinary or memory string: Shell_TrayWnd
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FF862B cpuid 0_2_00FF862B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01004E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_01004E87
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01011E06 GetUserNameW,0_2_01011E06
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01003F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_01003F3A
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_00FD49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00FD49A0
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: 2.2.vitrailist.exe.11a0000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.vitrailist.exe.1af0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.vitrailist.exe.1af0000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.vitrailist.exe.11a0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2467888095.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: vitrailist.exe PID: 6228, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: vitrailist.exe PID: 5612, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2936, type: MEMORYSTR
            Source: vitrailist.exe, 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2467888095.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: MSASCui.exe
            Source: vitrailist.exe, 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2467888095.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: procexp.exe
            Source: vitrailist.exe, 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, vitrailist.exe, 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2467888095.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: MsMpEng.exe
            Source: vitrailist.exeBinary or memory string: WIN_81
            Source: vitrailist.exeBinary or memory string: WIN_XP
            Source: vitrailist.exeBinary or memory string: WIN_XPe
            Source: vitrailist.exeBinary or memory string: WIN_VISTA
            Source: vitrailist.exeBinary or memory string: WIN_7
            Source: vitrailist.exeBinary or memory string: WIN_8
            Source: vitrailist.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01046283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_01046283
            Source: C:\Users\user\Desktop\QwMcsmYcxv.exeCode function: 0_2_01046747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_01046747
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_01026283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,2_2_01026283
            Source: C:\Users\user\AppData\Local\savagenesses\vitrailist.exeCode function: 2_2_01026747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_01026747
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information111
            Scripting
            2
            Valid Accounts
            1
            Windows Management Instrumentation
            111
            Scripting
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            21
            Input Capture
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop Protocol21
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            Scheduled Task/Job
            2
            Valid Accounts
            2
            Valid Accounts
            22
            Obfuscated Files or Information
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares3
            Clipboard Data
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron2
            Scheduled Task/Job
            21
            Access Token Manipulation
            1
            DLL Side-Loading
            NTDS127
            System Information Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchd2
            Registry Run Keys / Startup Folder
            212
            Process Injection
            1
            Masquerading
            LSA Secrets441
            Security Software Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
            Scheduled Task/Job
            2
            Valid Accounts
            Cached Domain Credentials11
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items2
            Registry Run Keys / Startup Folder
            11
            Virtualization/Sandbox Evasion
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1588009 Sample: QwMcsmYcxv.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 31 Found malware configuration 2->31 33 Malicious sample detected (through community Yara rule) 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 7 other signatures 2->37 7 QwMcsmYcxv.exe 4 2->7         started        11 wscript.exe 1 2->11         started        process3 file4 25 C:\Users\user\AppData\...\vitrailist.exe, PE32 7->25 dropped 41 Binary is likely a compiled AutoIt script file 7->41 13 vitrailist.exe 2 7->13         started        43 Windows Scripting host queries suspicious COM object (likely to drop second stage) 11->43 17 vitrailist.exe 1 11->17         started        signatures5 process6 file7 27 C:\Users\user\AppData\...\vitrailist.vbs, data 13->27 dropped 45 Multi AV Scanner detection for dropped file 13->45 47 Binary is likely a compiled AutoIt script file 13->47 49 Machine Learning detection for dropped file 13->49 55 3 other signatures 13->55 19 RegSvcs.exe 4 13->19         started        51 Writes to foreign memory regions 17->51 53 Maps a DLL or memory area into another process 17->53 23 RegSvcs.exe 3 17->23         started        signatures8 process9 dnsIp10 29 87.120.120.15, 4449, 49227, 49254 UNACS-AS-BG8000BurgasBG Bulgaria 19->29 39 Queries memory information (via WMI often done to detect virtual machines) 19->39 signatures11

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            QwMcsmYcxv.exe66%ReversingLabsWin32.Trojan.AutoitInject
            QwMcsmYcxv.exe68%VirustotalBrowse
            QwMcsmYcxv.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\savagenesses\vitrailist.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\savagenesses\vitrailist.exe66%ReversingLabsWin32.Trojan.AutoitInject
            C:\Users\user\AppData\Local\savagenesses\vitrailist.exe68%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000003.00000002.3390175396.0000000002383000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              87.120.120.15
              unknownBulgaria
              25206UNACS-AS-BG8000BurgasBGtrue
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1588009
              Start date and time:2025-01-10 20:28:59 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 19s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:9
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:QwMcsmYcxv.exe
              renamed because original name is a hash value
              Original Sample Name:31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7.exe
              Detection:MAL
              Classification:mal100.troj.expl.evad.winEXE@10/8@0/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 55
              • Number of non-executed functions: 277
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
              • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              TimeTypeDescription
              14:31:06API Interceptor17x Sleep call for process: RegSvcs.exe modified
              20:29:58AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              UNACS-AS-BG8000BurgasBGXf3rn1smZw.exeGet hashmaliciousRedLineBrowse
              • 87.120.120.86
              wqSmINeWgm.exeGet hashmaliciousRedLineBrowse
              • 87.120.120.7
              2eRd5imEKU.exeGet hashmaliciousRedLineBrowse
              • 87.120.120.86
              2eRd5imEKU.exeGet hashmaliciousRedLineBrowse
              • 87.120.120.86
              17364916859ea2c227941e63335bcf02a749f58a3f6d7a5fc5312d32a2ea1c4a4cc26022a4160.dat-decoded.exeGet hashmaliciousXWormBrowse
              • 87.120.116.179
              Material Requirments.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
              • 87.120.116.245
              Material requirements_1.pif.exeGet hashmaliciousRemcosBrowse
              • 87.120.116.245
              17363482243fcf48f1d103ef5a4702c871424ad69b9eb7d3f5e5957f5c4810f2a51fea8e76776.dat-decoded.exeGet hashmaliciousXWormBrowse
              • 87.120.116.179
              17363364631bc7418009f735fbf6670730f0df5be418dd7fb7bf7e79b36349f3b17d812142896.dat-decoded.exeGet hashmaliciousXWormBrowse
              • 87.120.116.179
              Inquiry List.docGet hashmaliciousDarkVision RatBrowse
              • 87.120.113.91
              No context
              No context
              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1159
              Entropy (8bit):5.3458720040787515
              Encrypted:false
              SSDEEP:24:ML9E4KiE4KnKDE4KhKiKhPKIE4oKNzKoZAE4KzeosXE4qdKm:MxHKiHKnYHKh3oPtHo6hAHKzePHA
              MD5:F4BD67337451E88A079DB354803152AE
              SHA1:C0868134496119FD7E829734007B6315D8329ADF
              SHA-256:793FC6B03B54B8944DB2E17259D1CF5AEC12D6BB09D87374FAD3041149E17340
              SHA-512:0A2AFB2E03C37DF278D5DE9095928A5D04059815749C9DD5F4DE9DF6ED4A01BF0E4FBC2C9BCA51216EE3447DD8A3233CAF00D5C28BE064F7CE836221543999AC
              Malicious:false
              Reputation:low
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, Pu
              Process:C:\Users\user\Desktop\QwMcsmYcxv.exe
              File Type:data
              Category:dropped
              Size (bytes):59076
              Entropy (8bit):7.7757700298022785
              Encrypted:false
              SSDEEP:1536:/lS/OvOzs5NGZEloPvRSDRdemn2PmBrQmk/tB:/NTGZEloP52keqr
              MD5:5CA5663395ED6CFB8E9F4D1B6C89793A
              SHA1:C20A37A9DD9A3D5B13A3466689F131D79130A4DA
              SHA-256:9D2A31DA233A05E4F24D04F4ED85CEF2A0F01576AE843E6F501CE313B0B5EACA
              SHA-512:3E20C19BE274E32CC152CE3CF1A669BA8C10A6878BDDACECF3C34FDAEBC6B3E0CDABAB81ED39397FCE78C796217C765C99339D74A4F6B5AA6D95AA405180D521
              Malicious:false
              Reputation:low
              Preview:EA06..(....u.L.4.Th5no..P.... ...9..)@.....}[ ../..^ZFn'..G0...rW"...id.W]...s.|....mT).j.8...h..O_..m..er,....R.V.N)...._W.`.aI.Rj...._J.R.....C@....a........T.5i..Fh....R.. ..0..hU..Ze).$ksJ...c.....t..4.1........Y.T(.!...g.q..@...Fiu...'l.Iu2l..A......l......0..-.9......N@......R..>..F...R...-N.4..Zf.2.0......P..T|u+(.&.'..F.V.P)u.6*.4....)...J.....Vz\....P.^L.a.A.5...P..12...sd.E....NuR.Ni..D.I..*Q.=&WO.R......O.R....Vm9....;MJ.M..(U[_".8..#.....x..6.).....j.)...J.Sc...".2..g.......Z.*aO.Z.t...#U.R.V.T.A.P.v0...6.T.....a1..(...C}x..)q....k.L(....m0.Th.IM..P.M)1.5F.\../...}h... ....'.hg....]L...I.0..t(....?A.N"0@..k?.H/.@...<../x9D.sK.If......pMj@..<...T)Sk...A.L@..Db.. .(3Z]B......]D.F..P.SJ._.].x%.....].,$.n.......).7.D..ds...!?..&V-...2...T...9V..#=.,...0p....N.....4..Z(..X%SX...|.N.wp..=X..j.).H.X.c.e2 .I............1..<...........1..<j4.`..:.@..?...5I..6.x.(...B.*.tn ........}D.'y.U........XuS.8.!t..f3...V..Z..(./QH.P,u..F.9.Niu./|...k@.......j.~..n.P.
              Process:C:\Users\user\AppData\Local\savagenesses\vitrailist.exe
              File Type:data
              Category:dropped
              Size (bytes):59076
              Entropy (8bit):7.7757700298022785
              Encrypted:false
              SSDEEP:1536:/lS/OvOzs5NGZEloPvRSDRdemn2PmBrQmk/tB:/NTGZEloP52keqr
              MD5:5CA5663395ED6CFB8E9F4D1B6C89793A
              SHA1:C20A37A9DD9A3D5B13A3466689F131D79130A4DA
              SHA-256:9D2A31DA233A05E4F24D04F4ED85CEF2A0F01576AE843E6F501CE313B0B5EACA
              SHA-512:3E20C19BE274E32CC152CE3CF1A669BA8C10A6878BDDACECF3C34FDAEBC6B3E0CDABAB81ED39397FCE78C796217C765C99339D74A4F6B5AA6D95AA405180D521
              Malicious:false
              Reputation:low
              Preview:EA06..(....u.L.4.Th5no..P.... ...9..)@.....}[ ../..^ZFn'..G0...rW"...id.W]...s.|....mT).j.8...h..O_..m..er,....R.V.N)...._W.`.aI.Rj...._J.R.....C@....a........T.5i..Fh....R.. ..0..hU..Ze).$ksJ...c.....t..4.1........Y.T(.!...g.q..@...Fiu...'l.Iu2l..A......l......0..-.9......N@......R..>..F...R...-N.4..Zf.2.0......P..T|u+(.&.'..F.V.P)u.6*.4....)...J.....Vz\....P.^L.a.A.5...P..12...sd.E....NuR.Ni..D.I..*Q.=&WO.R......O.R....Vm9....;MJ.M..(U[_".8..#.....x..6.).....j.)...J.Sc...".2..g.......Z.*aO.Z.t...#U.R.V.T.A.P.v0...6.T.....a1..(...C}x..)q....k.L(....m0.Th.IM..P.M)1.5F.\../...}h... ....'.hg....]L...I.0..t(....?A.N"0@..k?.H/.@...<../x9D.sK.If......pMj@..<...T)Sk...A.L@..Db.. .(3Z]B......]D.F..P.SJ._.].x%.....].,$.n.......).7.D..ds...!?..&V-...2...T...9V..#=.,...0p....N.....4..Z(..X%SX...|.N.wp..=X..j.).H.X.c.e2 .I............1..<...........1..<j4.`..:.@..?...5I..6.x.(...B.*.tn ........}D.'y.U........XuS.8.!t..f3...V..Z..(./QH.P,u..F.9.Niu./|...k@.......j.~..n.P.
              Process:C:\Users\user\AppData\Local\savagenesses\vitrailist.exe
              File Type:data
              Category:dropped
              Size (bytes):59076
              Entropy (8bit):7.7757700298022785
              Encrypted:false
              SSDEEP:1536:/lS/OvOzs5NGZEloPvRSDRdemn2PmBrQmk/tB:/NTGZEloP52keqr
              MD5:5CA5663395ED6CFB8E9F4D1B6C89793A
              SHA1:C20A37A9DD9A3D5B13A3466689F131D79130A4DA
              SHA-256:9D2A31DA233A05E4F24D04F4ED85CEF2A0F01576AE843E6F501CE313B0B5EACA
              SHA-512:3E20C19BE274E32CC152CE3CF1A669BA8C10A6878BDDACECF3C34FDAEBC6B3E0CDABAB81ED39397FCE78C796217C765C99339D74A4F6B5AA6D95AA405180D521
              Malicious:false
              Reputation:low
              Preview:EA06..(....u.L.4.Th5no..P.... ...9..)@.....}[ ../..^ZFn'..G0...rW"...id.W]...s.|....mT).j.8...h..O_..m..er,....R.V.N)...._W.`.aI.Rj...._J.R.....C@....a........T.5i..Fh....R.. ..0..hU..Ze).$ksJ...c.....t..4.1........Y.T(.!...g.q..@...Fiu...'l.Iu2l..A......l......0..-.9......N@......R..>..F...R...-N.4..Zf.2.0......P..T|u+(.&.'..F.V.P)u.6*.4....)...J.....Vz\....P.^L.a.A.5...P..12...sd.E....NuR.Ni..D.I..*Q.=&WO.R......O.R....Vm9....;MJ.M..(U[_".8..#.....x..6.).....j.)...J.Sc...".2..g.......Z.*aO.Z.t...#U.R.V.T.A.P.v0...6.T.....a1..(...C}x..)q....k.L(....m0.Th.IM..P.M)1.5F.\../...}h... ....'.hg....]L...I.0..t(....?A.N"0@..k?.H/.@...<../x9D.sK.If......pMj@..<...T)Sk...A.L@..Db.. .(3Z]B......]D.F..P.SJ._.].x%.....].,$.n.......).7.D..ds...!?..&V-...2...T...9V..#=.,...0p....N.....4..Z(..X%SX...|.N.wp..=X..j.).H.X.c.e2 .I............1..<...........1..<j4.`..:.@..?...5I..6.x.(...B.*.tn ........}D.'y.U........XuS.8.!t..f3...V..Z..(./QH.P,u..F.9.Niu./|...k@.......j.~..n.P.
              Process:C:\Users\user\Desktop\QwMcsmYcxv.exe
              File Type:data
              Category:dropped
              Size (bytes):75776
              Entropy (8bit):6.773205847805882
              Encrypted:false
              SSDEEP:1536:U/dCOkNaGg61IXiMDu3LsUD0it1N52QZyt7HXo:U/dCOKao8iMgJDDVy7HY
              MD5:4BE3A6E947BCFAB9DF6E7D8B46A1E469
              SHA1:87E8D307342B7240661EC626A4B234BFD454BB06
              SHA-256:1E0BDE0130CBDF5BF6343A5BD3A290F03ABDD27487227B07DFA141217E01F5D0
              SHA-512:CAACABEE707284A7B846A7BC7F8B40A48F91B188B251CD33E8D33088595F37D34DF8A06D31A2135099AAB9F6D9C111DD5B5D017A1388ECE3E1B5551B43E67FED
              Malicious:false
              Preview:.c.PI0K4FQAV..KP.0K4BQAVr9KPJ0K4BQAV29KPJ0K4BQAV29KPJ0K4BQAV.9KPD/.:B.H...J....\+"a&@V,"+]kW#?/9F.)5jB>Zb8/vvv.p'_/Ql\L\.9KPJ0K4..AV~8HP.-.WBQAV29KP.0I4IPIV2/JPJ K4BQAV..JPJ.K4B.@V29.PJ.K4BSAV69KPJ0K4FQAV29KPJ.J4BSAV29KPH0..BQQV2)KPJ0[4BAAV29KPZ0K4BQAV29KP..J4.QAV2yJP.=K4BQAV29KPJ0K4BQAV2YJPF0K4BQAV29KPJ0K4BQAV29KPJ0K4BQAV29KPJ0K4BQAV29KPJ0K4BqAV:9KPJ0K4BQAV:.KP.0K4BQAV29KPdD.L6QAV.-JPJ.K4BG@V2;KPJ0K4BQAV29KPj0KTl#2$Q9KP.=K4B.@V27KPJ(J4BQAV29KPJ0K4.QA..K.<%SK4NQAV2YJPJ2K4Bw@V29KPJ0K4BQAVr9K.J0K4BQAV29KPJ0K4Re@V29KP.0K4@QDVb@KP.K4CQAV.9KVJ0K4BQAV29KPJ0K4BQAV29KPJ0K4BQAV29KPJ0K4BQAV29KP.gK3.YVz...J0K4..AQ..KPy.. BQAV.9dP.0K4\S:R29Ozh2HIFQAR.'I+O0K0hsCUO<KPN.U69WAV6.iRIMM4BUk.L8KPN.P4B[xG29KR41K4Fy]V23c[J0M.@yHV2?a>41K4Fy\V235QJ0O6j[AV4.UPJ:a.0PAVB;cQJ0M6jRAV4..PJ1I.GQAP.xKPK.T4B[k00GhPJ:60BQET)DNPJ4I.fQA\.'Ixn0K>h.?Y29Oup'K4Bw?X29O.L.K4D".V23n.E0K01.AV8..PJ:5?BQE~$9KV.<K4F{.(;9KT%5K4DhaV295RJ0O6jOAV8..PJ6r?BQA(19KTH.U4B[k.A5KPL.B4BUU.4#KPLCb4BW.]29O..0K>.]AV6&F.G0K0h.2x29M.D0K0h#?_29O?
              Process:C:\Users\user\Desktop\QwMcsmYcxv.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):973312
              Entropy (8bit):6.86141398806319
              Encrypted:false
              SSDEEP:24576:Gu6J33O0c+JY5UZ+XC0kGso6Fat0svhWWY:Iu0c++OCvkGs9Fat0sv7Y
              MD5:A8A4AA9C047894582F100213370DA8DE
              SHA1:E7B4D9747C787599947D9944CC90ED36C31984B4
              SHA-256:31C1B7A32FED169045D32FDA5B53A1BCC9E2919EF9217B3232380F89869204C7
              SHA-512:235B0A604D73EA9A45C3DB63693CF1A6EE3F38EA783C22568AF233252A41C7018DD77B96F70020E2E97C0F2843B316B270A023D95983C55CDC72C6ECC86DF0C9
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 66%
              • Antivirus: Virustotal, Detection: 68%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}.r}.r}.4,".p}.....s}../..A}../#..}../".G}.{.@.{}.{.P.W}.r}.R....)."}.....s}../..s}.r}T.s}.....s}.Richr}.................PE..L...5J\g.........."..................}............@..........................P............@...@.......@.....................L...|....p...Q.......................q...+..............................pH..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc....Q...p...R..................@..@.reloc...q.......r...h..............@..B........................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\savagenesses\vitrailist.exe
              File Type:data
              Category:dropped
              Size (bytes):292
              Entropy (8bit):3.364286340009046
              Encrypted:false
              SSDEEP:6:DMM8lfm3OOQdUfclzXUEZ+lX1WlEQGMMlAND1EWSAnriIM8lfQVn:DsO+vNlDQ1nQGMk0OWDmA2n
              MD5:AC57D291672E9F36FAA7AA3788D7FEB3
              SHA1:2548C5BA1BFE6AF5FA2D42E38E549545B0BB129B
              SHA-256:7B240DE600CFCDF76076692646889CECA3DE1BBA682EF3251555156FB00A5561
              SHA-512:605BCBEFA20EDB705578F4E091C4303591C367DF362D11E97944B58324194068D795B6648538FF6EE3B6564680C85FBD18C6E9C50F26423681B6D9FD96058E8A
              Malicious:true
              Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.s.a.v.a.g.e.n.e.s.s.e.s.\.v.i.t.r.a.i.l.i.s.t...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              File Type:ASCII text
              Category:dropped
              Size (bytes):8
              Entropy (8bit):2.75
              Encrypted:false
              SSDEEP:3:Rt:v
              MD5:CF759E4C5F14FE3EEC41B87ED756CEA8
              SHA1:C27C796BB3C2FAC929359563676F4BA1FFADA1F5
              SHA-256:C9F9F193409217F73CC976AD078C6F8BF65D3AABCF5FAD3E5A47536D47AA6761
              SHA-512:C7F832AEE13A5EB36D145F35D4464374A9E12FA2017F3C2257442D67483B35A55ECCAE7F7729243350125B37033E075EFBC2303839FD86B81B9B4DCA3626953B
              Malicious:false
              Preview:.5.False
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.86141398806319
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:QwMcsmYcxv.exe
              File size:973'312 bytes
              MD5:a8a4aa9c047894582f100213370da8de
              SHA1:e7b4d9747c787599947d9944cc90ed36c31984b4
              SHA256:31c1b7a32fed169045d32fda5b53a1bcc9e2919ef9217b3232380f89869204c7
              SHA512:235b0a604d73ea9a45c3db63693cf1a6ee3f38ea783c22568af233252a41c7018dd77b96f70020e2e97c0f2843b316b270a023d95983c55cdc72c6ecc86df0c9
              SSDEEP:24576:Gu6J33O0c+JY5UZ+XC0kGso6Fat0svhWWY:Iu0c++OCvkGs9Fat0sv7Y
              TLSH:3825AE22B3DDC360CB669173BF69B7016EBF7C610630B85B2F980D7DA950162162D7A3
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
              Icon Hash:aaf3e3e3938382a0
              Entrypoint:0x427dcd
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
              Time Stamp:0x675C4A35 [Fri Dec 13 14:52:37 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:afcdf79be1557326c854b6e20cb900a7
              Instruction
              call 00007F78848859BAh
              jmp 00007F7884878784h
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              push edi
              push esi
              mov esi, dword ptr [esp+10h]
              mov ecx, dword ptr [esp+14h]
              mov edi, dword ptr [esp+0Ch]
              mov eax, ecx
              mov edx, ecx
              add eax, esi
              cmp edi, esi
              jbe 00007F788487890Ah
              cmp edi, eax
              jc 00007F7884878C6Eh
              bt dword ptr [004C31FCh], 01h
              jnc 00007F7884878909h
              rep movsb
              jmp 00007F7884878C1Ch
              cmp ecx, 00000080h
              jc 00007F7884878AD4h
              mov eax, edi
              xor eax, esi
              test eax, 0000000Fh
              jne 00007F7884878910h
              bt dword ptr [004BE324h], 01h
              jc 00007F7884878DE0h
              bt dword ptr [004C31FCh], 00000000h
              jnc 00007F7884878AADh
              test edi, 00000003h
              jne 00007F7884878ABEh
              test esi, 00000003h
              jne 00007F7884878A9Dh
              bt edi, 02h
              jnc 00007F788487890Fh
              mov eax, dword ptr [esi]
              sub ecx, 04h
              lea esi, dword ptr [esi+04h]
              mov dword ptr [edi], eax
              lea edi, dword ptr [edi+04h]
              bt edi, 03h
              jnc 00007F7884878913h
              movq xmm1, qword ptr [esi]
              sub ecx, 08h
              lea esi, dword ptr [esi+08h]
              movq qword ptr [edi], xmm1
              lea edi, dword ptr [edi+08h]
              test esi, 00000007h
              je 00007F7884878965h
              bt esi, 03h
              jnc 00007F78848789B8h
              Programming Language:
              • [ASM] VS2013 build 21005
              • [ C ] VS2013 build 21005
              • [C++] VS2013 build 21005
              • [ C ] VS2008 SP1 build 30729
              • [IMP] VS2008 SP1 build 30729
              • [ASM] VS2013 UPD4 build 31101
              • [RES] VS2013 build 21005
              • [LNK] VS2013 UPD4 build 31101
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x2518c.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xed0000x711c.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0xc70000x2518c0x25200b836d1ca5c4a5b8458ad473e4a4996e9False0.8233243897306397data7.604311053672223IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xed0000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
              RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
              RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
              RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
              RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
              RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
              RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
              RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
              RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
              RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
              RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
              RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
              RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
              RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
              RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
              RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
              RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
              RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
              RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
              RT_RCDATA0xcf7b80x1c453data1.000397253767434
              RT_GROUP_ICON0xebc0c0x76dataEnglishGreat Britain0.6610169491525424
              RT_GROUP_ICON0xebc840x14dataEnglishGreat Britain1.25
              RT_GROUP_ICON0xebc980x14dataEnglishGreat Britain1.15
              RT_GROUP_ICON0xebcac0x14dataEnglishGreat Britain1.25
              RT_VERSION0xebcc00xdcdataEnglishGreat Britain0.6181818181818182
              RT_MANIFEST0xebd9c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
              DLLImport
              WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
              VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
              WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
              PSAPI.DLLGetProcessMemoryInfo
              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
              USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
              UxTheme.dllIsThemeActive
              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
              USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
              GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
              COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
              OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
              Language of compilation systemCountry where language is spokenMap
              EnglishGreat Britain
              TimestampSource PortDest PortSource IPDest IP
              Jan 10, 2025 20:30:10.581687927 CET4922653192.168.2.61.1.1.1
              Jan 10, 2025 20:30:10.586601973 CET53492261.1.1.1192.168.2.6
              Jan 10, 2025 20:30:10.587414980 CET4922653192.168.2.61.1.1.1
              Jan 10, 2025 20:30:10.595792055 CET53492261.1.1.1192.168.2.6
              Jan 10, 2025 20:30:10.646583080 CET492274449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:10.651451111 CET44494922787.120.120.15192.168.2.6
              Jan 10, 2025 20:30:10.651588917 CET492274449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:10.677690029 CET492274449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:10.682715893 CET44494922787.120.120.15192.168.2.6
              Jan 10, 2025 20:30:11.060051918 CET4922653192.168.2.61.1.1.1
              Jan 10, 2025 20:30:11.065068007 CET53492261.1.1.1192.168.2.6
              Jan 10, 2025 20:30:11.065176010 CET4922653192.168.2.61.1.1.1
              Jan 10, 2025 20:30:12.233629942 CET44494922787.120.120.15192.168.2.6
              Jan 10, 2025 20:30:12.233712912 CET492274449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:15.256025076 CET492274449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:15.260835886 CET44494922787.120.120.15192.168.2.6
              Jan 10, 2025 20:30:15.264694929 CET492544449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:15.269548893 CET44494925487.120.120.15192.168.2.6
              Jan 10, 2025 20:30:15.269618034 CET492544449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:15.269902945 CET492544449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:15.274852991 CET44494925487.120.120.15192.168.2.6
              Jan 10, 2025 20:30:16.893707037 CET44494925487.120.120.15192.168.2.6
              Jan 10, 2025 20:30:16.894589901 CET492544449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:19.911648989 CET492544449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:19.912029982 CET492844449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:19.916532993 CET44494925487.120.120.15192.168.2.6
              Jan 10, 2025 20:30:19.916894913 CET44494928487.120.120.15192.168.2.6
              Jan 10, 2025 20:30:19.916979074 CET492844449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:19.917290926 CET492844449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:19.922146082 CET44494928487.120.120.15192.168.2.6
              Jan 10, 2025 20:30:21.536604881 CET44494928487.120.120.15192.168.2.6
              Jan 10, 2025 20:30:21.536729097 CET492844449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:24.635515928 CET492844449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:24.635988951 CET493124449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:24.640446901 CET44494928487.120.120.15192.168.2.6
              Jan 10, 2025 20:30:24.640953064 CET44494931287.120.120.15192.168.2.6
              Jan 10, 2025 20:30:24.641208887 CET493124449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:24.641640902 CET493124449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:24.646439075 CET44494931287.120.120.15192.168.2.6
              Jan 10, 2025 20:30:26.287652016 CET44494931287.120.120.15192.168.2.6
              Jan 10, 2025 20:30:26.287765026 CET493124449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:29.302289963 CET493124449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:29.302891016 CET493444449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:29.307097912 CET44494931287.120.120.15192.168.2.6
              Jan 10, 2025 20:30:29.307662964 CET44494934487.120.120.15192.168.2.6
              Jan 10, 2025 20:30:29.307730913 CET493444449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:29.308056116 CET493444449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:29.312871933 CET44494934487.120.120.15192.168.2.6
              Jan 10, 2025 20:30:30.927068949 CET44494934487.120.120.15192.168.2.6
              Jan 10, 2025 20:30:30.927172899 CET493444449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:33.942390919 CET493444449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:33.942745924 CET493774449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:33.948452950 CET44494934487.120.120.15192.168.2.6
              Jan 10, 2025 20:30:33.948863983 CET44494937787.120.120.15192.168.2.6
              Jan 10, 2025 20:30:33.948935032 CET493774449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:33.949210882 CET493774449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:33.955256939 CET44494937787.120.120.15192.168.2.6
              Jan 10, 2025 20:30:35.565853119 CET44494937787.120.120.15192.168.2.6
              Jan 10, 2025 20:30:35.565917015 CET493774449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:38.584695101 CET493774449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:38.585071087 CET494064449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:38.589545965 CET44494937787.120.120.15192.168.2.6
              Jan 10, 2025 20:30:38.589874983 CET44494940687.120.120.15192.168.2.6
              Jan 10, 2025 20:30:38.589945078 CET494064449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:38.590395927 CET494064449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:38.595118046 CET44494940687.120.120.15192.168.2.6
              Jan 10, 2025 20:30:40.191824913 CET44494940687.120.120.15192.168.2.6
              Jan 10, 2025 20:30:40.191914082 CET494064449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:43.209012985 CET494064449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:43.209414005 CET494264449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:43.214142084 CET44494940687.120.120.15192.168.2.6
              Jan 10, 2025 20:30:43.214315891 CET44494942687.120.120.15192.168.2.6
              Jan 10, 2025 20:30:43.214390039 CET494264449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:43.214741945 CET494264449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:43.219607115 CET44494942687.120.120.15192.168.2.6
              Jan 10, 2025 20:30:44.833889961 CET44494942687.120.120.15192.168.2.6
              Jan 10, 2025 20:30:44.834012985 CET494264449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:47.858757019 CET494264449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:47.862082958 CET494284449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:47.863754034 CET44494942687.120.120.15192.168.2.6
              Jan 10, 2025 20:30:47.866977930 CET44494942887.120.120.15192.168.2.6
              Jan 10, 2025 20:30:47.867080927 CET494284449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:47.874649048 CET494284449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:47.879537106 CET44494942887.120.120.15192.168.2.6
              Jan 10, 2025 20:30:49.468280077 CET44494942887.120.120.15192.168.2.6
              Jan 10, 2025 20:30:49.468341112 CET494284449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:52.474154949 CET494284449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:52.474435091 CET494294449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:52.479063988 CET44494942887.120.120.15192.168.2.6
              Jan 10, 2025 20:30:52.479223967 CET44494942987.120.120.15192.168.2.6
              Jan 10, 2025 20:30:52.479296923 CET494294449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:52.479695082 CET494294449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:52.484450102 CET44494942987.120.120.15192.168.2.6
              Jan 10, 2025 20:30:54.100801945 CET44494942987.120.120.15192.168.2.6
              Jan 10, 2025 20:30:54.100943089 CET494294449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:57.114715099 CET494294449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:57.115171909 CET494304449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:57.119549990 CET44494942987.120.120.15192.168.2.6
              Jan 10, 2025 20:30:57.120002985 CET44494943087.120.120.15192.168.2.6
              Jan 10, 2025 20:30:57.120083094 CET494304449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:57.120436907 CET494304449192.168.2.687.120.120.15
              Jan 10, 2025 20:30:57.125169992 CET44494943087.120.120.15192.168.2.6
              Jan 10, 2025 20:30:58.722867966 CET44494943087.120.120.15192.168.2.6
              Jan 10, 2025 20:30:58.723017931 CET494304449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:01.740966082 CET494304449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:01.741501093 CET494314449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:01.745816946 CET44494943087.120.120.15192.168.2.6
              Jan 10, 2025 20:31:01.746400118 CET44494943187.120.120.15192.168.2.6
              Jan 10, 2025 20:31:01.746473074 CET494314449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:01.747109890 CET494314449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:01.751879930 CET44494943187.120.120.15192.168.2.6
              Jan 10, 2025 20:31:03.384295940 CET44494943187.120.120.15192.168.2.6
              Jan 10, 2025 20:31:03.384397984 CET494314449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:06.395380974 CET494314449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:06.395802021 CET494334449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:06.400255919 CET44494943187.120.120.15192.168.2.6
              Jan 10, 2025 20:31:06.400711060 CET44494943387.120.120.15192.168.2.6
              Jan 10, 2025 20:31:06.400803089 CET494334449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:06.401196957 CET494334449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:06.406044960 CET44494943387.120.120.15192.168.2.6
              Jan 10, 2025 20:31:08.003971100 CET44494943387.120.120.15192.168.2.6
              Jan 10, 2025 20:31:08.004060030 CET494334449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:10.710118055 CET494334449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:10.710798979 CET494344449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:10.714996099 CET44494943387.120.120.15192.168.2.6
              Jan 10, 2025 20:31:10.715682030 CET44494943487.120.120.15192.168.2.6
              Jan 10, 2025 20:31:10.718739033 CET494344449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:10.721962929 CET494344449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:10.726767063 CET44494943487.120.120.15192.168.2.6
              Jan 10, 2025 20:31:12.334302902 CET44494943487.120.120.15192.168.2.6
              Jan 10, 2025 20:31:12.334419966 CET494344449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:14.770319939 CET494344449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:14.770694017 CET494354449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:14.775433064 CET44494943487.120.120.15192.168.2.6
              Jan 10, 2025 20:31:14.775603056 CET44494943587.120.120.15192.168.2.6
              Jan 10, 2025 20:31:14.775691032 CET494354449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:14.776221037 CET494354449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:14.781075954 CET44494943587.120.120.15192.168.2.6
              Jan 10, 2025 20:31:16.390799999 CET44494943587.120.120.15192.168.2.6
              Jan 10, 2025 20:31:16.390866995 CET494354449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:18.586597919 CET494354449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:18.587095022 CET494364449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:18.592665911 CET44494943587.120.120.15192.168.2.6
              Jan 10, 2025 20:31:18.593157053 CET44494943687.120.120.15192.168.2.6
              Jan 10, 2025 20:31:18.593252897 CET494364449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:18.593780994 CET494364449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:18.599773884 CET44494943687.120.120.15192.168.2.6
              Jan 10, 2025 20:31:20.189141989 CET44494943687.120.120.15192.168.2.6
              Jan 10, 2025 20:31:20.189291954 CET494364449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:22.160509109 CET494364449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:22.160890102 CET494374449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:22.165611029 CET44494943687.120.120.15192.168.2.6
              Jan 10, 2025 20:31:22.165781975 CET44494943787.120.120.15192.168.2.6
              Jan 10, 2025 20:31:22.165848017 CET494374449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:22.166239023 CET494374449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:22.171062946 CET44494943787.120.120.15192.168.2.6
              Jan 10, 2025 20:31:23.853835106 CET44494943787.120.120.15192.168.2.6
              Jan 10, 2025 20:31:23.853959084 CET494374449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:25.670587063 CET494374449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:25.675379992 CET44494943787.120.120.15192.168.2.6
              Jan 10, 2025 20:31:25.686908007 CET494384449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:25.691732883 CET44494943887.120.120.15192.168.2.6
              Jan 10, 2025 20:31:25.691823959 CET494384449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:25.694317102 CET494384449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:25.699070930 CET44494943887.120.120.15192.168.2.6
              Jan 10, 2025 20:31:27.322768927 CET44494943887.120.120.15192.168.2.6
              Jan 10, 2025 20:31:27.322899103 CET494384449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:28.926975012 CET494384449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:28.927428961 CET494394449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:28.931830883 CET44494943887.120.120.15192.168.2.6
              Jan 10, 2025 20:31:28.932312012 CET44494943987.120.120.15192.168.2.6
              Jan 10, 2025 20:31:28.932406902 CET494394449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:28.932792902 CET494394449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:28.937583923 CET44494943987.120.120.15192.168.2.6
              Jan 10, 2025 20:31:30.553075075 CET44494943987.120.120.15192.168.2.6
              Jan 10, 2025 20:31:30.553179979 CET494394449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:32.005431890 CET494394449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:32.005821943 CET494404449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:32.010503054 CET44494943987.120.120.15192.168.2.6
              Jan 10, 2025 20:31:32.010636091 CET44494944087.120.120.15192.168.2.6
              Jan 10, 2025 20:31:32.010732889 CET494404449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:32.011303902 CET494404449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:32.016087055 CET44494944087.120.120.15192.168.2.6
              Jan 10, 2025 20:31:33.633193016 CET44494944087.120.120.15192.168.2.6
              Jan 10, 2025 20:31:33.633353949 CET494404449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:34.947156906 CET494404449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:34.948295116 CET494424449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:34.951936007 CET44494944087.120.120.15192.168.2.6
              Jan 10, 2025 20:31:34.953077078 CET44494944287.120.120.15192.168.2.6
              Jan 10, 2025 20:31:34.953154087 CET494424449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:34.953907013 CET494424449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:34.958658934 CET44494944287.120.120.15192.168.2.6
              Jan 10, 2025 20:31:36.603173018 CET44494944287.120.120.15192.168.2.6
              Jan 10, 2025 20:31:36.603303909 CET494424449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:37.770472050 CET494424449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:37.770849943 CET494434449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:37.775274992 CET44494944287.120.120.15192.168.2.6
              Jan 10, 2025 20:31:37.775598049 CET44494944387.120.120.15192.168.2.6
              Jan 10, 2025 20:31:37.775665045 CET494434449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:37.776006937 CET494434449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:37.780810118 CET44494944387.120.120.15192.168.2.6
              Jan 10, 2025 20:31:39.395577908 CET44494944387.120.120.15192.168.2.6
              Jan 10, 2025 20:31:39.395723104 CET494434449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:40.458259106 CET494434449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:40.458476067 CET494444449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:40.463489056 CET44494944387.120.120.15192.168.2.6
              Jan 10, 2025 20:31:40.463532925 CET44494944487.120.120.15192.168.2.6
              Jan 10, 2025 20:31:40.463640928 CET494444449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:40.464004993 CET494444449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:40.468873978 CET44494944487.120.120.15192.168.2.6
              Jan 10, 2025 20:31:42.083192110 CET44494944487.120.120.15192.168.2.6
              Jan 10, 2025 20:31:42.083262920 CET494444449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:43.036384106 CET494444449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:43.036741972 CET494454449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:43.041273117 CET44494944487.120.120.15192.168.2.6
              Jan 10, 2025 20:31:43.041579962 CET44494944587.120.120.15192.168.2.6
              Jan 10, 2025 20:31:43.041681051 CET494454449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:43.042033911 CET494454449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:43.046822071 CET44494944587.120.120.15192.168.2.6
              Jan 10, 2025 20:31:44.692723036 CET44494944587.120.120.15192.168.2.6
              Jan 10, 2025 20:31:44.692873955 CET494454449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:45.554133892 CET494454449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:45.554692984 CET494464449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:45.727467060 CET44494944587.120.120.15192.168.2.6
              Jan 10, 2025 20:31:45.727488041 CET44494944687.120.120.15192.168.2.6
              Jan 10, 2025 20:31:45.727607965 CET494464449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:45.728009939 CET494464449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:45.734617949 CET44494944687.120.120.15192.168.2.6
              Jan 10, 2025 20:31:47.331688881 CET44494944687.120.120.15192.168.2.6
              Jan 10, 2025 20:31:47.331768036 CET494464449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:48.098701954 CET494464449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:48.099087954 CET494474449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:48.104285002 CET44494944687.120.120.15192.168.2.6
              Jan 10, 2025 20:31:48.104899883 CET44494944787.120.120.15192.168.2.6
              Jan 10, 2025 20:31:48.104990005 CET494474449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:48.105451107 CET494474449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:48.111844063 CET44494944787.120.120.15192.168.2.6
              Jan 10, 2025 20:31:49.708451986 CET44494944787.120.120.15192.168.2.6
              Jan 10, 2025 20:31:49.708599091 CET494474449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:50.411839962 CET494474449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:50.412347078 CET494484449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:50.416691065 CET44494944787.120.120.15192.168.2.6
              Jan 10, 2025 20:31:50.417129040 CET44494944887.120.120.15192.168.2.6
              Jan 10, 2025 20:31:50.417203903 CET494484449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:50.417551041 CET494484449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:50.422395945 CET44494944887.120.120.15192.168.2.6
              Jan 10, 2025 20:31:52.002183914 CET44494944887.120.120.15192.168.2.6
              Jan 10, 2025 20:31:52.002254963 CET494484449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:52.630561113 CET494484449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:52.630918026 CET494494449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:52.635359049 CET44494944887.120.120.15192.168.2.6
              Jan 10, 2025 20:31:52.635787964 CET44494944987.120.120.15192.168.2.6
              Jan 10, 2025 20:31:52.635931969 CET494494449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:52.636416912 CET494494449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:52.641185045 CET44494944987.120.120.15192.168.2.6
              Jan 10, 2025 20:31:54.255218983 CET44494944987.120.120.15192.168.2.6
              Jan 10, 2025 20:31:54.255323887 CET494494449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:54.960634947 CET494494449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:54.961668015 CET494504449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:54.965498924 CET44494944987.120.120.15192.168.2.6
              Jan 10, 2025 20:31:54.966485977 CET44494945087.120.120.15192.168.2.6
              Jan 10, 2025 20:31:54.966547966 CET494504449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:54.971064091 CET494504449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:54.975872040 CET44494945087.120.120.15192.168.2.6
              Jan 10, 2025 20:31:56.566003084 CET44494945087.120.120.15192.168.2.6
              Jan 10, 2025 20:31:56.566330910 CET494504449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:57.101131916 CET494504449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:57.101568937 CET494514449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:57.105986118 CET44494945087.120.120.15192.168.2.6
              Jan 10, 2025 20:31:57.106440067 CET44494945187.120.120.15192.168.2.6
              Jan 10, 2025 20:31:57.106502056 CET494514449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:57.106818914 CET494514449192.168.2.687.120.120.15
              Jan 10, 2025 20:31:57.111601114 CET44494945187.120.120.15192.168.2.6
              Jan 10, 2025 20:31:58.725852966 CET44494945187.120.120.15192.168.2.6
              Jan 10, 2025 20:31:58.725919962 CET494514449192.168.2.687.120.120.15
              TimestampSource PortDest PortSource IPDest IP
              Jan 10, 2025 20:30:10.578831911 CET53602731.1.1.1192.168.2.6

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:14:29:50
              Start date:10/01/2025
              Path:C:\Users\user\Desktop\QwMcsmYcxv.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\QwMcsmYcxv.exe"
              Imagebase:0xfd0000
              File size:973'312 bytes
              MD5 hash:A8A4AA9C047894582F100213370DA8DE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:true

              Target ID:2
              Start time:14:29:52
              Start date:10/01/2025
              Path:C:\Users\user\AppData\Local\savagenesses\vitrailist.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\QwMcsmYcxv.exe"
              Imagebase:0xfb0000
              File size:973'312 bytes
              MD5 hash:A8A4AA9C047894582F100213370DA8DE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: rat_win_dcrat_qwqdanchun, Description: Find DcRAT samples (qwqdanchun) based on specific strings, Source: 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, Author: Sekoia.io
              • Rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice, Description: Detects executables attemping to enumerate video devices using WMI, Source: 00000002.00000002.2194831507.00000000011A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 66%, ReversingLabs
              • Detection: 68%, Virustotal, Browse
              Reputation:low
              Has exited:true

              Target ID:3
              Start time:14:29:56
              Start date:10/01/2025
              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\QwMcsmYcxv.exe"
              Imagebase:0x40000
              File size:45'984 bytes
              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:false

              Target ID:5
              Start time:14:30:06
              Start date:10/01/2025
              Path:C:\Windows\System32\wscript.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vitrailist.vbs"
              Imagebase:0x7ff7fd5b0000
              File size:170'496 bytes
              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:6
              Start time:14:30:07
              Start date:10/01/2025
              Path:C:\Users\user\AppData\Local\savagenesses\vitrailist.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\AppData\Local\savagenesses\vitrailist.exe"
              Imagebase:0xfb0000
              File size:973'312 bytes
              MD5 hash:A8A4AA9C047894582F100213370DA8DE
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: rat_win_dcrat_qwqdanchun, Description: Find DcRAT samples (qwqdanchun) based on specific strings, Source: 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, Author: Sekoia.io
              • Rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice, Description: Detects executables attemping to enumerate video devices using WMI, Source: 00000006.00000002.2350205802.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
              Reputation:low
              Has exited:true

              Target ID:7
              Start time:14:30:11
              Start date:10/01/2025
              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\AppData\Local\savagenesses\vitrailist.exe"
              Imagebase:0xff0000
              File size:45'984 bytes
              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000007.00000002.2467888095.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
              Reputation:high
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:3.3%
                Dynamic/Decrypted Code Coverage:0.4%
                Signature Coverage:7%
                Total number of Nodes:2000
                Total number of Limit Nodes:61
                execution_graph 103926 fd107d 103931 fd708b 103926->103931 103928 fd108c 103962 ff2d40 103928->103962 103932 fd709b __write_nolock 103931->103932 103965 fd7667 103932->103965 103936 fd715a 103977 ff050b 103936->103977 103943 fd7667 59 API calls 103944 fd718b 103943->103944 103996 fd7d8c 103944->103996 103946 fd7194 RegOpenKeyExW 103947 100e8b1 RegQueryValueExW 103946->103947 103951 fd71b6 Mailbox 103946->103951 103948 100e943 RegCloseKey 103947->103948 103949 100e8ce 103947->103949 103948->103951 103961 100e955 _wcscat Mailbox __wsetenvp 103948->103961 104000 ff0db6 103949->104000 103951->103928 103952 100e8e7 104010 fd522e 103952->104010 103955 100e90f 104013 fd7bcc 103955->104013 103957 fd79f2 59 API calls 103957->103961 103958 100e929 103958->103948 103960 fd3f74 59 API calls 103960->103961 103961->103951 103961->103957 103961->103960 104022 fd7de1 103961->104022 104087 ff2c44 103962->104087 103964 fd1096 103966 ff0db6 Mailbox 59 API calls 103965->103966 103967 fd7688 103966->103967 103968 ff0db6 Mailbox 59 API calls 103967->103968 103969 fd7151 103968->103969 103970 fd4706 103969->103970 104026 1001940 103970->104026 103973 fd7de1 59 API calls 103974 fd4739 103973->103974 104028 fd4750 103974->104028 103976 fd4743 Mailbox 103976->103936 103978 1001940 __write_nolock 103977->103978 103979 ff0518 GetFullPathNameW 103978->103979 103980 ff053a 103979->103980 103981 fd7bcc 59 API calls 103980->103981 103982 fd7165 103981->103982 103983 fd7cab 103982->103983 103984 fd7cbf 103983->103984 103985 100ed4a 103983->103985 104050 fd7c50 103984->104050 104055 fd8029 103985->104055 103988 fd7173 103990 fd3f74 103988->103990 103989 100ed55 __wsetenvp _memmove 103991 fd3f82 103990->103991 103995 fd3fa4 _memmove 103990->103995 103993 ff0db6 Mailbox 59 API calls 103991->103993 103992 ff0db6 Mailbox 59 API calls 103994 fd3fb8 103992->103994 103993->103995 103994->103943 103995->103992 103997 fd7d99 103996->103997 103998 fd7da6 103996->103998 103997->103946 103999 ff0db6 Mailbox 59 API calls 103998->103999 103999->103997 104002 ff0dbe 104000->104002 104003 ff0dd8 104002->104003 104005 ff0ddc std::exception::exception 104002->104005 104058 ff571c 104002->104058 104075 ff33a1 DecodePointer 104002->104075 104003->103952 104076 ff859b RaiseException 104005->104076 104007 ff0e06 104077 ff84d1 58 API calls _free 104007->104077 104009 ff0e18 104009->103952 104011 ff0db6 Mailbox 59 API calls 104010->104011 104012 fd5240 RegQueryValueExW 104011->104012 104012->103955 104012->103958 104014 fd7bd8 __wsetenvp 104013->104014 104015 fd7c45 104013->104015 104017 fd7bee 104014->104017 104018 fd7c13 104014->104018 104016 fd7d2c 59 API calls 104015->104016 104021 fd7bf6 _memmove 104016->104021 104086 fd7f27 59 API calls Mailbox 104017->104086 104019 fd8029 59 API calls 104018->104019 104019->104021 104021->103958 104023 fd7df0 __wsetenvp _memmove 104022->104023 104024 ff0db6 Mailbox 59 API calls 104023->104024 104025 fd7e2e 104024->104025 104025->103961 104027 fd4713 GetModuleFileNameW 104026->104027 104027->103973 104029 1001940 __write_nolock 104028->104029 104030 fd475d GetFullPathNameW 104029->104030 104031 fd477c 104030->104031 104032 fd4799 104030->104032 104033 fd7bcc 59 API calls 104031->104033 104034 fd7d8c 59 API calls 104032->104034 104035 fd4788 104033->104035 104034->104035 104038 fd7726 104035->104038 104039 fd7734 104038->104039 104042 fd7d2c 104039->104042 104041 fd4794 104041->103976 104043 fd7d3a 104042->104043 104044 fd7d43 _memmove 104042->104044 104043->104044 104046 fd7e4f 104043->104046 104044->104041 104047 fd7e62 104046->104047 104049 fd7e5f _memmove 104046->104049 104048 ff0db6 Mailbox 59 API calls 104047->104048 104048->104049 104049->104044 104051 fd7c5f __wsetenvp 104050->104051 104052 fd8029 59 API calls 104051->104052 104053 fd7c70 _memmove 104051->104053 104054 100ed07 _memmove 104052->104054 104053->103988 104056 ff0db6 Mailbox 59 API calls 104055->104056 104057 fd8033 104056->104057 104057->103989 104059 ff5797 104058->104059 104063 ff5728 104058->104063 104084 ff33a1 DecodePointer 104059->104084 104061 ff579d 104085 ff8b28 58 API calls __getptd_noexit 104061->104085 104065 ff5733 104063->104065 104066 ff575b RtlAllocateHeap 104063->104066 104069 ff5783 104063->104069 104073 ff5781 104063->104073 104081 ff33a1 DecodePointer 104063->104081 104065->104063 104078 ffa16b 58 API calls __NMSG_WRITE 104065->104078 104079 ffa1c8 58 API calls 6 library calls 104065->104079 104080 ff309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104065->104080 104066->104063 104067 ff578f 104066->104067 104067->104002 104082 ff8b28 58 API calls __getptd_noexit 104069->104082 104083 ff8b28 58 API calls __getptd_noexit 104073->104083 104075->104002 104076->104007 104077->104009 104078->104065 104079->104065 104081->104063 104082->104073 104083->104067 104084->104061 104085->104067 104086->104021 104088 ff2c50 __close 104087->104088 104095 ff3217 104088->104095 104094 ff2c77 __close 104094->103964 104112 ff9c0b 104095->104112 104097 ff2c59 104098 ff2c88 DecodePointer DecodePointer 104097->104098 104099 ff2c65 104098->104099 104100 ff2cb5 104098->104100 104109 ff2c82 104099->104109 104100->104099 104158 ff87a4 59 API calls __close 104100->104158 104102 ff2d18 EncodePointer EncodePointer 104102->104099 104103 ff2cc7 104103->104102 104104 ff2cec 104103->104104 104159 ff8864 61 API calls 2 library calls 104103->104159 104104->104099 104107 ff2d06 EncodePointer 104104->104107 104160 ff8864 61 API calls 2 library calls 104104->104160 104107->104102 104108 ff2d00 104108->104099 104108->104107 104161 ff3220 104109->104161 104113 ff9c2f EnterCriticalSection 104112->104113 104114 ff9c1c 104112->104114 104113->104097 104119 ff9c93 104114->104119 104116 ff9c22 104116->104113 104143 ff30b5 58 API calls 3 library calls 104116->104143 104120 ff9c9f __close 104119->104120 104121 ff9ca8 104120->104121 104122 ff9cc0 104120->104122 104144 ffa16b 58 API calls __NMSG_WRITE 104121->104144 104127 ff9ce1 __close 104122->104127 104147 ff881d 58 API calls 2 library calls 104122->104147 104125 ff9cad 104145 ffa1c8 58 API calls 6 library calls 104125->104145 104126 ff9cd5 104129 ff9cdc 104126->104129 104130 ff9ceb 104126->104130 104127->104116 104148 ff8b28 58 API calls __getptd_noexit 104129->104148 104133 ff9c0b __lock 58 API calls 104130->104133 104131 ff9cb4 104146 ff309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104131->104146 104135 ff9cf2 104133->104135 104137 ff9cff 104135->104137 104138 ff9d17 104135->104138 104149 ff9e2b InitializeCriticalSectionAndSpinCount 104137->104149 104150 ff2d55 104138->104150 104141 ff9d0b 104156 ff9d33 LeaveCriticalSection _doexit 104141->104156 104144->104125 104145->104131 104147->104126 104148->104127 104149->104141 104151 ff2d5e RtlFreeHeap 104150->104151 104155 ff2d87 _free 104150->104155 104152 ff2d73 104151->104152 104151->104155 104157 ff8b28 58 API calls __getptd_noexit 104152->104157 104154 ff2d79 GetLastError 104154->104155 104155->104141 104156->104127 104157->104154 104158->104103 104159->104104 104160->104108 104164 ff9d75 LeaveCriticalSection 104161->104164 104163 ff2c87 104163->104094 104164->104163 104165 100fe27 104178 fef944 104165->104178 104167 100fe3d 104168 100fe53 104167->104168 104169 100febe 104167->104169 104267 fd9e5d 60 API calls 104168->104267 104187 fdfce0 104169->104187 104171 100fe92 104173 101089c 104171->104173 104175 100fe9a 104171->104175 104269 1039e4a 89 API calls 4 library calls 104173->104269 104268 103834f 59 API calls Mailbox 104175->104268 104177 100feb2 Mailbox 104179 fef962 104178->104179 104180 fef950 104178->104180 104182 fef968 104179->104182 104183 fef991 104179->104183 104270 fd9d3c 104180->104270 104184 ff0db6 Mailbox 59 API calls 104182->104184 104185 fd9d3c 60 API calls 104183->104185 104186 fef95a 104184->104186 104185->104186 104186->104167 104290 fd8180 104187->104290 104189 fdfd3d 104190 101472d 104189->104190 104251 fe06f6 104189->104251 104295 fdf234 104189->104295 104426 1039e4a 89 API calls 4 library calls 104190->104426 104194 101488d 104198 fdfe4c 104194->104198 104227 1014742 104194->104227 104432 104a2d9 85 API calls Mailbox 104194->104432 104195 fdfe3e 104195->104194 104195->104198 104430 10266ec 59 API calls 2 library calls 104195->104430 104196 1014b53 104196->104227 104451 1039e4a 89 API calls 4 library calls 104196->104451 104197 fe0517 104205 ff0db6 Mailbox 59 API calls 104197->104205 104198->104196 104208 10148f9 104198->104208 104299 fd837c 104198->104299 104200 1014755 104225 10147d7 104200->104225 104427 fdf6a3 341 API calls 104200->104427 104202 ff0db6 59 API calls Mailbox 104213 fdfdd3 104202->104213 104212 fe0545 _memmove 104205->104212 104206 10148b2 Mailbox 104206->104198 104433 10266ec 59 API calls 2 library calls 104206->104433 104207 1014848 104431 10260ef 59 API calls 2 library calls 104207->104431 104214 1014917 104208->104214 104434 fd85c0 104208->104434 104223 ff0db6 Mailbox 59 API calls 104212->104223 104213->104195 104213->104197 104213->104200 104213->104202 104213->104212 104213->104227 104240 101480c 104213->104240 104396 fd9ea0 104213->104396 104220 fd85c0 59 API calls 104214->104220 104228 1014928 104214->104228 104215 fdfea4 104221 1014ad6 104215->104221 104222 fdff32 104215->104222 104262 fe0179 Mailbox _memmove 104215->104262 104216 101486b 104219 fd9ea0 341 API calls 104216->104219 104219->104194 104220->104228 104450 1039ae7 60 API calls 104221->104450 104229 ff0db6 Mailbox 59 API calls 104222->104229 104250 fe0106 _memmove 104223->104250 104225->104227 104428 1039e4a 89 API calls 4 library calls 104225->104428 104228->104262 104442 10260ab 59 API calls Mailbox 104228->104442 104231 fdff39 104229->104231 104231->104251 104306 fe09d0 104231->104306 104233 1014a4d 104234 fd9ea0 341 API calls 104233->104234 104236 1014a87 104234->104236 104236->104227 104445 fd84c0 104236->104445 104238 fdffb2 104238->104212 104245 fdffe6 104238->104245 104238->104251 104429 1039e4a 89 API calls 4 library calls 104240->104429 104244 1014ab2 104449 1039e4a 89 API calls 4 library calls 104244->104449 104248 fd8047 59 API calls 104245->104248 104252 fe0007 104245->104252 104247 fd9d3c 60 API calls 104247->104262 104248->104252 104250->104262 104266 fe0162 104250->104266 104420 fd9c90 104250->104420 104425 1039e4a 89 API calls 4 library calls 104251->104425 104252->104251 104255 1014b24 104252->104255 104258 fe004c 104252->104258 104253 ff0db6 59 API calls Mailbox 104253->104262 104254 fe0398 104254->104177 104256 fd9d3c 60 API calls 104255->104256 104256->104196 104257 fe00d8 104259 fd9d3c 60 API calls 104257->104259 104258->104196 104258->104251 104258->104257 104261 fe00eb 104259->104261 104260 1014a1c 104263 ff0db6 Mailbox 59 API calls 104260->104263 104261->104251 104383 fd82df 104261->104383 104262->104233 104262->104244 104262->104247 104262->104251 104262->104253 104262->104254 104262->104260 104394 fd8740 68 API calls __cinit 104262->104394 104395 fd8660 68 API calls 104262->104395 104443 1035937 68 API calls 104262->104443 104444 fd89b3 69 API calls Mailbox 104262->104444 104263->104233 104266->104177 104267->104171 104268->104177 104269->104177 104271 fd9d4a 104270->104271 104281 fd9d78 Mailbox 104270->104281 104272 fd9d9d 104271->104272 104275 fd9d50 Mailbox 104271->104275 104283 fd8047 104272->104283 104273 fd9d64 104276 fd9dcc 104273->104276 104277 fd9d6f 104273->104277 104273->104281 104275->104273 104278 100fa0f 104275->104278 104276->104281 104287 fd8cd4 59 API calls Mailbox 104276->104287 104280 100f9e6 VariantClear 104277->104280 104277->104281 104278->104281 104288 1026e8f 59 API calls 104278->104288 104280->104281 104281->104186 104284 fd805a 104283->104284 104285 fd8052 104283->104285 104284->104281 104289 fd7f77 59 API calls 2 library calls 104285->104289 104287->104281 104288->104281 104289->104284 104291 fd818f 104290->104291 104294 fd81aa 104290->104294 104292 fd7e4f 59 API calls 104291->104292 104293 fd8197 CharUpperBuffW 104292->104293 104293->104294 104294->104189 104296 fdf251 104295->104296 104297 fdf272 104296->104297 104452 1039e4a 89 API calls 4 library calls 104296->104452 104297->104213 104300 fd838d 104299->104300 104301 100edbd 104299->104301 104302 ff0db6 Mailbox 59 API calls 104300->104302 104303 fd8394 104302->104303 104304 fd83b5 104303->104304 104453 fd8634 59 API calls Mailbox 104303->104453 104304->104208 104304->104215 104307 1014cc3 104306->104307 104318 fe09f5 104306->104318 104514 1039e4a 89 API calls 4 library calls 104307->104514 104309 fe0cfa 104309->104238 104311 fe0ee4 104311->104309 104313 fe0ef1 104311->104313 104512 fe1093 341 API calls Mailbox 104313->104512 104314 fe0a4b PeekMessageW 104382 fe0a05 Mailbox 104314->104382 104316 fe0ef8 LockWindowUpdate DestroyWindow GetMessageW 104316->104309 104320 fe0f2a 104316->104320 104318->104382 104515 fd9e5d 60 API calls 104318->104515 104516 1026349 341 API calls 104318->104516 104319 1014e81 Sleep 104319->104382 104323 1015c58 TranslateMessage DispatchMessageW GetMessageW 104320->104323 104321 fe0ce4 104321->104309 104511 fe1070 10 API calls Mailbox 104321->104511 104323->104323 104324 1015c88 104323->104324 104324->104309 104325 fe0ea5 TranslateMessage DispatchMessageW 104326 fe0e43 PeekMessageW 104325->104326 104326->104382 104327 1014d50 TranslateAcceleratorW 104327->104326 104327->104382 104329 fe0d13 timeGetTime 104329->104382 104330 101581f WaitForSingleObject 104332 101583c GetExitCodeProcess CloseHandle 104330->104332 104330->104382 104331 fd7667 59 API calls 104368 fe0e70 Mailbox 104331->104368 104366 fe0f95 104332->104366 104333 fe0e5f Sleep 104333->104368 104334 fd8047 59 API calls 104334->104382 104336 ff0db6 59 API calls Mailbox 104336->104382 104337 1015af8 Sleep 104337->104368 104339 ff049f timeGetTime 104339->104368 104340 fe0f4e timeGetTime 104513 fd9e5d 60 API calls 104340->104513 104343 1015b8f GetExitCodeProcess 104345 1015ba5 WaitForSingleObject 104343->104345 104346 1015bbb CloseHandle 104343->104346 104345->104346 104345->104382 104346->104368 104348 fdb73c 314 API calls 104348->104382 104350 1055f25 110 API calls 104350->104368 104351 fdb7dd 109 API calls 104351->104368 104352 fd9e5d 60 API calls 104352->104382 104353 1015874 104353->104366 104354 1015c17 Sleep 104354->104382 104355 1015078 Sleep 104355->104382 104357 fd7de1 59 API calls 104357->104368 104361 fd9ea0 314 API calls 104361->104382 104364 fdfce0 314 API calls 104364->104382 104366->104238 104368->104331 104368->104339 104368->104343 104368->104350 104368->104351 104368->104353 104368->104354 104368->104355 104368->104357 104368->104366 104368->104382 104540 1032408 60 API calls 104368->104540 104541 fd9e5d 60 API calls 104368->104541 104542 fd89b3 69 API calls Mailbox 104368->104542 104543 fdb73c 341 API calls 104368->104543 104544 10264da 60 API calls 104368->104544 104545 1035244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 104368->104545 104546 1033c55 66 API calls Mailbox 104368->104546 104369 1039e4a 89 API calls 104369->104382 104371 fd7de1 59 API calls 104371->104382 104372 fd9c90 59 API calls Mailbox 104372->104382 104373 fd82df 59 API calls 104373->104382 104374 fd84c0 69 API calls 104374->104382 104375 102617e 59 API calls Mailbox 104375->104382 104376 10155d5 VariantClear 104376->104382 104377 101566b VariantClear 104377->104382 104378 fd8cd4 59 API calls Mailbox 104378->104382 104379 1015419 VariantClear 104379->104382 104380 1026e8f 59 API calls 104380->104382 104381 fd89b3 69 API calls 104381->104382 104382->104314 104382->104319 104382->104321 104382->104325 104382->104326 104382->104327 104382->104329 104382->104330 104382->104333 104382->104334 104382->104336 104382->104337 104382->104340 104382->104348 104382->104352 104382->104361 104382->104364 104382->104366 104382->104368 104382->104369 104382->104371 104382->104372 104382->104373 104382->104374 104382->104375 104382->104376 104382->104377 104382->104378 104382->104379 104382->104380 104382->104381 104454 fde6a0 104382->104454 104485 fdf460 104382->104485 104505 fd31ce 104382->104505 104510 fde420 341 API calls 104382->104510 104517 1056018 59 API calls 104382->104517 104518 1039a15 59 API calls Mailbox 104382->104518 104519 102d4f2 59 API calls 104382->104519 104520 fd9837 104382->104520 104538 10260ef 59 API calls 2 library calls 104382->104538 104539 fd8401 59 API calls 104382->104539 104384 100eda1 104383->104384 104387 fd82f2 104383->104387 104385 100edb1 104384->104385 105730 10261a4 59 API calls 104384->105730 104388 fd831c 104387->104388 104389 fd85c0 59 API calls 104387->104389 104390 fd8339 Mailbox 104387->104390 104391 fd8322 104388->104391 104392 fd85c0 59 API calls 104388->104392 104389->104388 104390->104250 104391->104390 104393 fd9c90 Mailbox 59 API calls 104391->104393 104392->104391 104393->104390 104394->104262 104395->104262 104397 fd9ebf 104396->104397 104414 fd9eed Mailbox 104396->104414 104398 ff0db6 Mailbox 59 API calls 104397->104398 104398->104414 104399 fdb475 104400 fd8047 59 API calls 104399->104400 104408 fda057 104400->104408 104401 fdb47a 104402 1010055 104401->104402 104419 10109e5 104401->104419 105733 1039e4a 89 API calls 4 library calls 104402->105733 104403 fd7667 59 API calls 104403->104414 104404 ff0db6 59 API calls Mailbox 104404->104414 104408->104213 104409 1010064 104409->104213 104411 fd8047 59 API calls 104411->104414 104413 1026e8f 59 API calls 104413->104414 104414->104399 104414->104401 104414->104402 104414->104403 104414->104404 104414->104408 104414->104411 104414->104413 104415 ff2d40 67 API calls __cinit 104414->104415 104416 10109d6 104414->104416 104418 fda55a 104414->104418 105731 fdc8c0 341 API calls 2 library calls 104414->105731 105732 fdb900 60 API calls Mailbox 104414->105732 104415->104414 105735 1039e4a 89 API calls 4 library calls 104416->105735 105734 1039e4a 89 API calls 4 library calls 104418->105734 105736 1039e4a 89 API calls 4 library calls 104419->105736 104421 fd9c9b 104420->104421 104422 fd9cd2 104421->104422 105737 fd8cd4 59 API calls Mailbox 104421->105737 104422->104250 104424 fd9cfd 104424->104250 104425->104190 104426->104227 104427->104225 104428->104227 104429->104227 104430->104207 104431->104216 104432->104206 104433->104206 104435 fd85ce 104434->104435 104441 fd85f6 104434->104441 104436 fd85dc 104435->104436 104437 fd85c0 59 API calls 104435->104437 104438 fd85c0 59 API calls 104436->104438 104439 fd85e2 104436->104439 104437->104436 104438->104439 104440 fd9c90 Mailbox 59 API calls 104439->104440 104439->104441 104440->104441 104441->104214 104442->104262 104443->104262 104444->104262 104446 fd84cb 104445->104446 104448 fd84f2 104446->104448 105738 fd89b3 69 API calls Mailbox 104446->105738 104448->104244 104449->104227 104450->104245 104451->104227 104452->104297 104453->104304 104455 fde6d5 104454->104455 104456 1013aa9 104455->104456 104458 fde799 104455->104458 104460 fde73f 104455->104460 104457 fd9ea0 341 API calls 104456->104457 104459 1013abe 104457->104459 104461 fd7667 59 API calls 104458->104461 104465 ff2d40 __cinit 67 API calls 104458->104465 104467 1013b26 104458->104467 104469 fde95a 104458->104469 104484 fde970 Mailbox 104458->104484 104459->104484 104548 1039e4a 89 API calls 4 library calls 104459->104548 104460->104458 104463 fd7667 59 API calls 104460->104463 104461->104458 104464 1013b04 104463->104464 104466 ff2d40 __cinit 67 API calls 104464->104466 104465->104458 104466->104458 104467->104382 104468 fd84c0 69 API calls 104468->104484 104469->104484 104549 1039e4a 89 API calls 4 library calls 104469->104549 104471 fd8d40 59 API calls 104471->104484 104473 fd9ea0 341 API calls 104473->104484 104474 fd9c90 Mailbox 59 API calls 104474->104484 104475 1039e4a 89 API calls 104475->104484 104481 fdf195 104553 1039e4a 89 API calls 4 library calls 104481->104553 104482 1013e25 104482->104382 104483 fdea78 104483->104382 104484->104468 104484->104471 104484->104473 104484->104474 104484->104475 104484->104481 104484->104483 104547 fd7f77 59 API calls 2 library calls 104484->104547 104550 1026e8f 59 API calls 104484->104550 104551 104c5c3 341 API calls 104484->104551 104552 104b53c 341 API calls Mailbox 104484->104552 104554 10493c6 341 API calls Mailbox 104484->104554 104486 fdf4ba 104485->104486 104487 fdf650 104485->104487 104488 fdf4c6 104486->104488 104489 101441e 104486->104489 104490 fd7de1 59 API calls 104487->104490 104656 fdf290 341 API calls 2 library calls 104488->104656 104657 104bc6b 341 API calls Mailbox 104489->104657 104496 fdf58c Mailbox 104490->104496 104493 101442c 104497 fdf630 104493->104497 104658 1039e4a 89 API calls 4 library calls 104493->104658 104495 fdf4fd 104495->104493 104495->104496 104495->104497 104555 1033c37 104496->104555 104558 103cb7a 104496->104558 104638 fd4e4a 104496->104638 104644 104df37 104496->104644 104647 104445a 104496->104647 104497->104382 104498 fd9c90 Mailbox 59 API calls 104499 fdf5e3 104498->104499 104499->104497 104499->104498 104506 fd3212 104505->104506 104507 fd31e0 104505->104507 104506->104382 104507->104506 104508 fd3205 IsDialogMessageW 104507->104508 104509 100cf32 GetClassLongW 104507->104509 104508->104506 104508->104507 104509->104507 104509->104508 104510->104382 104511->104311 104512->104316 104513->104382 104514->104318 104515->104318 104516->104318 104517->104382 104518->104382 104519->104382 104521 fd9851 104520->104521 104530 fd984b 104520->104530 104522 fd9857 __itow 104521->104522 104523 fd9899 104521->104523 104527 100f4da 104521->104527 104528 100f5d3 __i64tow 104521->104528 104526 ff0db6 Mailbox 59 API calls 104522->104526 105728 ff3698 83 API calls 3 library calls 104523->105728 104529 fd9871 104526->104529 104531 ff0db6 Mailbox 59 API calls 104527->104531 104536 100f552 Mailbox _wcscpy 104527->104536 104529->104530 104532 fd7de1 59 API calls 104529->104532 104530->104382 104533 100f51f 104531->104533 104532->104530 104534 ff0db6 Mailbox 59 API calls 104533->104534 104535 100f545 104534->104535 104535->104536 104537 fd7de1 59 API calls 104535->104537 105729 ff3698 83 API calls 3 library calls 104536->105729 104537->104536 104538->104382 104539->104382 104540->104368 104541->104368 104542->104368 104543->104368 104544->104368 104545->104368 104546->104368 104547->104484 104548->104484 104549->104484 104550->104484 104551->104484 104552->104484 104553->104482 104554->104484 104659 103445a GetFileAttributesW 104555->104659 104559 fd7667 59 API calls 104558->104559 104560 103cbaf 104559->104560 104561 fd7667 59 API calls 104560->104561 104562 103cbb8 104561->104562 104563 103cbcc 104562->104563 104859 fd9b3c 59 API calls 104562->104859 104565 fd9837 84 API calls 104563->104565 104566 103cbe9 104565->104566 104567 103cc0b 104566->104567 104568 103ccea 104566->104568 104573 103cd1a Mailbox 104566->104573 104569 fd9837 84 API calls 104567->104569 104663 fd4ddd 104568->104663 104571 103cc17 104569->104571 104574 fd8047 59 API calls 104571->104574 104573->104499 104577 103cc23 104574->104577 104575 103cd16 104575->104573 104576 fd7667 59 API calls 104575->104576 104579 103cd4b 104576->104579 104582 103cc37 104577->104582 104583 103cc69 104577->104583 104578 fd4ddd 136 API calls 104578->104575 104580 fd7667 59 API calls 104579->104580 104581 103cd54 104580->104581 104585 fd7667 59 API calls 104581->104585 104586 fd8047 59 API calls 104582->104586 104584 fd9837 84 API calls 104583->104584 104588 103cc76 104584->104588 104589 103cd5d 104585->104589 104587 103cc47 104586->104587 104590 fd7cab 59 API calls 104587->104590 104591 fd8047 59 API calls 104588->104591 104592 fd7667 59 API calls 104589->104592 104593 103cc51 104590->104593 104594 103cc82 104591->104594 104595 103cd66 104592->104595 104596 fd9837 84 API calls 104593->104596 104860 1034a31 GetFileAttributesW 104594->104860 104598 fd9837 84 API calls 104595->104598 104599 103cc5d 104596->104599 104601 103cd73 104598->104601 104602 fd7b2e 59 API calls 104599->104602 104600 103cc8b 104603 103cc9e 104600->104603 104607 fd79f2 59 API calls 104600->104607 104687 fd459b 104601->104687 104602->104583 104606 fd9837 84 API calls 104603->104606 104613 103cca4 104603->104613 104605 103cd8e 104738 fd79f2 104605->104738 104609 103cccb 104606->104609 104607->104603 104861 10337ef 75 API calls Mailbox 104609->104861 104612 103cdd1 104615 fd8047 59 API calls 104612->104615 104613->104573 104614 fd79f2 59 API calls 104616 103cdae 104614->104616 104617 103cddf 104615->104617 104616->104612 104619 fd7bcc 59 API calls 104616->104619 104741 fd7b2e 104617->104741 104621 103cdc3 104619->104621 104624 fd7bcc 59 API calls 104621->104624 104622 fd7b2e 59 API calls 104623 103cdfb 104622->104623 104625 fd7b2e 59 API calls 104623->104625 104624->104612 104626 103ce09 104625->104626 104627 fd9837 84 API calls 104626->104627 104628 103ce15 104627->104628 104750 1034071 104628->104750 104630 103ce26 104631 1033c37 3 API calls 104630->104631 104632 103ce30 104631->104632 104633 fd9837 84 API calls 104632->104633 104636 103ce61 104632->104636 104634 103ce4e 104633->104634 104804 1039155 104634->104804 104637 fd4e4a 84 API calls 104636->104637 104637->104573 104639 fd4e54 104638->104639 104643 fd4e5b 104638->104643 104640 ff53a6 __fcloseall 83 API calls 104639->104640 104640->104643 104641 fd4e7b FreeLibrary 104642 fd4e6a 104641->104642 104642->104499 104643->104641 104643->104642 105580 104cadd 104644->105580 104646 104df47 104646->104499 104648 fd9837 84 API calls 104647->104648 104649 1044494 104648->104649 105689 fd6240 104649->105689 104651 10444a4 104652 10444c9 104651->104652 104653 fd9ea0 341 API calls 104651->104653 104655 10444cd 104652->104655 105714 fd9a98 59 API calls Mailbox 104652->105714 104653->104652 104655->104499 104656->104495 104657->104493 104658->104497 104660 1033c3e 104659->104660 104661 1034475 FindFirstFileW 104659->104661 104660->104499 104661->104660 104662 103448a FindClose 104661->104662 104662->104660 104862 fd4bb5 104663->104862 104668 fd4e08 LoadLibraryExW 104872 fd4b6a 104668->104872 104669 100d8e6 104671 fd4e4a 84 API calls 104669->104671 104673 100d8ed 104671->104673 104675 fd4b6a 3 API calls 104673->104675 104676 100d8f5 104675->104676 104898 fd4f0b 104676->104898 104677 fd4e2f 104677->104676 104678 fd4e3b 104677->104678 104680 fd4e4a 84 API calls 104678->104680 104682 fd4e40 104680->104682 104682->104575 104682->104578 104684 100d91c 104906 fd4ec7 104684->104906 104688 fd7667 59 API calls 104687->104688 104689 fd45b1 104688->104689 104690 fd7667 59 API calls 104689->104690 104691 fd45b9 104690->104691 104692 fd7667 59 API calls 104691->104692 104693 fd45c1 104692->104693 104694 fd7667 59 API calls 104693->104694 104695 fd45c9 104694->104695 104696 fd45fd 104695->104696 104697 100d4d2 104695->104697 104698 fd784b 59 API calls 104696->104698 104699 fd8047 59 API calls 104697->104699 104700 fd460b 104698->104700 104701 100d4db 104699->104701 104702 fd7d2c 59 API calls 104700->104702 104703 fd7d8c 59 API calls 104701->104703 104704 fd4615 104702->104704 104706 fd4640 104703->104706 104705 fd784b 59 API calls 104704->104705 104704->104706 104708 fd4636 104705->104708 104709 fd465f 104706->104709 104710 100d4fb 104706->104710 104723 fd4680 104706->104723 104713 fd7d2c 59 API calls 104708->104713 104711 fd79f2 59 API calls 104709->104711 104714 100d5cb 104710->104714 104724 100d5b4 104710->104724 104731 100d532 104710->104731 104715 fd4669 104711->104715 104712 fd4691 104716 fd46a3 104712->104716 104718 fd8047 59 API calls 104712->104718 104713->104706 104717 fd7bcc 59 API calls 104714->104717 104720 fd784b 59 API calls 104715->104720 104715->104723 104719 fd46b3 104716->104719 104721 fd8047 59 API calls 104716->104721 104733 100d588 104717->104733 104718->104716 104722 fd46ba 104719->104722 104725 fd8047 59 API calls 104719->104725 104720->104723 104721->104719 104726 fd8047 59 API calls 104722->104726 104735 fd46c1 Mailbox 104722->104735 105190 fd784b 104723->105190 104724->104714 104728 100d59f 104724->104728 104725->104722 104726->104735 104727 100d590 104729 fd7bcc 59 API calls 104727->104729 104730 fd7bcc 59 API calls 104728->104730 104729->104733 104730->104733 104731->104727 104736 100d57b 104731->104736 104732 fd79f2 59 API calls 104732->104733 104733->104723 104733->104732 105203 fd7924 59 API calls 2 library calls 104733->105203 104735->104605 104737 fd7bcc 59 API calls 104736->104737 104737->104733 104739 fd7e4f 59 API calls 104738->104739 104740 fd79fd 104739->104740 104740->104612 104740->104614 104742 100ec6b 104741->104742 104743 fd7b40 104741->104743 105211 1027bdb 59 API calls _memmove 104742->105211 105205 fd7a51 104743->105205 104746 fd7b4c 104746->104622 104747 100ec75 104748 fd8047 59 API calls 104747->104748 104749 100ec7d Mailbox 104748->104749 104751 103408d 104750->104751 104752 1034092 104751->104752 104753 10340a0 104751->104753 104754 fd8047 59 API calls 104752->104754 104755 fd7667 59 API calls 104753->104755 104803 103409b Mailbox 104754->104803 104756 10340a8 104755->104756 104757 fd7667 59 API calls 104756->104757 104758 10340b0 104757->104758 104759 fd7667 59 API calls 104758->104759 104760 10340bb 104759->104760 104761 fd7667 59 API calls 104760->104761 104762 10340c3 104761->104762 104763 fd7667 59 API calls 104762->104763 104764 10340cb 104763->104764 104765 fd7667 59 API calls 104764->104765 104766 10340d3 104765->104766 104767 fd7667 59 API calls 104766->104767 104768 10340db 104767->104768 104769 fd7667 59 API calls 104768->104769 104770 10340e3 104769->104770 104771 fd459b 59 API calls 104770->104771 104772 10340fa 104771->104772 104773 fd459b 59 API calls 104772->104773 104774 1034113 104773->104774 104775 fd79f2 59 API calls 104774->104775 104776 103411f 104775->104776 104777 1034132 104776->104777 104778 fd7d2c 59 API calls 104776->104778 104779 fd79f2 59 API calls 104777->104779 104778->104777 104780 103413b 104779->104780 104781 103414b 104780->104781 104782 fd7d2c 59 API calls 104780->104782 104783 fd8047 59 API calls 104781->104783 104782->104781 104784 1034157 104783->104784 104785 fd7b2e 59 API calls 104784->104785 104786 1034163 104785->104786 105212 1034223 59 API calls 104786->105212 104788 1034172 105213 1034223 59 API calls 104788->105213 104790 1034185 104791 fd79f2 59 API calls 104790->104791 104792 103418f 104791->104792 104793 10341a6 104792->104793 104794 1034194 104792->104794 104796 fd79f2 59 API calls 104793->104796 104795 fd7cab 59 API calls 104794->104795 104797 10341a1 104795->104797 104798 10341af 104796->104798 104802 fd7b2e 59 API calls 104797->104802 104799 10341cd 104798->104799 104801 fd7cab 59 API calls 104798->104801 104800 fd7b2e 59 API calls 104799->104800 104800->104803 104801->104797 104802->104799 104803->104630 104805 1039162 __write_nolock 104804->104805 104806 ff0db6 Mailbox 59 API calls 104805->104806 104807 10391bf 104806->104807 104808 fd522e 59 API calls 104807->104808 104809 10391c9 104808->104809 104810 1038f5f GetSystemTimeAsFileTime 104809->104810 104811 10391d4 104810->104811 104812 fd4ee5 85 API calls 104811->104812 104813 10391e7 _wcscmp 104812->104813 104814 103920b 104813->104814 104815 10392b8 104813->104815 105244 1039734 104814->105244 104817 1039734 96 API calls 104815->104817 104832 1039284 _wcscat 104817->104832 104820 fd4f0b 74 API calls 104821 10392dd 104820->104821 104823 fd4f0b 74 API calls 104821->104823 104822 10392c1 104822->104636 104825 10392ed 104823->104825 104824 1039239 _wcscat _wcscpy 105251 ff40fb 58 API calls __wsplitpath_helper 104824->105251 104826 fd4f0b 74 API calls 104825->104826 104828 1039308 104826->104828 104829 fd4f0b 74 API calls 104828->104829 104830 1039318 104829->104830 104831 fd4f0b 74 API calls 104830->104831 104833 1039333 104831->104833 104832->104820 104832->104822 104834 fd4f0b 74 API calls 104833->104834 104835 1039343 104834->104835 104836 fd4f0b 74 API calls 104835->104836 104837 1039353 104836->104837 104838 fd4f0b 74 API calls 104837->104838 104839 1039363 104838->104839 105214 10398e3 GetTempPathW GetTempFileNameW 104839->105214 104841 103936f 104842 ff525b 115 API calls 104841->104842 104853 1039380 104842->104853 104843 103943a 105228 ff53a6 104843->105228 104845 1039445 104847 103944b DeleteFileW 104845->104847 104848 103945f 104845->104848 104846 fd4f0b 74 API calls 104846->104853 104847->104822 104849 1039505 CopyFileW 104848->104849 104854 1039469 _wcsncpy 104848->104854 104850 103951b DeleteFileW 104849->104850 104851 103952d DeleteFileW 104849->104851 104850->104822 105241 10398a2 CreateFileW 104851->105241 104853->104822 104853->104843 104853->104846 105215 ff4863 104853->105215 105252 1038b06 104854->105252 104858 10394f4 DeleteFileW 104858->104822 104859->104563 104860->104600 104861->104613 104911 fd4c03 104862->104911 104865 fd4bdc 104867 fd4bec FreeLibrary 104865->104867 104868 fd4bf5 104865->104868 104866 fd4c03 2 API calls 104866->104865 104867->104868 104869 ff525b 104868->104869 104915 ff5270 104869->104915 104871 fd4dfc 104871->104668 104871->104669 104996 fd4c36 104872->104996 104875 fd4c36 2 API calls 104878 fd4b8f 104875->104878 104876 fd4baa 104879 fd4c70 104876->104879 104877 fd4ba1 FreeLibrary 104877->104876 104878->104876 104878->104877 104880 ff0db6 Mailbox 59 API calls 104879->104880 104881 fd4c85 104880->104881 104882 fd522e 59 API calls 104881->104882 104883 fd4c91 _memmove 104882->104883 104884 fd4d89 104883->104884 104885 fd4dc1 104883->104885 104889 fd4ccc 104883->104889 105000 fd4e89 CreateStreamOnHGlobal 104884->105000 105011 103991b 95 API calls 104885->105011 104886 fd4ec7 69 API calls 104895 fd4cd5 104886->104895 104889->104886 104890 fd4f0b 74 API calls 104890->104895 104891 fd4d69 104891->104677 104893 100d8a7 104894 fd4ee5 85 API calls 104893->104894 104896 100d8bb 104894->104896 104895->104890 104895->104891 104895->104893 105006 fd4ee5 104895->105006 104897 fd4f0b 74 API calls 104896->104897 104897->104891 104899 fd4f1d 104898->104899 104900 100d9cd 104898->104900 105035 ff55e2 104899->105035 104903 1039109 105167 1038f5f 104903->105167 104905 103911f 104905->104684 104907 100d990 104906->104907 104908 fd4ed6 104906->104908 105172 ff5c60 104908->105172 104910 fd4ede 104912 fd4bd0 104911->104912 104913 fd4c0c LoadLibraryA 104911->104913 104912->104865 104912->104866 104913->104912 104914 fd4c1d GetProcAddress 104913->104914 104914->104912 104918 ff527c __close 104915->104918 104916 ff528f 104964 ff8b28 58 API calls __getptd_noexit 104916->104964 104918->104916 104920 ff52c0 104918->104920 104919 ff5294 104965 ff8db6 9 API calls __close 104919->104965 104934 10004e8 104920->104934 104923 ff52c5 104924 ff52ce 104923->104924 104925 ff52db 104923->104925 104966 ff8b28 58 API calls __getptd_noexit 104924->104966 104926 ff5305 104925->104926 104927 ff52e5 104925->104927 104949 1000607 104926->104949 104967 ff8b28 58 API calls __getptd_noexit 104927->104967 104931 ff529f __close @_EH4_CallFilterFunc@8 104931->104871 104935 10004f4 __close 104934->104935 104936 ff9c0b __lock 58 API calls 104935->104936 104937 1000502 104936->104937 104938 100057d 104937->104938 104944 ff9c93 __mtinitlocknum 58 API calls 104937->104944 104947 1000576 104937->104947 104972 ff6c50 59 API calls __lock 104937->104972 104973 ff6cba LeaveCriticalSection LeaveCriticalSection _doexit 104937->104973 104974 ff881d 58 API calls 2 library calls 104938->104974 104941 1000584 104941->104947 104975 ff9e2b InitializeCriticalSectionAndSpinCount 104941->104975 104942 10005f3 __close 104942->104923 104944->104937 104946 10005aa EnterCriticalSection 104946->104947 104969 10005fe 104947->104969 104958 1000627 __wopenfile 104949->104958 104950 1000641 104980 ff8b28 58 API calls __getptd_noexit 104950->104980 104951 10007fc 104951->104950 104955 100085f 104951->104955 104953 1000646 104981 ff8db6 9 API calls __close 104953->104981 104977 10085a1 104955->104977 104956 ff5310 104968 ff5332 LeaveCriticalSection LeaveCriticalSection _fprintf 104956->104968 104958->104950 104958->104951 104982 ff37cb 60 API calls 2 library calls 104958->104982 104960 10007f5 104960->104951 104983 ff37cb 60 API calls 2 library calls 104960->104983 104962 1000814 104962->104951 104984 ff37cb 60 API calls 2 library calls 104962->104984 104964->104919 104965->104931 104966->104931 104967->104931 104968->104931 104976 ff9d75 LeaveCriticalSection 104969->104976 104971 1000605 104971->104942 104972->104937 104973->104937 104974->104941 104975->104946 104976->104971 104985 1007d85 104977->104985 104979 10085ba 104979->104956 104980->104953 104981->104956 104982->104960 104983->104962 104984->104951 104986 1007d91 __close 104985->104986 104987 1007da7 104986->104987 104990 1007ddd 104986->104990 104988 ff8b28 __close 58 API calls 104987->104988 104989 1007dac 104988->104989 104991 ff8db6 __close 9 API calls 104989->104991 104992 1007e4e __wsopen_nolock 109 API calls 104990->104992 104995 1007db6 __close 104991->104995 104993 1007df9 104992->104993 104994 1007e22 __wsopen_helper LeaveCriticalSection 104993->104994 104994->104995 104995->104979 104997 fd4b83 104996->104997 104998 fd4c3f LoadLibraryA 104996->104998 104997->104875 104997->104878 104998->104997 104999 fd4c50 GetProcAddress 104998->104999 104999->104997 105001 fd4ea3 FindResourceExW 105000->105001 105005 fd4ec0 105000->105005 105002 100d933 LoadResource 105001->105002 105001->105005 105003 100d948 SizeofResource 105002->105003 105002->105005 105004 100d95c LockResource 105003->105004 105003->105005 105004->105005 105005->104889 105007 fd4ef4 105006->105007 105008 100d9ab 105006->105008 105012 ff584d 105007->105012 105010 fd4f02 105010->104895 105011->104889 105013 ff5859 __close 105012->105013 105014 ff586b 105013->105014 105016 ff5891 105013->105016 105025 ff8b28 58 API calls __getptd_noexit 105014->105025 105027 ff6c11 105016->105027 105017 ff5870 105026 ff8db6 9 API calls __close 105017->105026 105022 ff58a6 105034 ff58c8 LeaveCriticalSection LeaveCriticalSection _fprintf 105022->105034 105023 ff587b __close 105023->105010 105025->105017 105026->105023 105028 ff6c43 EnterCriticalSection 105027->105028 105029 ff6c21 105027->105029 105030 ff5897 105028->105030 105029->105028 105031 ff6c29 105029->105031 105033 ff57be 83 API calls 5 library calls 105030->105033 105032 ff9c0b __lock 58 API calls 105031->105032 105032->105030 105033->105022 105034->105023 105038 ff55fd 105035->105038 105037 fd4f2e 105037->104903 105039 ff5609 __close 105038->105039 105040 ff561f _memset 105039->105040 105041 ff564c 105039->105041 105042 ff5644 __close 105039->105042 105065 ff8b28 58 API calls __getptd_noexit 105040->105065 105043 ff6c11 __lock_file 59 API calls 105041->105043 105042->105037 105045 ff5652 105043->105045 105051 ff541d 105045->105051 105046 ff5639 105066 ff8db6 9 API calls __close 105046->105066 105052 ff5453 105051->105052 105055 ff5438 _memset 105051->105055 105067 ff5686 LeaveCriticalSection LeaveCriticalSection _fprintf 105052->105067 105053 ff5443 105163 ff8b28 58 API calls __getptd_noexit 105053->105163 105055->105052 105055->105053 105058 ff5493 105055->105058 105058->105052 105059 ff55a4 _memset 105058->105059 105068 ff46e6 105058->105068 105075 1000e5b 105058->105075 105143 1000ba7 105058->105143 105165 1000cc8 58 API calls 3 library calls 105058->105165 105166 ff8b28 58 API calls __getptd_noexit 105059->105166 105064 ff5448 105164 ff8db6 9 API calls __close 105064->105164 105065->105046 105066->105042 105067->105042 105069 ff4705 105068->105069 105070 ff46f0 105068->105070 105069->105058 105071 ff8b28 __close 58 API calls 105070->105071 105072 ff46f5 105071->105072 105073 ff8db6 __close 9 API calls 105072->105073 105074 ff4700 105073->105074 105074->105058 105076 1000e93 105075->105076 105077 1000e7c 105075->105077 105079 10015cb 105076->105079 105082 1000ecd 105076->105082 105078 ff8af4 __close 58 API calls 105077->105078 105081 1000e81 105078->105081 105080 ff8af4 __close 58 API calls 105079->105080 105083 10015d0 105080->105083 105084 ff8b28 __close 58 API calls 105081->105084 105085 1000ed5 105082->105085 105092 1000eec 105082->105092 105086 ff8b28 __close 58 API calls 105083->105086 105123 1000e88 105084->105123 105087 ff8af4 __close 58 API calls 105085->105087 105088 1000ee1 105086->105088 105089 1000eda 105087->105089 105090 ff8db6 __close 9 API calls 105088->105090 105093 ff8b28 __close 58 API calls 105089->105093 105090->105123 105091 1000f01 105094 ff8af4 __close 58 API calls 105091->105094 105092->105091 105095 1000f1b 105092->105095 105096 1000f39 105092->105096 105092->105123 105093->105088 105094->105089 105095->105091 105098 1000f26 105095->105098 105097 ff881d __malloc_crt 58 API calls 105096->105097 105099 1000f49 105097->105099 105100 1005c6b __flsbuf 58 API calls 105098->105100 105101 1000f51 105099->105101 105102 1000f6c 105099->105102 105103 100103a 105100->105103 105104 ff8b28 __close 58 API calls 105101->105104 105106 10018c1 __lseeki64_nolock 60 API calls 105102->105106 105105 10010b3 ReadFile 105103->105105 105110 1001050 GetConsoleMode 105103->105110 105107 1000f56 105104->105107 105108 1001593 GetLastError 105105->105108 105109 10010d5 105105->105109 105106->105098 105113 ff8af4 __close 58 API calls 105107->105113 105114 10015a0 105108->105114 105115 1001093 105108->105115 105109->105108 105118 10010a5 105109->105118 105111 10010b0 105110->105111 105112 1001064 105110->105112 105111->105105 105112->105111 105116 100106a ReadConsoleW 105112->105116 105113->105123 105117 ff8b28 __close 58 API calls 105114->105117 105120 ff8b07 __dosmaperr 58 API calls 105115->105120 105125 1001099 105115->105125 105116->105118 105119 100108d GetLastError 105116->105119 105121 10015a5 105117->105121 105118->105125 105126 100110a 105118->105126 105127 1001377 105118->105127 105119->105115 105120->105125 105122 ff8af4 __close 58 API calls 105121->105122 105122->105125 105123->105058 105124 ff2d55 _free 58 API calls 105124->105123 105125->105123 105125->105124 105129 1001176 ReadFile 105126->105129 105135 10011f7 105126->105135 105127->105125 105133 100147d ReadFile 105127->105133 105130 1001197 GetLastError 105129->105130 105141 10011a1 105129->105141 105130->105141 105131 10012b4 105137 1001264 MultiByteToWideChar 105131->105137 105138 10018c1 __lseeki64_nolock 60 API calls 105131->105138 105132 10012a4 105136 ff8b28 __close 58 API calls 105132->105136 105134 10014a0 GetLastError 105133->105134 105142 10014ae 105133->105142 105134->105142 105135->105125 105135->105131 105135->105132 105135->105137 105136->105125 105137->105119 105137->105125 105138->105137 105139 10018c1 __lseeki64_nolock 60 API calls 105139->105141 105140 10018c1 __lseeki64_nolock 60 API calls 105140->105142 105141->105126 105141->105139 105142->105127 105142->105140 105144 1000bb2 105143->105144 105148 1000bc7 105143->105148 105145 ff8b28 __close 58 API calls 105144->105145 105146 1000bb7 105145->105146 105147 ff8db6 __close 9 API calls 105146->105147 105155 1000bc2 105147->105155 105149 1000bfc 105148->105149 105150 1005fe4 __getbuf 58 API calls 105148->105150 105148->105155 105151 ff46e6 __filbuf 58 API calls 105149->105151 105150->105149 105152 1000c10 105151->105152 105153 1000d47 __read 72 API calls 105152->105153 105154 1000c17 105153->105154 105154->105155 105156 ff46e6 __filbuf 58 API calls 105154->105156 105155->105058 105157 1000c3a 105156->105157 105157->105155 105158 ff46e6 __filbuf 58 API calls 105157->105158 105159 1000c46 105158->105159 105159->105155 105160 ff46e6 __filbuf 58 API calls 105159->105160 105161 1000c53 105160->105161 105162 ff46e6 __filbuf 58 API calls 105161->105162 105162->105155 105163->105064 105164->105052 105165->105058 105166->105064 105170 ff520a GetSystemTimeAsFileTime 105167->105170 105169 1038f6e 105169->104905 105171 ff5238 __aulldiv 105170->105171 105171->105169 105173 ff5c6c __close 105172->105173 105174 ff5c7e 105173->105174 105175 ff5c93 105173->105175 105186 ff8b28 58 API calls __getptd_noexit 105174->105186 105177 ff6c11 __lock_file 59 API calls 105175->105177 105178 ff5c99 105177->105178 105188 ff58d0 67 API calls 6 library calls 105178->105188 105179 ff5c83 105187 ff8db6 9 API calls __close 105179->105187 105182 ff5ca4 105189 ff5cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 105182->105189 105184 ff5cb6 105185 ff5c8e __close 105184->105185 105185->104910 105186->105179 105187->105185 105188->105182 105189->105184 105191 fd785a 105190->105191 105192 fd78b7 105190->105192 105191->105192 105193 fd7865 105191->105193 105194 fd7d2c 59 API calls 105192->105194 105195 100eb09 105193->105195 105196 fd7880 105193->105196 105200 fd7888 _memmove 105194->105200 105198 fd8029 59 API calls 105195->105198 105204 fd7f27 59 API calls Mailbox 105196->105204 105199 100eb13 105198->105199 105201 ff0db6 Mailbox 59 API calls 105199->105201 105200->104712 105202 100eb33 105201->105202 105203->104733 105204->105200 105206 fd7a5f 105205->105206 105210 fd7a85 _memmove 105205->105210 105207 ff0db6 Mailbox 59 API calls 105206->105207 105206->105210 105208 fd7ad4 105207->105208 105209 ff0db6 Mailbox 59 API calls 105208->105209 105209->105210 105210->104746 105211->104747 105212->104788 105213->104790 105214->104841 105216 ff486f __close 105215->105216 105217 ff489d __close 105216->105217 105218 ff488d 105216->105218 105219 ff48a5 105216->105219 105217->104853 105295 ff8b28 58 API calls __getptd_noexit 105218->105295 105220 ff6c11 __lock_file 59 API calls 105219->105220 105222 ff48ab 105220->105222 105283 ff470a 105222->105283 105223 ff4892 105296 ff8db6 9 API calls __close 105223->105296 105229 ff53b2 __close 105228->105229 105230 ff53de 105229->105230 105231 ff53c6 105229->105231 105234 ff6c11 __lock_file 59 API calls 105230->105234 105237 ff53d6 __close 105230->105237 105465 ff8b28 58 API calls __getptd_noexit 105231->105465 105233 ff53cb 105466 ff8db6 9 API calls __close 105233->105466 105236 ff53f0 105234->105236 105449 ff533a 105236->105449 105237->104845 105242 10398c8 SetFileTime CloseHandle 105241->105242 105243 10398de 105241->105243 105242->105243 105243->104822 105249 1039748 __tzset_nolock _wcscmp 105244->105249 105245 fd4f0b 74 API calls 105245->105249 105246 1039210 105246->104822 105250 ff40fb 58 API calls __wsplitpath_helper 105246->105250 105247 1039109 GetSystemTimeAsFileTime 105247->105249 105248 fd4ee5 85 API calls 105248->105249 105249->105245 105249->105246 105249->105247 105249->105248 105250->104824 105251->104832 105253 1038b11 105252->105253 105254 1038b1f 105252->105254 105255 ff525b 115 API calls 105253->105255 105256 1038b64 105254->105256 105257 ff525b 115 API calls 105254->105257 105267 1038b28 105254->105267 105255->105254 105538 1038d91 105256->105538 105258 1038b49 105257->105258 105258->105256 105260 1038b52 105258->105260 105264 ff53a6 __fcloseall 83 API calls 105260->105264 105260->105267 105261 1038ba8 105262 1038bcd 105261->105262 105263 1038bac 105261->105263 105264->105267 105267->104851 105267->104858 105284 ff4737 105283->105284 105286 ff4719 105283->105286 105297 ff48dd LeaveCriticalSection LeaveCriticalSection _fprintf 105284->105297 105285 ff4727 105326 ff8b28 58 API calls __getptd_noexit 105285->105326 105286->105284 105286->105285 105293 ff4751 _memmove 105286->105293 105288 ff472c 105327 ff8db6 9 API calls __close 105288->105327 105292 ff46e6 __filbuf 58 API calls 105292->105293 105293->105284 105293->105292 105298 ffd886 105293->105298 105328 ff4a3d 105293->105328 105334 ffae1e 78 API calls 6 library calls 105293->105334 105295->105223 105296->105217 105297->105217 105299 ffd892 __close 105298->105299 105300 ffd89f 105299->105300 105301 ffd8b6 105299->105301 105408 ff8af4 58 API calls __getptd_noexit 105300->105408 105303 ffd955 105301->105303 105305 ffd8ca 105301->105305 105414 ff8af4 58 API calls __getptd_noexit 105303->105414 105304 ffd8a4 105409 ff8b28 58 API calls __getptd_noexit 105304->105409 105308 ffd8e8 105305->105308 105309 ffd8f2 105305->105309 105410 ff8af4 58 API calls __getptd_noexit 105308->105410 105335 ffd206 105309->105335 105310 ffd8ed 105415 ff8b28 58 API calls __getptd_noexit 105310->105415 105317 ffd961 105321 ffd8ab __close 105321->105293 105326->105288 105327->105284 105329 ff4a50 105328->105329 105333 ff4a74 105328->105333 105330 ff46e6 __filbuf 58 API calls 105329->105330 105329->105333 105331 ff4a6d 105330->105331 105332 ffd886 __write 78 API calls 105331->105332 105332->105333 105333->105293 105334->105293 105336 ffd212 __close 105335->105336 105337 ffd261 EnterCriticalSection 105336->105337 105408->105304 105409->105321 105410->105310 105414->105310 105415->105317 105450 ff535d 105449->105450 105451 ff5349 105449->105451 105453 ff4a3d __flush 78 API calls 105450->105453 105458 ff5359 105450->105458 105498 ff8b28 58 API calls __getptd_noexit 105451->105498 105455 ff5369 105453->105455 105454 ff534e 105499 ff8db6 9 API calls __close 105454->105499 105468 1000b77 105455->105468 105467 ff5415 LeaveCriticalSection LeaveCriticalSection _fprintf 105458->105467 105460 ff46e6 __filbuf 58 API calls 105461 ff5377 105460->105461 105472 1000a02 105461->105472 105465->105233 105466->105237 105467->105237 105469 ff5371 105468->105469 105470 1000b84 105468->105470 105469->105460 105470->105469 105471 ff2d55 _free 58 API calls 105470->105471 105471->105469 105473 1000a0e __close 105472->105473 105498->105454 105499->105458 105539 1038db6 105538->105539 105541 1038d9f __tzset_nolock _memmove 105538->105541 105540 ff55e2 __fread_nolock 74 API calls 105539->105540 105540->105541 105541->105261 105581 fd9837 84 API calls 105580->105581 105582 104cb1a 105581->105582 105586 104cb61 Mailbox 105582->105586 105618 104d7a5 105582->105618 105584 104cf2e 105667 104d8c8 92 API calls Mailbox 105584->105667 105586->104646 105588 104cf3d 105591 104cdc7 105588->105591 105592 104cf49 105588->105592 105589 104cbb2 Mailbox 105589->105586 105590 fd9837 84 API calls 105589->105590 105605 104cdb9 105589->105605 105650 104fbce 59 API calls 2 library calls 105589->105650 105651 104cfdf 61 API calls 2 library calls 105589->105651 105590->105589 105631 104c96e 105591->105631 105592->105586 105597 104ce00 105646 ff0c08 105597->105646 105600 104ce33 105653 fd92ce 105600->105653 105601 104ce1a 105652 1039e4a 89 API calls 4 library calls 105601->105652 105604 104ce25 GetCurrentProcess TerminateProcess 105604->105600 105605->105584 105605->105591 105609 104cfa4 105609->105586 105614 104cfb8 FreeLibrary 105609->105614 105611 104ce6b 105665 104d649 107 API calls _free 105611->105665 105614->105586 105616 fd9d3c 60 API calls 105617 104ce7c 105616->105617 105617->105609 105617->105616 105666 fd8d40 59 API calls Mailbox 105617->105666 105668 104d649 107 API calls _free 105617->105668 105619 fd7e4f 59 API calls 105618->105619 105620 104d7c0 CharLowerBuffW 105619->105620 105669 102f167 105620->105669 105624 fd7667 59 API calls 105625 104d7f9 105624->105625 105626 fd784b 59 API calls 105625->105626 105628 104d810 105626->105628 105627 104d858 Mailbox 105627->105589 105629 fd7d2c 59 API calls 105628->105629 105630 104d81c Mailbox 105629->105630 105630->105627 105676 104cfdf 61 API calls 2 library calls 105630->105676 105632 104c989 105631->105632 105636 104c9de 105631->105636 105633 ff0db6 Mailbox 59 API calls 105632->105633 105635 104c9ab 105633->105635 105634 ff0db6 Mailbox 59 API calls 105634->105635 105635->105634 105635->105636 105637 104da50 105636->105637 105638 104dc79 Mailbox 105637->105638 105642 104da73 _strcat _wcscpy __wsetenvp 105637->105642 105638->105597 105639 fd9be6 59 API calls 105639->105642 105640 fd9b3c 59 API calls 105640->105642 105641 fd9b98 59 API calls 105641->105642 105642->105638 105642->105639 105642->105640 105642->105641 105643 fd9837 84 API calls 105642->105643 105644 ff571c 58 API calls __crtGetStringTypeA_stat 105642->105644 105679 1035887 61 API calls 2 library calls 105642->105679 105643->105642 105644->105642 105647 ff0c1d 105646->105647 105648 ff0cb5 VirtualProtect 105647->105648 105649 ff0c83 105647->105649 105648->105649 105649->105600 105649->105601 105650->105589 105651->105589 105652->105604 105654 fd92d6 105653->105654 105655 ff0db6 Mailbox 59 API calls 105654->105655 105656 fd92e4 105655->105656 105657 fd92f0 105656->105657 105680 fd91fc 59 API calls Mailbox 105656->105680 105659 fd9050 105657->105659 105681 fd9160 105659->105681 105661 ff0db6 Mailbox 59 API calls 105662 fd90fb 105661->105662 105662->105617 105664 fd8d40 59 API calls Mailbox 105662->105664 105663 fd905f 105663->105661 105663->105662 105664->105611 105665->105617 105666->105617 105667->105588 105668->105617 105670 102f192 __wsetenvp 105669->105670 105671 102f1d1 105670->105671 105674 102f1c7 105670->105674 105675 102f278 105670->105675 105671->105624 105671->105630 105674->105671 105677 fd78c4 61 API calls 105674->105677 105675->105671 105678 fd78c4 61 API calls 105675->105678 105676->105627 105677->105674 105678->105675 105679->105642 105680->105657 105682 fd9169 Mailbox 105681->105682 105683 100f19f 105682->105683 105687 fd9173 105682->105687 105684 ff0db6 Mailbox 59 API calls 105683->105684 105686 100f1ab 105684->105686 105685 fd917a 105685->105663 105687->105685 105688 fd9c90 Mailbox 59 API calls 105687->105688 105688->105687 105715 fd7a16 105689->105715 105691 fd646a 105722 fd750f 59 API calls 2 library calls 105691->105722 105693 fd6484 Mailbox 105693->104651 105696 100dff6 105725 102f8aa 91 API calls 4 library calls 105696->105725 105697 fd7d8c 59 API calls 105708 fd6265 105697->105708 105700 fd750f 59 API calls 105700->105708 105702 100e004 105726 fd750f 59 API calls 2 library calls 105702->105726 105704 100e01a 105704->105693 105705 fd6799 _memmove 105727 102f8aa 91 API calls 4 library calls 105705->105727 105706 100df92 105707 fd8029 59 API calls 105706->105707 105709 100df9d 105707->105709 105708->105691 105708->105696 105708->105697 105708->105700 105708->105705 105708->105706 105711 fd7e4f 59 API calls 105708->105711 105720 fd5f6c 60 API calls 105708->105720 105721 fd5d41 59 API calls Mailbox 105708->105721 105723 fd5e72 60 API calls 105708->105723 105724 fd7924 59 API calls 2 library calls 105708->105724 105713 ff0db6 Mailbox 59 API calls 105709->105713 105712 fd643b CharUpperBuffW 105711->105712 105712->105708 105713->105705 105714->104655 105716 ff0db6 Mailbox 59 API calls 105715->105716 105717 fd7a3b 105716->105717 105718 fd8029 59 API calls 105717->105718 105719 fd7a4a 105718->105719 105719->105708 105720->105708 105721->105708 105722->105693 105723->105708 105724->105708 105725->105702 105726->105704 105727->105693 105728->104522 105729->104528 105730->104385 105731->104414 105732->104414 105733->104409 105734->104408 105735->104419 105736->104408 105737->104424 105738->104448 105739 fd1055 105744 fd2649 105739->105744 105742 ff2d40 __cinit 67 API calls 105743 fd1064 105742->105743 105745 fd7667 59 API calls 105744->105745 105746 fd26b7 105745->105746 105751 fd3582 105746->105751 105749 fd2754 105750 fd105a 105749->105750 105754 fd3416 59 API calls 2 library calls 105749->105754 105750->105742 105755 fd35b0 105751->105755 105754->105749 105756 fd35bd 105755->105756 105757 fd35a1 105755->105757 105756->105757 105758 fd35c4 RegOpenKeyExW 105756->105758 105757->105749 105758->105757 105759 fd35de RegQueryValueExW 105758->105759 105760 fd35ff 105759->105760 105761 fd3614 RegCloseKey 105759->105761 105760->105761 105761->105757 105762 ff7c56 105763 ff7c62 __close 105762->105763 105799 ff9e08 GetStartupInfoW 105763->105799 105765 ff7c67 105801 ff8b7c GetProcessHeap 105765->105801 105767 ff7cbf 105768 ff7cca 105767->105768 105884 ff7da6 58 API calls 3 library calls 105767->105884 105802 ff9ae6 105768->105802 105771 ff7cd0 105772 ff7cdb __RTC_Initialize 105771->105772 105885 ff7da6 58 API calls 3 library calls 105771->105885 105823 ffd5d2 105772->105823 105775 ff7cea 105776 ff7cf6 GetCommandLineW 105775->105776 105886 ff7da6 58 API calls 3 library calls 105775->105886 105842 1004f23 GetEnvironmentStringsW 105776->105842 105780 ff7cf5 105780->105776 105782 ff7d10 105783 ff7d1b 105782->105783 105887 ff30b5 58 API calls 3 library calls 105782->105887 105852 1004d58 105783->105852 105786 ff7d21 105787 ff7d2c 105786->105787 105888 ff30b5 58 API calls 3 library calls 105786->105888 105866 ff30ef 105787->105866 105790 ff7d34 105791 ff7d3f __wwincmdln 105790->105791 105889 ff30b5 58 API calls 3 library calls 105790->105889 105872 fd47d0 105791->105872 105794 ff7d53 105795 ff7d62 105794->105795 105890 ff3358 58 API calls _doexit 105794->105890 105891 ff30e0 58 API calls _doexit 105795->105891 105798 ff7d67 __close 105800 ff9e1e 105799->105800 105800->105765 105801->105767 105892 ff3187 36 API calls 2 library calls 105802->105892 105804 ff9aeb 105893 ff9d3c InitializeCriticalSectionAndSpinCount ___lock_fhandle 105804->105893 105806 ff9af0 105807 ff9af4 105806->105807 105895 ff9d8a TlsAlloc 105806->105895 105894 ff9b5c 61 API calls 2 library calls 105807->105894 105810 ff9b06 105810->105807 105812 ff9b11 105810->105812 105811 ff9af9 105811->105771 105896 ff87d5 105812->105896 105815 ff9b53 105904 ff9b5c 61 API calls 2 library calls 105815->105904 105818 ff9b32 105818->105815 105820 ff9b38 105818->105820 105819 ff9b58 105819->105771 105903 ff9a33 58 API calls 4 library calls 105820->105903 105822 ff9b40 GetCurrentThreadId 105822->105771 105824 ffd5de __close 105823->105824 105825 ff9c0b __lock 58 API calls 105824->105825 105826 ffd5e5 105825->105826 105827 ff87d5 __calloc_crt 58 API calls 105826->105827 105829 ffd5f6 105827->105829 105828 ffd661 GetStartupInfoW 105836 ffd676 105828->105836 105837 ffd7a5 105828->105837 105829->105828 105830 ffd601 __close @_EH4_CallFilterFunc@8 105829->105830 105830->105775 105831 ffd86d 105918 ffd87d LeaveCriticalSection _doexit 105831->105918 105833 ff87d5 __calloc_crt 58 API calls 105833->105836 105834 ffd7f2 GetStdHandle 105834->105837 105835 ffd805 GetFileType 105835->105837 105836->105833 105836->105837 105839 ffd6c4 105836->105839 105837->105831 105837->105834 105837->105835 105917 ff9e2b InitializeCriticalSectionAndSpinCount 105837->105917 105838 ffd6f8 GetFileType 105838->105839 105839->105837 105839->105838 105916 ff9e2b InitializeCriticalSectionAndSpinCount 105839->105916 105843 ff7d06 105842->105843 105845 1004f34 105842->105845 105848 1004b1b GetModuleFileNameW 105843->105848 105919 ff881d 58 API calls 2 library calls 105845->105919 105846 1004f5a _memmove 105847 1004f70 FreeEnvironmentStringsW 105846->105847 105847->105843 105849 1004b4f _wparse_cmdline 105848->105849 105851 1004b8f _wparse_cmdline 105849->105851 105920 ff881d 58 API calls 2 library calls 105849->105920 105851->105782 105853 1004d71 __wsetenvp 105852->105853 105857 1004d69 105852->105857 105854 ff87d5 __calloc_crt 58 API calls 105853->105854 105862 1004d9a __wsetenvp 105854->105862 105855 1004df1 105856 ff2d55 _free 58 API calls 105855->105856 105856->105857 105857->105786 105858 ff87d5 __calloc_crt 58 API calls 105858->105862 105859 1004e16 105861 ff2d55 _free 58 API calls 105859->105861 105861->105857 105862->105855 105862->105857 105862->105858 105862->105859 105863 1004e2d 105862->105863 105921 1004607 58 API calls __close 105862->105921 105922 ff8dc6 IsProcessorFeaturePresent 105863->105922 105865 1004e39 105865->105786 105869 ff30fb __IsNonwritableInCurrentImage 105866->105869 105868 ff3119 __initterm_e 105870 ff2d40 __cinit 67 API calls 105868->105870 105871 ff3138 __cinit __IsNonwritableInCurrentImage 105868->105871 105937 ffa4d1 105869->105937 105870->105871 105871->105790 105873 fd47ea 105872->105873 105883 fd4889 105872->105883 105874 fd4824 IsThemeActive 105873->105874 105940 ff336c 105874->105940 105878 fd4850 105952 fd48fd SystemParametersInfoW SystemParametersInfoW 105878->105952 105880 fd485c 105953 fd3b3a 105880->105953 105882 fd4864 SystemParametersInfoW 105882->105883 105883->105794 105884->105768 105885->105772 105886->105780 105890->105795 105891->105798 105892->105804 105893->105806 105894->105811 105895->105810 105899 ff87dc 105896->105899 105898 ff8817 105898->105815 105902 ff9de6 TlsSetValue 105898->105902 105899->105898 105900 ff87fa 105899->105900 105905 10051f6 105899->105905 105900->105898 105900->105899 105913 ffa132 Sleep 105900->105913 105902->105818 105903->105822 105904->105819 105906 1005201 105905->105906 105911 100521c 105905->105911 105907 100520d 105906->105907 105906->105911 105914 ff8b28 58 API calls __getptd_noexit 105907->105914 105909 100522c HeapAlloc 105910 1005212 105909->105910 105909->105911 105910->105899 105911->105909 105911->105910 105915 ff33a1 DecodePointer 105911->105915 105913->105900 105914->105910 105915->105911 105916->105839 105917->105837 105918->105830 105919->105846 105920->105851 105921->105862 105923 ff8dd1 105922->105923 105928 ff8c59 105923->105928 105927 ff8dec 105927->105865 105929 ff8c73 _memset __call_reportfault 105928->105929 105930 ff8c93 IsDebuggerPresent 105929->105930 105936 ffa155 SetUnhandledExceptionFilter UnhandledExceptionFilter 105930->105936 105932 ff8d57 __call_reportfault 105933 ffc5f6 __woutput_l 6 API calls 105932->105933 105934 ff8d7a 105933->105934 105935 ffa140 GetCurrentProcess TerminateProcess 105934->105935 105935->105927 105936->105932 105938 ffa4d4 EncodePointer 105937->105938 105938->105938 105939 ffa4ee 105938->105939 105939->105868 105941 ff9c0b __lock 58 API calls 105940->105941 105942 ff3377 DecodePointer EncodePointer 105941->105942 106005 ff9d75 LeaveCriticalSection 105942->106005 105944 fd4849 105945 ff33d4 105944->105945 105946 ff33de 105945->105946 105947 ff33f8 105945->105947 105946->105947 106006 ff8b28 58 API calls __getptd_noexit 105946->106006 105947->105878 105949 ff33e8 106007 ff8db6 9 API calls __close 105949->106007 105951 ff33f3 105951->105878 105952->105880 105954 fd3b47 __write_nolock 105953->105954 105955 fd7667 59 API calls 105954->105955 105956 fd3b51 GetCurrentDirectoryW 105955->105956 106008 fd3766 105956->106008 105958 fd3b7a IsDebuggerPresent 105959 100d272 MessageBoxA 105958->105959 105960 fd3b88 105958->105960 105961 100d28c 105959->105961 105960->105961 105962 fd3ba5 105960->105962 105992 fd3c61 105960->105992 106141 fd7213 59 API calls Mailbox 105961->106141 106089 fd7285 105962->106089 105963 fd3c68 SetCurrentDirectoryW 105967 fd3c75 Mailbox 105963->105967 105967->105882 105968 fd3bc3 GetFullPathNameW 105970 fd7bcc 59 API calls 105968->105970 105969 100d29c 105972 100d2b2 SetCurrentDirectoryW 105969->105972 105971 fd3bfe 105970->105971 106105 fe092d 105971->106105 105972->105967 105975 fd3c1c 105976 fd3c26 105975->105976 106142 102874b AllocateAndInitializeSid CheckTokenMembership FreeSid 105975->106142 106121 fd3a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 105976->106121 105979 100d2cf 105979->105976 105992->105963 106005->105944 106006->105949 106007->105951 106009 fd7667 59 API calls 106008->106009 106010 fd377c 106009->106010 106143 fd3d31 106010->106143 106012 fd379a 106013 fd4706 61 API calls 106012->106013 106014 fd37ae 106013->106014 106015 fd7de1 59 API calls 106014->106015 106016 fd37bb 106015->106016 106017 fd4ddd 136 API calls 106016->106017 106018 fd37d4 106017->106018 106019 fd37dc Mailbox 106018->106019 106020 100d173 106018->106020 106023 fd8047 59 API calls 106019->106023 106185 103955b 106020->106185 106027 fd37ef 106023->106027 106024 100d192 106026 ff2d55 _free 58 API calls 106024->106026 106025 fd4e4a 84 API calls 106025->106024 106028 100d19f 106026->106028 106157 fd928a 106027->106157 106030 fd4e4a 84 API calls 106028->106030 106032 100d1a8 106030->106032 106036 fd3ed0 59 API calls 106032->106036 106033 fd7de1 59 API calls 106034 fd3808 106033->106034 106035 fd84c0 69 API calls 106034->106035 106037 fd381a Mailbox 106035->106037 106038 100d1c3 106036->106038 106039 fd7de1 59 API calls 106037->106039 106040 fd3ed0 59 API calls 106038->106040 106041 fd3840 106039->106041 106043 100d1df 106040->106043 106042 fd84c0 69 API calls 106041->106042 106046 fd384f Mailbox 106042->106046 106044 fd4706 61 API calls 106043->106044 106045 100d204 106044->106045 106047 fd3ed0 59 API calls 106045->106047 106049 fd7667 59 API calls 106046->106049 106048 100d210 106047->106048 106050 fd8047 59 API calls 106048->106050 106051 fd386d 106049->106051 106052 100d21e 106050->106052 106160 fd3ed0 106051->106160 106054 fd3ed0 59 API calls 106052->106054 106056 100d22d 106054->106056 106062 fd8047 59 API calls 106056->106062 106058 fd3887 106058->106032 106059 fd3891 106058->106059 106060 ff2efd _W_store_winword 60 API calls 106059->106060 106061 fd389c 106060->106061 106061->106038 106063 fd38a6 106061->106063 106065 100d24f 106062->106065 106064 ff2efd _W_store_winword 60 API calls 106063->106064 106067 fd38b1 106064->106067 106066 fd3ed0 59 API calls 106065->106066 106068 100d25c 106066->106068 106067->106043 106069 fd38bb 106067->106069 106068->106068 106070 ff2efd _W_store_winword 60 API calls 106069->106070 106071 fd38c6 106070->106071 106071->106056 106072 fd3907 106071->106072 106074 fd3ed0 59 API calls 106071->106074 106072->106056 106073 fd3914 106072->106073 106076 fd92ce 59 API calls 106073->106076 106075 fd38ea 106074->106075 106078 fd8047 59 API calls 106075->106078 106077 fd3924 106076->106077 106079 fd9050 59 API calls 106077->106079 106080 fd38f8 106078->106080 106081 fd3932 106079->106081 106082 fd3ed0 59 API calls 106080->106082 106176 fd8ee0 106081->106176 106082->106072 106084 fd928a 59 API calls 106086 fd394f 106084->106086 106085 fd8ee0 60 API calls 106085->106086 106086->106084 106086->106085 106087 fd3ed0 59 API calls 106086->106087 106088 fd3995 Mailbox 106086->106088 106087->106086 106088->105958 106090 fd7292 __write_nolock 106089->106090 106091 100ea22 _memset 106090->106091 106092 fd72ab 106090->106092 106094 100ea3e GetOpenFileNameW 106091->106094 106093 fd4750 60 API calls 106092->106093 106095 fd72b4 106093->106095 106096 100ea8d 106094->106096 106224 ff0791 106095->106224 106098 fd7bcc 59 API calls 106096->106098 106100 100eaa2 106098->106100 106100->106100 106102 fd72c9 106242 fd686a 106102->106242 106106 fe093a __write_nolock 106105->106106 106418 fd6d80 106106->106418 106108 fe093f 106120 fd3c14 106108->106120 106429 fe119e 89 API calls 106108->106429 106110 fe094c 106110->106120 106430 fe3ee7 91 API calls Mailbox 106110->106430 106112 fe0955 106112->106120 106120->105969 106120->105975 106141->105969 106142->105979 106144 fd3d3e __write_nolock 106143->106144 106145 fd7bcc 59 API calls 106144->106145 106151 fd3ea4 Mailbox 106144->106151 106147 fd3d70 106145->106147 106146 fd79f2 59 API calls 106146->106147 106147->106146 106154 fd3da6 Mailbox 106147->106154 106148 fd79f2 59 API calls 106148->106154 106149 fd3e77 106150 fd7de1 59 API calls 106149->106150 106149->106151 106153 fd3e98 106150->106153 106151->106012 106152 fd7de1 59 API calls 106152->106154 106155 fd3f74 59 API calls 106153->106155 106154->106148 106154->106149 106154->106151 106154->106152 106156 fd3f74 59 API calls 106154->106156 106155->106151 106156->106154 106158 ff0db6 Mailbox 59 API calls 106157->106158 106159 fd37fb 106158->106159 106159->106033 106161 fd3eda 106160->106161 106162 fd3ef3 106160->106162 106164 fd8047 59 API calls 106161->106164 106163 fd7bcc 59 API calls 106162->106163 106165 fd3879 106163->106165 106164->106165 106166 ff2efd 106165->106166 106167 ff2f7e 106166->106167 106168 ff2f09 106166->106168 106222 ff2f90 60 API calls 3 library calls 106167->106222 106175 ff2f2e 106168->106175 106220 ff8b28 58 API calls __getptd_noexit 106168->106220 106171 ff2f8b 106171->106058 106172 ff2f15 106221 ff8db6 9 API calls __close 106172->106221 106174 ff2f20 106174->106058 106175->106058 106177 100f17c 106176->106177 106182 fd8ef7 106176->106182 106177->106182 106223 fd8bdb 59 API calls Mailbox 106177->106223 106179 fd8fff 106179->106086 106180 fd8ff8 106184 ff0db6 Mailbox 59 API calls 106180->106184 106181 fd9040 106183 fd9d3c 60 API calls 106181->106183 106182->106179 106182->106180 106182->106181 106183->106179 106184->106179 106186 fd4ee5 85 API calls 106185->106186 106187 10395ca 106186->106187 106188 1039734 96 API calls 106187->106188 106189 10395dc 106188->106189 106190 fd4f0b 74 API calls 106189->106190 106217 100d186 106189->106217 106191 10395f7 106190->106191 106192 fd4f0b 74 API calls 106191->106192 106193 1039607 106192->106193 106194 fd4f0b 74 API calls 106193->106194 106195 1039622 106194->106195 106196 fd4f0b 74 API calls 106195->106196 106197 103963d 106196->106197 106198 fd4ee5 85 API calls 106197->106198 106199 1039654 106198->106199 106200 ff571c __crtGetStringTypeA_stat 58 API calls 106199->106200 106201 103965b 106200->106201 106202 ff571c __crtGetStringTypeA_stat 58 API calls 106201->106202 106203 1039665 106202->106203 106204 fd4f0b 74 API calls 106203->106204 106205 1039679 106204->106205 106206 1039109 GetSystemTimeAsFileTime 106205->106206 106207 103968c 106206->106207 106208 10396a1 106207->106208 106209 10396b6 106207->106209 106212 ff2d55 _free 58 API calls 106208->106212 106210 103971b 106209->106210 106211 10396bc 106209->106211 106214 ff2d55 _free 58 API calls 106210->106214 106213 1038b06 116 API calls 106211->106213 106215 10396a7 106212->106215 106216 1039713 106213->106216 106214->106217 106218 ff2d55 _free 58 API calls 106215->106218 106219 ff2d55 _free 58 API calls 106216->106219 106217->106024 106217->106025 106218->106217 106219->106217 106220->106172 106221->106174 106222->106171 106223->106182 106225 ff079e __write_nolock 106224->106225 106226 ff079f GetLongPathNameW 106225->106226 106227 fd7bcc 59 API calls 106226->106227 106228 fd72bd 106227->106228 106229 fd700b 106228->106229 106230 fd7667 59 API calls 106229->106230 106231 fd701d 106230->106231 106232 fd4750 60 API calls 106231->106232 106233 fd7028 106232->106233 106234 100e885 106233->106234 106235 fd7033 106233->106235 106239 100e89f 106234->106239 106282 fd7908 61 API calls 106234->106282 106237 fd3f74 59 API calls 106235->106237 106238 fd703f 106237->106238 106276 fd34c2 106238->106276 106241 fd7052 Mailbox 106241->106102 106243 fd4ddd 136 API calls 106242->106243 106244 fd688f 106243->106244 106245 100e031 106244->106245 106246 fd4ddd 136 API calls 106244->106246 106247 103955b 122 API calls 106245->106247 106248 fd68a3 106246->106248 106249 100e046 106247->106249 106248->106245 106250 fd68ab 106248->106250 106251 100e067 106249->106251 106252 100e04a 106249->106252 106254 100e052 106250->106254 106255 fd68b7 106250->106255 106253 ff0db6 Mailbox 59 API calls 106251->106253 106256 fd4e4a 84 API calls 106252->106256 106275 100e0ac Mailbox 106253->106275 106376 10342f8 90 API calls _wprintf 106254->106376 106283 fd6a8c 106255->106283 106256->106254 106259 100e060 106259->106251 106261 100e260 106262 ff2d55 _free 58 API calls 106261->106262 106263 100e268 106262->106263 106264 fd4e4a 84 API calls 106263->106264 106269 100e271 106264->106269 106268 ff2d55 _free 58 API calls 106268->106269 106269->106268 106271 fd4e4a 84 API calls 106269->106271 106382 102f7a1 89 API calls 4 library calls 106269->106382 106271->106269 106272 fd7de1 59 API calls 106272->106275 106275->106261 106275->106269 106275->106272 106377 102f73d 59 API calls 2 library calls 106275->106377 106378 102f65e 61 API calls 2 library calls 106275->106378 106379 103737f 59 API calls Mailbox 106275->106379 106380 fd750f 59 API calls 2 library calls 106275->106380 106381 fd735d 59 API calls Mailbox 106275->106381 106277 fd34d4 106276->106277 106281 fd34f3 _memmove 106276->106281 106279 ff0db6 Mailbox 59 API calls 106277->106279 106278 ff0db6 Mailbox 59 API calls 106280 fd350a 106278->106280 106279->106281 106280->106241 106281->106278 106282->106234 106284 fd6ab5 106283->106284 106285 100e41e 106283->106285 106388 fd57a6 60 API calls Mailbox 106284->106388 106404 102f7a1 89 API calls 4 library calls 106285->106404 106288 100e431 106405 102f7a1 89 API calls 4 library calls 106288->106405 106289 fd6ad7 106389 fd57f6 67 API calls 106289->106389 106291 fd6aec 106291->106288 106293 fd6af4 106291->106293 106295 fd7667 59 API calls 106293->106295 106294 100e44d 106298 fd6b61 106294->106298 106296 fd6b00 106295->106296 106390 ff0957 60 API calls __write_nolock 106296->106390 106300 100e460 106298->106300 106301 fd6b6f 106298->106301 106299 fd6b0c 106302 fd7667 59 API calls 106299->106302 106303 fd5c6f CloseHandle 106300->106303 106304 fd7667 59 API calls 106301->106304 106305 fd6b18 106302->106305 106306 100e46c 106303->106306 106307 fd6b78 106304->106307 106308 fd4750 60 API calls 106305->106308 106309 fd4ddd 136 API calls 106306->106309 106310 fd7667 59 API calls 106307->106310 106311 fd6b26 106308->106311 106312 100e488 106309->106312 106313 fd6b81 106310->106313 106391 fd5850 ReadFile SetFilePointerEx 106311->106391 106316 100e4b1 106312->106316 106320 103955b 122 API calls 106312->106320 106314 fd459b 59 API calls 106313->106314 106317 fd6b98 106314->106317 106406 102f7a1 89 API calls 4 library calls 106316->106406 106321 fd7b2e 59 API calls 106317->106321 106319 fd6b52 106392 fd5aee SetFilePointerEx SetFilePointerEx 106319->106392 106324 100e4a4 106320->106324 106327 fd6ba9 SetCurrentDirectoryW 106321->106327 106322 100e4c8 106345 fd6d0c Mailbox 106322->106345 106325 100e4ac 106324->106325 106326 100e4cd 106324->106326 106328 fd4e4a 84 API calls 106325->106328 106329 fd4e4a 84 API calls 106326->106329 106332 fd6bbc Mailbox 106327->106332 106328->106316 106330 100e4d2 106329->106330 106331 ff0db6 Mailbox 59 API calls 106330->106331 106338 100e506 106331->106338 106334 ff0db6 Mailbox 59 API calls 106332->106334 106336 fd6bcf 106334->106336 106335 fd3bbb 106335->105968 106335->105992 106337 fd522e 59 API calls 106336->106337 106353 fd6bda Mailbox __wsetenvp 106337->106353 106407 fd750f 59 API calls 2 library calls 106338->106407 106340 fd6ce7 106400 fd5c6f 106340->106400 106341 100e740 106413 10372df 59 API calls Mailbox 106341->106413 106344 fd6cf3 SetCurrentDirectoryW 106344->106345 106383 fd57d4 106345->106383 106348 100e762 106414 104fbce 59 API calls 2 library calls 106348->106414 106351 100e76f 106354 ff2d55 _free 58 API calls 106351->106354 106352 100e54f Mailbox 106352->106341 106367 fd7de1 59 API calls 106352->106367 106371 100e792 106352->106371 106408 102f73d 59 API calls 2 library calls 106352->106408 106409 102f65e 61 API calls 2 library calls 106352->106409 106410 103737f 59 API calls Mailbox 106352->106410 106411 fd750f 59 API calls 2 library calls 106352->106411 106412 fd7213 59 API calls Mailbox 106352->106412 106353->106340 106360 100e7d1 106353->106360 106363 fd7de1 59 API calls 106353->106363 106364 100e7d9 106353->106364 106393 fd586d 67 API calls _wcscpy 106353->106393 106394 fd6f5d GetStringTypeW 106353->106394 106395 fd6ecc 60 API calls __wcsnicmp 106353->106395 106396 fd6faa GetStringTypeW __wsetenvp 106353->106396 106397 ff363d GetStringTypeW _iswctype 106353->106397 106398 fd68dc 165 API calls 3 library calls 106353->106398 106399 fd7213 59 API calls Mailbox 106353->106399 106354->106345 106358 100e7f2 106358->106340 106416 102f5f7 59 API calls 4 library calls 106360->106416 106363->106353 106417 102f7a1 89 API calls 4 library calls 106364->106417 106367->106352 106415 102f7a1 89 API calls 4 library calls 106371->106415 106373 100e7ab 106374 ff2d55 _free 58 API calls 106373->106374 106375 100e7be 106374->106375 106375->106345 106376->106259 106377->106275 106378->106275 106379->106275 106380->106275 106381->106275 106382->106269 106384 fd5c6f CloseHandle 106383->106384 106385 fd57dc Mailbox 106384->106385 106386 fd5c6f CloseHandle 106385->106386 106387 fd57eb 106386->106387 106387->106335 106388->106289 106389->106291 106390->106299 106391->106319 106392->106298 106393->106353 106394->106353 106395->106353 106396->106353 106397->106353 106398->106353 106399->106353 106401 fd5c79 106400->106401 106402 fd5c88 106400->106402 106401->106344 106402->106401 106403 fd5c8d CloseHandle 106402->106403 106403->106401 106404->106288 106405->106294 106406->106322 106407->106352 106408->106352 106409->106352 106410->106352 106411->106352 106412->106352 106413->106348 106414->106351 106415->106373 106416->106364 106417->106358 106419 fd6ea9 106418->106419 106420 fd6d95 106418->106420 106419->106108 106420->106419 106421 ff0db6 Mailbox 59 API calls 106420->106421 106423 fd6dbc 106421->106423 106422 ff0db6 Mailbox 59 API calls 106428 fd6e31 106422->106428 106423->106422 106424 fd6240 94 API calls 106424->106428 106428->106419 106428->106424 106431 fd735d 59 API calls Mailbox 106428->106431 106432 1026553 59 API calls Mailbox 106428->106432 106433 fd750f 59 API calls 2 library calls 106428->106433 106429->106110 106430->106112 106431->106428 106432->106428 106433->106428 106463 fd1066 106468 fdf76f 106463->106468 106465 fd106c 106466 ff2d40 __cinit 67 API calls 106465->106466 106467 fd1076 106466->106467 106469 fdf790 106468->106469 106501 feff03 106469->106501 106473 fdf7d7 106474 fd7667 59 API calls 106473->106474 106475 fdf7e1 106474->106475 106476 fd7667 59 API calls 106475->106476 106477 fdf7eb 106476->106477 106478 fd7667 59 API calls 106477->106478 106479 fdf7f5 106478->106479 106480 fd7667 59 API calls 106479->106480 106481 fdf833 106480->106481 106482 fd7667 59 API calls 106481->106482 106483 fdf8fe 106482->106483 106511 fe5f87 106483->106511 106487 fdf930 106488 fd7667 59 API calls 106487->106488 106489 fdf93a 106488->106489 106539 fefd9e 106489->106539 106491 fdf981 106492 fdf991 GetStdHandle 106491->106492 106493 fdf9dd 106492->106493 106494 10145ab 106492->106494 106495 fdf9e5 OleInitialize 106493->106495 106494->106493 106496 10145b4 106494->106496 106495->106465 106546 1036b38 64 API calls Mailbox 106496->106546 106498 10145bb 106547 1037207 CreateThread 106498->106547 106500 10145c7 CloseHandle 106500->106495 106548 feffdc 106501->106548 106504 feffdc 59 API calls 106505 feff45 106504->106505 106506 fd7667 59 API calls 106505->106506 106507 feff51 106506->106507 106508 fd7bcc 59 API calls 106507->106508 106509 fdf796 106508->106509 106510 ff0162 6 API calls 106509->106510 106510->106473 106512 fd7667 59 API calls 106511->106512 106513 fe5f97 106512->106513 106514 fd7667 59 API calls 106513->106514 106515 fe5f9f 106514->106515 106555 fe5a9d 106515->106555 106518 fe5a9d 59 API calls 106519 fe5faf 106518->106519 106520 fd7667 59 API calls 106519->106520 106521 fe5fba 106520->106521 106522 ff0db6 Mailbox 59 API calls 106521->106522 106523 fdf908 106522->106523 106524 fe60f9 106523->106524 106525 fe6107 106524->106525 106526 fd7667 59 API calls 106525->106526 106527 fe6112 106526->106527 106528 fd7667 59 API calls 106527->106528 106529 fe611d 106528->106529 106530 fd7667 59 API calls 106529->106530 106531 fe6128 106530->106531 106532 fd7667 59 API calls 106531->106532 106533 fe6133 106532->106533 106534 fe5a9d 59 API calls 106533->106534 106535 fe613e 106534->106535 106536 ff0db6 Mailbox 59 API calls 106535->106536 106537 fe6145 RegisterWindowMessageW 106536->106537 106537->106487 106540 fefdae 106539->106540 106541 102576f 106539->106541 106542 ff0db6 Mailbox 59 API calls 106540->106542 106558 1039ae7 60 API calls 106541->106558 106544 fefdb6 106542->106544 106544->106491 106545 102577a 106546->106498 106547->106500 106559 10371ed 65 API calls 106547->106559 106549 fd7667 59 API calls 106548->106549 106550 feffe7 106549->106550 106551 fd7667 59 API calls 106550->106551 106552 feffef 106551->106552 106553 fd7667 59 API calls 106552->106553 106554 feff3b 106553->106554 106554->106504 106556 fd7667 59 API calls 106555->106556 106557 fe5aa5 106556->106557 106557->106518 106558->106545 106560 fd1016 106565 fd4974 106560->106565 106563 ff2d40 __cinit 67 API calls 106564 fd1025 106563->106564 106566 ff0db6 Mailbox 59 API calls 106565->106566 106567 fd497c 106566->106567 106569 fd101b 106567->106569 106572 fd4936 106567->106572 106569->106563 106573 fd493f 106572->106573 106574 fd4951 106572->106574 106575 ff2d40 __cinit 67 API calls 106573->106575 106576 fd49a0 106574->106576 106575->106574 106577 fd7667 59 API calls 106576->106577 106578 fd49b8 GetVersionExW 106577->106578 106579 fd7bcc 59 API calls 106578->106579 106580 fd49fb 106579->106580 106581 fd7d2c 59 API calls 106580->106581 106588 fd4a28 106580->106588 106582 fd4a1c 106581->106582 106583 fd7726 59 API calls 106582->106583 106583->106588 106584 fd4a93 GetCurrentProcess IsWow64Process 106585 fd4aac 106584->106585 106586 fd4b2b GetSystemInfo 106585->106586 106587 fd4ac2 106585->106587 106591 fd4af8 106586->106591 106600 fd4b37 106587->106600 106588->106584 106589 100d864 106588->106589 106591->106569 106593 fd4b1f GetSystemInfo 106596 fd4ae9 106593->106596 106594 fd4ad4 106595 fd4b37 2 API calls 106594->106595 106597 fd4adc GetNativeSystemInfo 106595->106597 106596->106591 106598 fd4aef FreeLibrary 106596->106598 106597->106596 106598->106591 106601 fd4ad0 106600->106601 106602 fd4b40 LoadLibraryA 106600->106602 106601->106593 106601->106594 106602->106601 106603 fd4b51 GetProcAddress 106602->106603 106603->106601 106604 100fdfc 106636 fdab30 Mailbox _memmove 106604->106636 106605 fdb525 106664 1039e4a 89 API calls 4 library calls 106605->106664 106608 fd9c90 Mailbox 59 API calls 106608->106636 106611 1010055 106663 1039e4a 89 API calls 4 library calls 106611->106663 106612 ff0db6 59 API calls Mailbox 106628 fd9f37 Mailbox 106612->106628 106614 fdb475 106619 fd8047 59 API calls 106614->106619 106617 fd8047 59 API calls 106617->106628 106618 1010064 106625 fda057 106619->106625 106620 fdb47a 106620->106611 106632 10109e5 106620->106632 106624 fd7667 59 API calls 106624->106628 106626 1026e8f 59 API calls 106626->106628 106627 ff2d40 67 API calls __cinit 106627->106628 106628->106611 106628->106612 106628->106614 106628->106617 106628->106620 106628->106624 106628->106625 106628->106626 106628->106627 106630 10109d6 106628->106630 106633 fda55a 106628->106633 106655 fdc8c0 341 API calls 2 library calls 106628->106655 106656 fdb900 60 API calls Mailbox 106628->106656 106629 fd7de1 59 API calls 106629->106636 106668 1039e4a 89 API calls 4 library calls 106630->106668 106669 1039e4a 89 API calls 4 library calls 106632->106669 106667 1039e4a 89 API calls 4 library calls 106633->106667 106636->106605 106636->106608 106636->106625 106636->106628 106636->106629 106637 fd9ea0 341 API calls 106636->106637 106639 101086a 106636->106639 106641 1010878 106636->106641 106643 101085c 106636->106643 106644 fdb21c 106636->106644 106646 ff0db6 59 API calls Mailbox 106636->106646 106647 1026e8f 59 API calls 106636->106647 106650 fdb2b6 106636->106650 106652 104df23 106636->106652 106658 104c193 85 API calls 2 library calls 106636->106658 106659 104c2e0 96 API calls Mailbox 106636->106659 106660 1037956 59 API calls Mailbox 106636->106660 106661 104bc6b 341 API calls Mailbox 106636->106661 106662 102617e 59 API calls Mailbox 106636->106662 106637->106636 106640 fd9c90 Mailbox 59 API calls 106639->106640 106640->106643 106666 1039e4a 89 API calls 4 library calls 106641->106666 106643->106625 106665 102617e 59 API calls Mailbox 106643->106665 106645 fd9d3c 60 API calls 106644->106645 106648 fdb22d 106645->106648 106646->106636 106647->106636 106649 fd9d3c 60 API calls 106648->106649 106649->106650 106657 fdf6a3 341 API calls 106650->106657 106653 104cadd 130 API calls 106652->106653 106654 104df33 106653->106654 106654->106636 106655->106628 106656->106628 106657->106605 106658->106636 106659->106636 106660->106636 106661->106636 106662->106636 106663->106618 106664->106643 106665->106625 106666->106643 106667->106625 106668->106632 106669->106625 106670 fd3633 106671 fd366a 106670->106671 106672 fd3688 106671->106672 106673 fd36e7 106671->106673 106710 fd36e5 106671->106710 106677 fd374b PostQuitMessage 106672->106677 106678 fd3695 106672->106678 106675 fd36ed 106673->106675 106676 100d0cc 106673->106676 106674 fd36ca DefWindowProcW 106712 fd36d8 106674->106712 106679 fd3715 SetTimer RegisterWindowMessageW 106675->106679 106680 fd36f2 106675->106680 106725 fe1070 10 API calls Mailbox 106676->106725 106677->106712 106682 100d154 106678->106682 106683 fd36a0 106678->106683 106687 fd373e CreatePopupMenu 106679->106687 106679->106712 106684 fd36f9 KillTimer 106680->106684 106685 100d06f 106680->106685 106730 1032527 71 API calls _memset 106682->106730 106688 fd36a8 106683->106688 106689 fd3755 106683->106689 106722 fd443a Shell_NotifyIconW _memset 106684->106722 106691 100d074 106685->106691 106692 100d0a8 MoveWindow 106685->106692 106686 100d0f3 106726 fe1093 341 API calls Mailbox 106686->106726 106687->106712 106695 100d139 106688->106695 106696 fd36b3 106688->106696 106715 fd44a0 106689->106715 106698 100d097 SetFocus 106691->106698 106699 100d078 106691->106699 106692->106712 106695->106674 106729 1027c36 59 API calls Mailbox 106695->106729 106701 fd36be 106696->106701 106702 100d124 106696->106702 106698->106712 106699->106701 106704 100d081 106699->106704 106700 fd370c 106723 fd3114 DeleteObject DestroyWindow Mailbox 106700->106723 106701->106674 106727 fd443a Shell_NotifyIconW _memset 106701->106727 106728 1032d36 81 API calls _memset 106702->106728 106703 100d166 106703->106674 106703->106712 106724 fe1070 10 API calls Mailbox 106704->106724 106709 100d134 106709->106712 106710->106674 106713 100d118 106714 fd434a 68 API calls 106713->106714 106714->106710 106716 fd4539 106715->106716 106717 fd44b7 _memset 106715->106717 106716->106712 106718 fd407c 61 API calls 106717->106718 106720 fd44de 106718->106720 106719 fd4522 KillTimer SetTimer 106719->106716 106720->106719 106721 100d4ab Shell_NotifyIconW 106720->106721 106721->106719 106722->106700 106723->106712 106724->106712 106725->106686 106726->106701 106727->106713 106728->106709 106729->106710 106730->106703 106731 12e9270 106745 12e6e70 106731->106745 106733 12e92fa 106748 12e9160 106733->106748 106751 12ea340 GetPEB 106745->106751 106747 12e74fb 106747->106733 106749 12e9169 Sleep 106748->106749 106750 12e9177 106749->106750 106752 12ea36a 106751->106752 106752->106747

                Control-flow Graph

                APIs
                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FD3B68
                • IsDebuggerPresent.KERNEL32 ref: 00FD3B7A
                • GetFullPathNameW.KERNEL32(00007FFF,?,?,010952F8,010952E0,?,?), ref: 00FD3BEB
                  • Part of subcall function 00FD7BCC: _memmove.LIBCMT ref: 00FD7C06
                  • Part of subcall function 00FE092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00FD3C14,010952F8,?,?,?), ref: 00FE096E
                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FD3C6F
                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,01087770,00000010), ref: 0100D281
                • SetCurrentDirectoryW.KERNEL32(?,010952F8,?,?,?), ref: 0100D2B9
                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,01084260,010952F8,?,?,?), ref: 0100D33F
                • ShellExecuteW.SHELL32(00000000,?,?), ref: 0100D346
                  • Part of subcall function 00FD3A46: GetSysColorBrush.USER32(0000000F), ref: 00FD3A50
                  • Part of subcall function 00FD3A46: LoadCursorW.USER32(00000000,00007F00), ref: 00FD3A5F
                  • Part of subcall function 00FD3A46: LoadIconW.USER32(00000063), ref: 00FD3A76
                  • Part of subcall function 00FD3A46: LoadIconW.USER32(000000A4), ref: 00FD3A88
                  • Part of subcall function 00FD3A46: LoadIconW.USER32(000000A2), ref: 00FD3A9A
                  • Part of subcall function 00FD3A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00FD3AC0
                  • Part of subcall function 00FD3A46: RegisterClassExW.USER32(?), ref: 00FD3B16
                  • Part of subcall function 00FD39D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00FD3A03
                  • Part of subcall function 00FD39D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00FD3A24
                  • Part of subcall function 00FD39D5: ShowWindow.USER32(00000000,?,?), ref: 00FD3A38
                  • Part of subcall function 00FD39D5: ShowWindow.USER32(00000000,?,?), ref: 00FD3A41
                  • Part of subcall function 00FD434A: _memset.LIBCMT ref: 00FD4370
                  • Part of subcall function 00FD434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00FD4415
                Strings
                • runas, xrefs: 0100D33A
                • This is a third-party compiled AutoIt script., xrefs: 0100D279
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                • String ID: This is a third-party compiled AutoIt script.$runas
                • API String ID: 529118366-3287110873
                • Opcode ID: fe9b457c96c3065d57b02f828ae25605364e60ae63fcc8c531b267b5e04b4d5d
                • Instruction ID: 2085e7ba9787c862204fef01ba17a4c9b360e6d410670c21a825fce01e5ab35b
                • Opcode Fuzzy Hash: fe9b457c96c3065d57b02f828ae25605364e60ae63fcc8c531b267b5e04b4d5d
                • Instruction Fuzzy Hash: B7513930D08209AEDF22FBF5DC15AFE7BB6BB05310F084097F5D1A6241DA795605EB21

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 942 fd49a0-fd4a00 call fd7667 GetVersionExW call fd7bcc 947 fd4b0b-fd4b0d 942->947 948 fd4a06 942->948 950 100d767-100d773 947->950 949 fd4a09-fd4a0e 948->949 952 fd4a14 949->952 953 fd4b12-fd4b13 949->953 951 100d774-100d778 950->951 954 100d77a 951->954 955 100d77b-100d787 951->955 956 fd4a15-fd4a4c call fd7d2c call fd7726 952->956 953->956 954->955 955->951 957 100d789-100d78e 955->957 965 100d864-100d867 956->965 966 fd4a52-fd4a53 956->966 957->949 959 100d794-100d79b 957->959 959->950 961 100d79d 959->961 964 100d7a2-100d7a5 961->964 967 100d7ab-100d7c9 964->967 968 fd4a93-fd4aaa GetCurrentProcess IsWow64Process 964->968 969 100d880-100d884 965->969 970 100d869 965->970 966->964 971 fd4a59-fd4a64 966->971 967->968 972 100d7cf-100d7d5 967->972 978 fd4aac 968->978 979 fd4aaf-fd4ac0 968->979 976 100d886-100d88f 969->976 977 100d86f-100d878 969->977 973 100d86c 970->973 974 fd4a6a-fd4a6c 971->974 975 100d7ea-100d7f0 971->975 982 100d7d7-100d7da 972->982 983 100d7df-100d7e5 972->983 973->977 984 100d805-100d811 974->984 985 fd4a72-fd4a75 974->985 986 100d7f2-100d7f5 975->986 987 100d7fa-100d800 975->987 976->973 988 100d891-100d894 976->988 977->969 978->979 980 fd4b2b-fd4b35 GetSystemInfo 979->980 981 fd4ac2-fd4ad2 call fd4b37 979->981 994 fd4af8-fd4b08 980->994 999 fd4b1f-fd4b29 GetSystemInfo 981->999 1000 fd4ad4-fd4ae1 call fd4b37 981->1000 982->968 983->968 989 100d813-100d816 984->989 990 100d81b-100d821 984->990 992 100d831-100d834 985->992 993 fd4a7b-fd4a8a 985->993 986->968 987->968 988->977 989->968 990->968 992->968 996 100d83a-100d84f 992->996 997 100d826-100d82c 993->997 998 fd4a90 993->998 1001 100d851-100d854 996->1001 1002 100d859-100d85f 996->1002 997->968 998->968 1004 fd4ae9-fd4aed 999->1004 1007 fd4b18-fd4b1d 1000->1007 1008 fd4ae3-fd4ae7 GetNativeSystemInfo 1000->1008 1001->968 1002->968 1004->994 1006 fd4aef-fd4af2 FreeLibrary 1004->1006 1006->994 1007->1008 1008->1004
                APIs
                • GetVersionExW.KERNEL32(?), ref: 00FD49CD
                  • Part of subcall function 00FD7BCC: _memmove.LIBCMT ref: 00FD7C06
                • GetCurrentProcess.KERNEL32(?,0105FAEC,00000000,00000000,?), ref: 00FD4A9A
                • IsWow64Process.KERNEL32(00000000), ref: 00FD4AA1
                • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00FD4AE7
                • FreeLibrary.KERNEL32(00000000), ref: 00FD4AF2
                • GetSystemInfo.KERNEL32(00000000), ref: 00FD4B23
                • GetSystemInfo.KERNEL32(00000000), ref: 00FD4B2F
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                • String ID:
                • API String ID: 1986165174-0
                • Opcode ID: 88eeaefa3edb98365c3d96c584dbf3db4e2748c895bcfa1a76f79f65c64c25f9
                • Instruction ID: 18dbd64c3c0ad944c535d433cb5d67a7ffdbf6bd345fb8e89b7acd5b2da5d2e9
                • Opcode Fuzzy Hash: 88eeaefa3edb98365c3d96c584dbf3db4e2748c895bcfa1a76f79f65c64c25f9
                • Instruction Fuzzy Hash: 2391B7319897C1DFD732DBA885501AABFF6AF2A300F48499ED0CA93741D234F508D769

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1039 fd4e89-fd4ea1 CreateStreamOnHGlobal 1040 fd4ec1-fd4ec6 1039->1040 1041 fd4ea3-fd4eba FindResourceExW 1039->1041 1042 100d933-100d942 LoadResource 1041->1042 1043 fd4ec0 1041->1043 1042->1043 1044 100d948-100d956 SizeofResource 1042->1044 1043->1040 1044->1043 1045 100d95c-100d967 LockResource 1044->1045 1045->1043 1046 100d96d-100d98b 1045->1046 1046->1043
                APIs
                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00FD4D8E,?,?,00000000,00000000), ref: 00FD4E99
                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00FD4D8E,?,?,00000000,00000000), ref: 00FD4EB0
                • LoadResource.KERNEL32(?,00000000,?,?,00FD4D8E,?,?,00000000,00000000,?,?,?,?,?,?,00FD4E2F), ref: 0100D937
                • SizeofResource.KERNEL32(?,00000000,?,?,00FD4D8E,?,?,00000000,00000000,?,?,?,?,?,?,00FD4E2F), ref: 0100D94C
                • LockResource.KERNEL32(00FD4D8E,?,?,00FD4D8E,?,?,00000000,00000000,?,?,?,?,?,?,00FD4E2F,00000000), ref: 0100D95F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                • String ID: SCRIPT
                • API String ID: 3051347437-3967369404
                • Opcode ID: 6b54c1a02e4d68be087b9af47bf53fc6b04c274d260cf810d8d60155bb996a22
                • Instruction ID: 8332356c9bef3459f64b3ef6f1c6e4a228be947b84be4ed29df0c97b8b2d11ad
                • Opcode Fuzzy Hash: 6b54c1a02e4d68be087b9af47bf53fc6b04c274d260cf810d8d60155bb996a22
                • Instruction Fuzzy Hash: 0D11A0B5200301BFD7218BA5EC48F2B7BBAFBC5B51F24426DF445C6280DB76E8009761
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: BuffCharUpper
                • String ID:
                • API String ID: 3964851224-0
                • Opcode ID: e7596daf5779c6cdb9d7227847c5dc399c29f809b4d31195d8d9b06ea9d003d0
                • Instruction ID: d4ef04e444600d31430e827141073362f5d4344bec72871803f5d368b96d4529
                • Opcode Fuzzy Hash: e7596daf5779c6cdb9d7227847c5dc399c29f809b4d31195d8d9b06ea9d003d0
                • Instruction Fuzzy Hash: 14928171508381CFD720DF15C480B2AB7E1BF85314F14896DE98A9B362DBB9EC85DB92
                APIs
                • GetFileAttributesW.KERNELBASE(?,0100E398), ref: 0103446A
                • FindFirstFileW.KERNELBASE(?,?), ref: 0103447B
                • FindClose.KERNEL32(00000000), ref: 0103448B
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: FileFind$AttributesCloseFirst
                • String ID:
                • API String ID: 48322524-0
                • Opcode ID: f30c25717d1d5a2085d3f5ed017963f1d12342bb10c981a999029add2627063e
                • Instruction ID: dc6cb4684833e28dfced3612052178071a7ed13dedc1eaedb3afa5f8915472b8
                • Opcode Fuzzy Hash: f30c25717d1d5a2085d3f5ed017963f1d12342bb10c981a999029add2627063e
                • Instruction Fuzzy Hash: 77E0DF72810A026B9320AA38EC0D8EB779C9E45275F104766F9B5C20D0EFBD99008796
                Strings
                • Variable must be of type 'Object'., xrefs: 01013E62
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID: Variable must be of type 'Object'.
                • API String ID: 0-109567571
                • Opcode ID: 3921dbd2307a9156725f347a5c14be6dbb9b4258471650e80d74386e8b1809b1
                • Instruction ID: b948b917cc9ad034b5c71f5d1ee7a835e2491186ea4ffbc4f82e5c404dfbc5b8
                • Opcode Fuzzy Hash: 3921dbd2307a9156725f347a5c14be6dbb9b4258471650e80d74386e8b1809b1
                • Instruction Fuzzy Hash: BEA29B75E00205CBCB24EF58C490AAEB7B2FF58324F68805AD9469F355D739ED42EB90
                APIs
                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FE0A5B
                • timeGetTime.WINMM ref: 00FE0D16
                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FE0E53
                • Sleep.KERNEL32(0000000A), ref: 00FE0E61
                • LockWindowUpdate.USER32(00000000,?,?), ref: 00FE0EFA
                • DestroyWindow.USER32 ref: 00FE0F06
                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FE0F20
                • Sleep.KERNEL32(0000000A,?,?), ref: 01014E83
                • TranslateMessage.USER32(?), ref: 01015C60
                • DispatchMessageW.USER32(?), ref: 01015C6E
                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 01015C82
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                • API String ID: 4212290369-3242690629
                • Opcode ID: 02db7a4146af08cd2f088d170f614f6bf09025bf35ed722f21dc3d3734d488ea
                • Instruction ID: 1ae15566a6c1ea9762429854e80890b35ec507f061f322d0fbd0c60251f75ae5
                • Opcode Fuzzy Hash: 02db7a4146af08cd2f088d170f614f6bf09025bf35ed722f21dc3d3734d488ea
                • Instruction Fuzzy Hash: 0CB2D170608381DFD724DF24C894BAEBBE5BF85304F14495DE5C99B291CBB9E884DB82

                Control-flow Graph

                APIs
                  • Part of subcall function 01038F5F: __time64.LIBCMT ref: 01038F69
                  • Part of subcall function 00FD4EE5: _fseek.LIBCMT ref: 00FD4EFD
                • __wsplitpath.LIBCMT ref: 01039234
                  • Part of subcall function 00FF40FB: __wsplitpath_helper.LIBCMT ref: 00FF413B
                • _wcscpy.LIBCMT ref: 01039247
                • _wcscat.LIBCMT ref: 0103925A
                • __wsplitpath.LIBCMT ref: 0103927F
                • _wcscat.LIBCMT ref: 01039295
                • _wcscat.LIBCMT ref: 010392A8
                  • Part of subcall function 01038FA5: _memmove.LIBCMT ref: 01038FDE
                  • Part of subcall function 01038FA5: _memmove.LIBCMT ref: 01038FED
                • _wcscmp.LIBCMT ref: 010391EF
                  • Part of subcall function 01039734: _wcscmp.LIBCMT ref: 01039824
                  • Part of subcall function 01039734: _wcscmp.LIBCMT ref: 01039837
                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 01039452
                • _wcsncpy.LIBCMT ref: 010394C5
                • DeleteFileW.KERNEL32(?,?), ref: 010394FB
                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 01039511
                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 01039522
                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 01039534
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                • String ID:
                • API String ID: 1500180987-0
                • Opcode ID: 2b3230e5999b619518ca4b45e7d9272fdd62434d7f28f5de93445af9863f3222
                • Instruction ID: aa643aa1bb2c14bdb31f61d6b6893dc32d034dba78d89291f2a4865899266365
                • Opcode Fuzzy Hash: 2b3230e5999b619518ca4b45e7d9272fdd62434d7f28f5de93445af9863f3222
                • Instruction Fuzzy Hash: C7C15CB1D00219ABDF21DF94CC81EDEB7BDEF85304F0040A6E649E7251DB749A849F61

                Control-flow Graph

                APIs
                • GetSysColorBrush.USER32(0000000F), ref: 00FD3074
                • RegisterClassExW.USER32(00000030), ref: 00FD309E
                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FD30AF
                • InitCommonControlsEx.COMCTL32(?), ref: 00FD30CC
                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00FD30DC
                • LoadIconW.USER32(000000A9), ref: 00FD30F2
                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00FD3101
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                • API String ID: 2914291525-1005189915
                • Opcode ID: adb9a834dd50ac7d0085b2eb5120d451db634935ebed43fef0a79379170e7a2d
                • Instruction ID: adbee94d18123be68466955790aa220218cdc00e8aaee33b4d032ea9b8474820
                • Opcode Fuzzy Hash: adb9a834dd50ac7d0085b2eb5120d451db634935ebed43fef0a79379170e7a2d
                • Instruction Fuzzy Hash: 2C3129B184130AAFDB618FA5D859ADEBBF4FB09310F14415AF580EA294D3BE0545CF51

                Control-flow Graph

                APIs
                • GetSysColorBrush.USER32(0000000F), ref: 00FD3074
                • RegisterClassExW.USER32(00000030), ref: 00FD309E
                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FD30AF
                • InitCommonControlsEx.COMCTL32(?), ref: 00FD30CC
                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00FD30DC
                • LoadIconW.USER32(000000A9), ref: 00FD30F2
                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00FD3101
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                • API String ID: 2914291525-1005189915
                • Opcode ID: ecf1f39854125277f1cba3586cabc86e1ad7185b73ba197e36e5d116f5c8271c
                • Instruction ID: 10b8eb8acc8ca9caaeb9ef188132feacdf9591571d31db7c881b075746acef0a
                • Opcode Fuzzy Hash: ecf1f39854125277f1cba3586cabc86e1ad7185b73ba197e36e5d116f5c8271c
                • Instruction Fuzzy Hash: CC21F2B1901309AFDB21DFA5E888BDEBBF4FB08700F04411AF990EA284D7BA4544CF91

                Control-flow Graph

                APIs
                  • Part of subcall function 00FD4706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,010952F8,?,00FD37AE,?), ref: 00FD4724
                  • Part of subcall function 00FF050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00FD7165), ref: 00FF052D
                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00FD71A8
                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0100E8C8
                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0100E909
                • RegCloseKey.ADVAPI32(?), ref: 0100E947
                • _wcscat.LIBCMT ref: 0100E9A0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                • API String ID: 2673923337-2727554177
                • Opcode ID: 5171f6600d6263eb68ae316f1921ed09e0dd1f11288d7a8927c8a87891ebd6a2
                • Instruction ID: 6cd8318e04387cb538c39430f91f7e35840444153a8ae3f224258e18b0ab982c
                • Opcode Fuzzy Hash: 5171f6600d6263eb68ae316f1921ed09e0dd1f11288d7a8927c8a87891ebd6a2
                • Instruction Fuzzy Hash: 4F71BE714083019ED314EF69EC618AFBBE8FF84350F44096EF5C5972A0EB7A9948DB52

                Control-flow Graph

                APIs
                • GetSysColorBrush.USER32(0000000F), ref: 00FD3A50
                • LoadCursorW.USER32(00000000,00007F00), ref: 00FD3A5F
                • LoadIconW.USER32(00000063), ref: 00FD3A76
                • LoadIconW.USER32(000000A4), ref: 00FD3A88
                • LoadIconW.USER32(000000A2), ref: 00FD3A9A
                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00FD3AC0
                • RegisterClassExW.USER32(?), ref: 00FD3B16
                  • Part of subcall function 00FD3041: GetSysColorBrush.USER32(0000000F), ref: 00FD3074
                  • Part of subcall function 00FD3041: RegisterClassExW.USER32(00000030), ref: 00FD309E
                  • Part of subcall function 00FD3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FD30AF
                  • Part of subcall function 00FD3041: InitCommonControlsEx.COMCTL32(?), ref: 00FD30CC
                  • Part of subcall function 00FD3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00FD30DC
                  • Part of subcall function 00FD3041: LoadIconW.USER32(000000A9), ref: 00FD30F2
                  • Part of subcall function 00FD3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00FD3101
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                • String ID: #$0$AutoIt v3
                • API String ID: 423443420-4155596026
                • Opcode ID: 9eb80fa1da52ce6de9ae5d536c52a551254c9960e326981edcce62548b55ffa3
                • Instruction ID: 22bcbe252727479a2c12996d996a1519d05a1cf344d441912e16720444f252bf
                • Opcode Fuzzy Hash: 9eb80fa1da52ce6de9ae5d536c52a551254c9960e326981edcce62548b55ffa3
                • Instruction Fuzzy Hash: E6216870D00308AFEB22DFA5EC19B9E7BB1FB09711F00019AF680A6295D3BE56409F90

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 767 fd3633-fd3681 769 fd36e1-fd36e3 767->769 770 fd3683-fd3686 767->770 769->770 771 fd36e5 769->771 772 fd3688-fd368f 770->772 773 fd36e7 770->773 774 fd36ca-fd36d2 DefWindowProcW 771->774 777 fd374b-fd3753 PostQuitMessage 772->777 778 fd3695-fd369a 772->778 775 fd36ed-fd36f0 773->775 776 100d0cc-100d0fa call fe1070 call fe1093 773->776 779 fd36d8-fd36de 774->779 780 fd3715-fd373c SetTimer RegisterWindowMessageW 775->780 781 fd36f2-fd36f3 775->781 814 100d0ff-100d106 776->814 785 fd3711-fd3713 777->785 783 100d154-100d168 call 1032527 778->783 784 fd36a0-fd36a2 778->784 780->785 789 fd373e-fd3749 CreatePopupMenu 780->789 786 fd36f9-fd370c KillTimer call fd443a call fd3114 781->786 787 100d06f-100d072 781->787 783->785 809 100d16e 783->809 790 fd36a8-fd36ad 784->790 791 fd3755-fd375f call fd44a0 784->791 785->779 786->785 793 100d074-100d076 787->793 794 100d0a8-100d0c7 MoveWindow 787->794 789->785 797 100d139-100d140 790->797 798 fd36b3-fd36b8 790->798 801 fd3764 791->801 802 100d097-100d0a3 SetFocus 793->802 803 100d078-100d07b 793->803 794->785 797->774 805 100d146-100d14f call 1027c36 797->805 807 fd36be-fd36c4 798->807 808 100d124-100d134 call 1032d36 798->808 801->785 802->785 803->807 810 100d081-100d092 call fe1070 803->810 805->774 807->774 807->814 808->785 809->774 810->785 814->774 815 100d10c-100d11f call fd443a call fd434a 814->815 815->774
                APIs
                • DefWindowProcW.USER32(?,?,?,?), ref: 00FD36D2
                • KillTimer.USER32(?,00000001), ref: 00FD36FC
                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00FD371F
                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FD372A
                • CreatePopupMenu.USER32 ref: 00FD373E
                • PostQuitMessage.USER32(00000000), ref: 00FD374D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                • String ID: TaskbarCreated
                • API String ID: 129472671-2362178303
                • Opcode ID: e574ba55c27e2538a90d767303c538338d26a911d25721b120cd1baaff0f172d
                • Instruction ID: 215d76d17c7acd69c776c18bcc1fd7f7384f6d4696dc200abdbcae627cb625c2
                • Opcode Fuzzy Hash: e574ba55c27e2538a90d767303c538338d26a911d25721b120cd1baaff0f172d
                • Instruction Fuzzy Hash: 68411A73504506BBEB21AFA9DC19F7A3B96FB01310F180117F781963D5CA7A9A40B763

                Control-flow Graph

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                • API String ID: 1825951767-3513169116
                • Opcode ID: 4e28795194fb5f93ebe0a915b4bfde7ab7eddd38bc9ebaf39a9a17b5915dd5b7
                • Instruction ID: 16e171579446a9648f85f7fdd5ea1bb0ac2c8d0e4b3d1f40a084d66fab06581d
                • Opcode Fuzzy Hash: 4e28795194fb5f93ebe0a915b4bfde7ab7eddd38bc9ebaf39a9a17b5915dd5b7
                • Instruction Fuzzy Hash: CBA18E7290021D9ADF05EBE4DC51AEEB77ABF15300F48001BF551B7291EF789A08EB61

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1009 12e7790-12e77e2 call 12e7690 CreateFileW 1012 12e77eb-12e77f8 1009->1012 1013 12e77e4-12e77e6 1009->1013 1016 12e77fa-12e7806 1012->1016 1017 12e780b-12e7822 VirtualAlloc 1012->1017 1014 12e7944-12e7948 1013->1014 1016->1014 1018 12e782b-12e7851 CreateFileW 1017->1018 1019 12e7824-12e7826 1017->1019 1021 12e7875-12e788f ReadFile 1018->1021 1022 12e7853-12e7870 1018->1022 1019->1014 1023 12e78b3-12e78b7 1021->1023 1024 12e7891-12e78ae 1021->1024 1022->1014 1025 12e78d8-12e78ef WriteFile 1023->1025 1026 12e78b9-12e78d6 1023->1026 1024->1014 1029 12e791a-12e793f CloseHandle VirtualFree 1025->1029 1030 12e78f1-12e7918 1025->1030 1026->1014 1029->1014 1030->1014
                APIs
                • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 012E77D5
                Memory Dump Source
                • Source File: 00000000.00000002.2155444950.00000000012E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 012E6000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_12e6000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CreateFile
                • String ID:
                • API String ID: 823142352-0
                • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                • Instruction ID: a89342ca591de0da9fea62f5d414ccda6382169135082d47112e156a933987c7
                • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                • Instruction Fuzzy Hash: FD512C75A20209FBEF20DFA4CC49FEE77B9AF48710F508554F60AEA180DA749645CBA0

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1049 fd39d5-fd3a45 CreateWindowExW * 2 ShowWindow * 2
                APIs
                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00FD3A03
                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00FD3A24
                • ShowWindow.USER32(00000000,?,?), ref: 00FD3A38
                • ShowWindow.USER32(00000000,?,?), ref: 00FD3A41
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$CreateShow
                • String ID: AutoIt v3$edit
                • API String ID: 1584632944-3779509399
                • Opcode ID: c1e0d34e2e3e843772a4b0220868379cc416c52813169784af84daf0acb305ae
                • Instruction ID: 51321c616cf9d3810b4b106fee73c371097a5760ae665530d0f76bc7e8c81661
                • Opcode Fuzzy Hash: c1e0d34e2e3e843772a4b0220868379cc416c52813169784af84daf0acb305ae
                • Instruction Fuzzy Hash: A8F03A705002947EEB325623AC18E2B2E7DF7CBF50B00005EB940E2194C26A1800CBB0

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1050 fd407c-fd4092 1051 fd416f-fd4173 1050->1051 1052 fd4098-fd40ad call fd7a16 1050->1052 1055 100d3c8-100d3d7 LoadStringW 1052->1055 1056 fd40b3-fd40d3 call fd7bcc 1052->1056 1059 100d3e2-100d3fa call fd7b2e call fd6fe3 1055->1059 1056->1059 1060 fd40d9-fd40dd 1056->1060 1069 fd40ed-fd416a call ff2de0 call fd454e call ff2dbc Shell_NotifyIconW call fd5904 1059->1069 1072 100d400-100d41e call fd7cab call fd6fe3 call fd7cab 1059->1072 1062 fd4174-fd417d call fd8047 1060->1062 1063 fd40e3-fd40e8 call fd7b2e 1060->1063 1062->1069 1063->1069 1069->1051 1072->1069
                APIs
                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0100D3D7
                  • Part of subcall function 00FD7BCC: _memmove.LIBCMT ref: 00FD7C06
                • _memset.LIBCMT ref: 00FD40FC
                • _wcscpy.LIBCMT ref: 00FD4150
                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FD4160
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                • String ID: Line:
                • API String ID: 3942752672-1585850449
                • Opcode ID: fdc04d45c18fb50b66556825011d5986670cc9d9ba769f3ff7f7709ece99e5fe
                • Instruction ID: 58226cc73921883e485d19b397d9faa0a7a386fc1273ae0e478b780d7fca27a0
                • Opcode Fuzzy Hash: fdc04d45c18fb50b66556825011d5986670cc9d9ba769f3ff7f7709ece99e5fe
                • Instruction Fuzzy Hash: 2C31D071008304AFD732EB60DC49BEB77E9AF44310F18451FF6C596291EB79A648D792

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1085 ff541d-ff5436 1086 ff5438-ff543d 1085->1086 1087 ff5453 1085->1087 1086->1087 1088 ff543f-ff5441 1086->1088 1089 ff5455-ff545b 1087->1089 1090 ff545c-ff5461 1088->1090 1091 ff5443-ff5448 call ff8b28 1088->1091 1093 ff546f-ff5473 1090->1093 1094 ff5463-ff546d 1090->1094 1103 ff544e call ff8db6 1091->1103 1097 ff5475-ff5480 call ff2de0 1093->1097 1098 ff5483-ff5485 1093->1098 1094->1093 1096 ff5493-ff54a2 1094->1096 1101 ff54a9 1096->1101 1102 ff54a4-ff54a7 1096->1102 1097->1098 1098->1091 1100 ff5487-ff5491 1098->1100 1100->1091 1100->1096 1105 ff54ae-ff54b3 1101->1105 1102->1105 1103->1087 1107 ff559c-ff559f 1105->1107 1108 ff54b9-ff54c0 1105->1108 1107->1089 1109 ff54c2-ff54ca 1108->1109 1110 ff5501-ff5503 1108->1110 1109->1110 1113 ff54cc 1109->1113 1111 ff556d-ff556e call 1000ba7 1110->1111 1112 ff5505-ff5507 1110->1112 1120 ff5573-ff5577 1111->1120 1115 ff552b-ff5536 1112->1115 1116 ff5509-ff5511 1112->1116 1117 ff55ca 1113->1117 1118 ff54d2-ff54d4 1113->1118 1123 ff553a-ff553d 1115->1123 1124 ff5538 1115->1124 1121 ff5513-ff551f 1116->1121 1122 ff5521-ff5525 1116->1122 1119 ff55ce-ff55d7 1117->1119 1125 ff54db-ff54e0 1118->1125 1126 ff54d6-ff54d8 1118->1126 1119->1089 1120->1119 1127 ff5579-ff557e 1120->1127 1128 ff5527-ff5529 1121->1128 1122->1128 1129 ff553f-ff554b call ff46e6 call 1000e5b 1123->1129 1130 ff55a4-ff55a8 1123->1130 1124->1123 1125->1130 1131 ff54e6-ff54ff call 1000cc8 1125->1131 1126->1125 1127->1130 1132 ff5580-ff5591 1127->1132 1128->1123 1146 ff5550-ff5555 1129->1146 1133 ff55ba-ff55c5 call ff8b28 1130->1133 1134 ff55aa-ff55b7 call ff2de0 1130->1134 1142 ff5562-ff556b 1131->1142 1138 ff5594-ff5596 1132->1138 1133->1103 1134->1133 1138->1107 1138->1108 1142->1138 1147 ff55dc-ff55e0 1146->1147 1148 ff555b-ff555e 1146->1148 1147->1119 1148->1117 1149 ff5560 1148->1149 1149->1142
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                • String ID:
                • API String ID: 1559183368-0
                • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                • Instruction ID: 8e3c53bc85051513789cc705c6555c96c264506bc80d1104c20213b8254d779e
                • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                • Instruction Fuzzy Hash: D151A671E00B0D9BDB24CEA9DC4067E77A2AF40B35F2C8629FB25962E0D7709D51AB40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1150 fd686a-fd6891 call fd4ddd 1153 100e031-100e041 call 103955b 1150->1153 1154 fd6897-fd68a5 call fd4ddd 1150->1154 1158 100e046-100e048 1153->1158 1154->1153 1159 fd68ab-fd68b1 1154->1159 1160 100e067-100e0af call ff0db6 1158->1160 1161 100e04a-100e04d call fd4e4a 1158->1161 1163 100e052-100e061 call 10342f8 1159->1163 1164 fd68b7-fd68d9 call fd6a8c 1159->1164 1170 100e0b1-100e0bb 1160->1170 1171 100e0d4 1160->1171 1161->1163 1163->1160 1173 100e0cf-100e0d0 1170->1173 1174 100e0d6-100e0e9 1171->1174 1175 100e0d2 1173->1175 1176 100e0bd-100e0cc 1173->1176 1177 100e260-100e271 call ff2d55 call fd4e4a 1174->1177 1178 100e0ef 1174->1178 1175->1174 1176->1173 1188 100e273-100e283 call fd7616 call fd5d9b 1177->1188 1180 100e0f6-100e0f9 call fd7480 1178->1180 1184 100e0fe-100e120 call fd5db2 call 10373e9 1180->1184 1193 100e122-100e12f 1184->1193 1194 100e134-100e13e call 10373d3 1184->1194 1201 100e288-100e2b8 call 102f7a1 call ff0e2c call ff2d55 call fd4e4a 1188->1201 1196 100e227-100e237 call fd750f 1193->1196 1203 100e140-100e153 1194->1203 1204 100e158-100e162 call 10373bd 1194->1204 1196->1184 1206 100e23d-100e25a call fd735d 1196->1206 1201->1188 1203->1196 1213 100e164-100e171 1204->1213 1214 100e176-100e180 call fd5e2a 1204->1214 1206->1177 1206->1180 1213->1196 1214->1196 1220 100e186-100e19e call 102f73d 1214->1220 1225 100e1a0-100e1bf call fd7de1 call fd5904 1220->1225 1226 100e1c1-100e1c4 1220->1226 1250 100e1e2-100e1f0 call fd5db2 1225->1250 1228 100e1f2-100e1f5 1226->1228 1229 100e1c6-100e1e1 call fd7de1 call fd6839 call fd5904 1226->1229 1231 100e215-100e218 call 103737f 1228->1231 1232 100e1f7-100e200 call 102f65e 1228->1232 1229->1250 1239 100e21d-100e226 call ff0e2c 1231->1239 1232->1201 1242 100e206-100e210 call ff0e2c 1232->1242 1239->1196 1242->1184 1250->1239
                APIs
                  • Part of subcall function 00FD4DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,010952F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00FD4E0F
                • _free.LIBCMT ref: 0100E263
                • _free.LIBCMT ref: 0100E2AA
                  • Part of subcall function 00FD6A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00FD6BAD
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _free$CurrentDirectoryLibraryLoad
                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                • API String ID: 2861923089-1757145024
                • Opcode ID: 981842c2d3f63522b931710044201eb2a296aae46daa3af8c13d23d05d00b744
                • Instruction ID: f5b60ee55ce9d81ac3bb4dafec20a87d34e89a32f0fb1470c438ea02d8aa6765
                • Opcode Fuzzy Hash: 981842c2d3f63522b931710044201eb2a296aae46daa3af8c13d23d05d00b744
                • Instruction Fuzzy Hash: 92918D7190021AAFDF05EFA8CC819EEB7B5FF14310F04486AF995BB2A1DB34A945DB50
                APIs
                  • Part of subcall function 012E9160: Sleep.KERNELBASE(000001F4), ref: 012E9171
                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 012E9366
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155444950.00000000012E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 012E6000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_12e6000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CreateFileSleep
                • String ID: 29KPJ0K4BQAV
                • API String ID: 2694422964-3537987430
                • Opcode ID: 2f4b51939fc2c564ce52be77de12b5f15ae723a43aed4118bb9f557739bfb966
                • Instruction ID: b083c840b651ced00341f4da51ed5159ecf09cb27b1f61bd5354af6d3f80c996
                • Opcode Fuzzy Hash: 2f4b51939fc2c564ce52be77de12b5f15ae723a43aed4118bb9f557739bfb966
                • Instruction Fuzzy Hash: 0B51C631D14209DBEF10DBA4C819BEFBBB9AF04304F404199E609BB2C0D7B55B85CBA5
                APIs
                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00FD35A1,SwapMouseButtons,00000004,?), ref: 00FD35D4
                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00FD35A1,SwapMouseButtons,00000004,?,?,?,?,00FD2754), ref: 00FD35F5
                • RegCloseKey.KERNELBASE(00000000,?,?,00FD35A1,SwapMouseButtons,00000004,?,?,?,?,00FD2754), ref: 00FD3617
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CloseOpenQueryValue
                • String ID: Control Panel\Mouse
                • API String ID: 3677997916-824357125
                • Opcode ID: e204a8822caac2cba36687617491987ce2c95d173a23ab34989bb7a94dc0e3a4
                • Instruction ID: c5671a5a6fd2407c7fa9194cd7592a22db1f0d95654a2c01ca5c7f8475d5316e
                • Opcode Fuzzy Hash: e204a8822caac2cba36687617491987ce2c95d173a23ab34989bb7a94dc0e3a4
                • Instruction Fuzzy Hash: C9114876910208FFDB208F64D844EAFB7B9EF04750F04546AF905D7300D271DE40A761
                APIs
                  • Part of subcall function 00FD4EE5: _fseek.LIBCMT ref: 00FD4EFD
                  • Part of subcall function 01039734: _wcscmp.LIBCMT ref: 01039824
                  • Part of subcall function 01039734: _wcscmp.LIBCMT ref: 01039837
                • _free.LIBCMT ref: 010396A2
                • _free.LIBCMT ref: 010396A9
                • _free.LIBCMT ref: 01039714
                  • Part of subcall function 00FF2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00FF9A24), ref: 00FF2D69
                  • Part of subcall function 00FF2D55: GetLastError.KERNEL32(00000000,?,00FF9A24), ref: 00FF2D7B
                • _free.LIBCMT ref: 0103971C
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                • String ID:
                • API String ID: 1552873950-0
                • Opcode ID: 50af52b8f22919c11c7515362fb071ee60fc7e1c9e9e4129b0e36dbf2dd802cb
                • Instruction ID: 4afedd58cf00ce7913c65af5796af4e147a2fb07d4db1add72a70585c1c3aa44
                • Opcode Fuzzy Hash: 50af52b8f22919c11c7515362fb071ee60fc7e1c9e9e4129b0e36dbf2dd802cb
                • Instruction Fuzzy Hash: A1515EB1D04218ABDF259F64CC81AAEBBB9FF88304F04449EF649A3351DB755A80DF58
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                • String ID:
                • API String ID: 2782032738-0
                • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                • Instruction ID: 84a10a5e1515a7a4a11fd636d2239fc07ef6499fbe990527bb19e031e6685ad0
                • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                • Instruction Fuzzy Hash: 1941B576E0074E9BDB189E69C8809BF7BA5AF423B0B24813DEA15C7670D774ED41EB40
                APIs
                • _memset.LIBCMT ref: 00FD44CF
                  • Part of subcall function 00FD407C: _memset.LIBCMT ref: 00FD40FC
                  • Part of subcall function 00FD407C: _wcscpy.LIBCMT ref: 00FD4150
                  • Part of subcall function 00FD407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FD4160
                • KillTimer.USER32(?,00000001,?,?), ref: 00FD4524
                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00FD4533
                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0100D4B9
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                • String ID:
                • API String ID: 1378193009-0
                • Opcode ID: 72962d060c19a7a73badee6870a235d01b2561727c1a64f9475da25041d9d1a3
                • Instruction ID: 3b587ea71b847c1476df53a952fada8ab6a8d69e62518f0e0520ee03be0fb715
                • Opcode Fuzzy Hash: 72962d060c19a7a73badee6870a235d01b2561727c1a64f9475da25041d9d1a3
                • Instruction Fuzzy Hash: 4021F8709043849FF7739BA49855BEBBBECAF01314F08008EE7CE56281C7792984DB51
                APIs
                • _memset.LIBCMT ref: 0100EA39
                • GetOpenFileNameW.COMDLG32(?), ref: 0100EA83
                  • Part of subcall function 00FD4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FD4743,?,?,00FD37AE,?), ref: 00FD4770
                  • Part of subcall function 00FF0791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FF07B0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Name$Path$FileFullLongOpen_memset
                • String ID: X
                • API String ID: 3777226403-3081909835
                • Opcode ID: e54368b19268b78ff23ff5a072890282e63380d13d9fb24b646c4c69a9157f67
                • Instruction ID: 689066bcfb18092f9f17283d6c478ff1da33bb03ed297b7c20d8e4afa59cc38e
                • Opcode Fuzzy Hash: e54368b19268b78ff23ff5a072890282e63380d13d9fb24b646c4c69a9157f67
                • Instruction Fuzzy Hash: 7F21D831A042489BDB52EF94CC45BEE7BF9AF49310F04805BF548BB381DBB855899FA1
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __fread_nolock_memmove
                • String ID: EA06
                • API String ID: 1988441806-3962188686
                • Opcode ID: 1b5539ece4b80f37105524d272c6181daa3fd00629bd1254ff2193e0ddea3ef4
                • Instruction ID: 28c219dacfa6668c8a282566e904a5e9b12f5bf21998ddc0dd9a3335738ba6c0
                • Opcode Fuzzy Hash: 1b5539ece4b80f37105524d272c6181daa3fd00629bd1254ff2193e0ddea3ef4
                • Instruction Fuzzy Hash: 3001F9718042187EDB18DAA8CC5AEFE7BFCDF11701F00419FF692D2181E478E6048760
                APIs
                • CreateProcessW.KERNELBASE(?,00000000), ref: 012E7EB5
                • ExitProcess.KERNEL32(00000000), ref: 012E7ED4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155444950.00000000012E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 012E6000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_12e6000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Process$CreateExit
                • String ID: D
                • API String ID: 126409537-2746444292
                • Opcode ID: 5eb2aae7a9647d9e2c45f82c1b7c95c0f5ecba5966e3f1c76f424d9cb9e516ac
                • Instruction ID: ff3fd1069b79757de200847b5482f1e6464b8d98be73c2d551bbf53add065a0d
                • Opcode Fuzzy Hash: 5eb2aae7a9647d9e2c45f82c1b7c95c0f5ecba5966e3f1c76f424d9cb9e516ac
                • Instruction Fuzzy Hash: AAF03CB551024DABDB20DFE0CC49FEE77BCBF04705F448509BB0A9A180DA7496088B61
                APIs
                • GetTempPathW.KERNEL32(00000104,?), ref: 010398F8
                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0103990F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Temp$FileNamePath
                • String ID: aut
                • API String ID: 3285503233-3010740371
                • Opcode ID: 5291de6213422bd7cc2a3526edc12be37785e9b9dbf174d48dc6235ebf2146e2
                • Instruction ID: 3ed883f082eb4318f2e8d3ad0da3ef950b95a87ddecc0c87d8315006a6f0b1d4
                • Opcode Fuzzy Hash: 5291de6213422bd7cc2a3526edc12be37785e9b9dbf174d48dc6235ebf2146e2
                • Instruction Fuzzy Hash: A5D05B7554030DABDB60AA90DC0DF97773CD704700F0042A1BAD495051D97555548B91
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a50416cec7d0993ed3e26a4449b0371402967b0dc2f08114517266a6df77736d
                • Instruction ID: 1e2327187577d2d8493fd558535acb842e1c41e7bb2694bb2c93463619a768a8
                • Opcode Fuzzy Hash: a50416cec7d0993ed3e26a4449b0371402967b0dc2f08114517266a6df77736d
                • Instruction Fuzzy Hash: D1F146B06083419FDB14DF28C980A6ABBE5FF88314F44896EF8999B351D774E945CF82
                APIs
                  • Part of subcall function 00FF0162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FF0193
                  • Part of subcall function 00FF0162: MapVirtualKeyW.USER32(00000010,00000000), ref: 00FF019B
                  • Part of subcall function 00FF0162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FF01A6
                  • Part of subcall function 00FF0162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FF01B1
                  • Part of subcall function 00FF0162: MapVirtualKeyW.USER32(00000011,00000000), ref: 00FF01B9
                  • Part of subcall function 00FF0162: MapVirtualKeyW.USER32(00000012,00000000), ref: 00FF01C1
                  • Part of subcall function 00FE60F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00FDF930), ref: 00FE6154
                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00FDF9CD
                • OleInitialize.OLE32(00000000), ref: 00FDFA4A
                • CloseHandle.KERNEL32(00000000), ref: 010145C8
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                • String ID:
                • API String ID: 1986988660-0
                • Opcode ID: 995e0edca6da6d27cfebeb7bd8367e3d5fe10e171bd3a801c63be80998465b08
                • Instruction ID: d041e13584f2149031e17c0b60f9426308e6d28bdf6fde8db861e83e1042a23d
                • Opcode Fuzzy Hash: 995e0edca6da6d27cfebeb7bd8367e3d5fe10e171bd3a801c63be80998465b08
                • Instruction Fuzzy Hash: 1381C0B0A052408FC7A6EF3BEC716197BE5FB9830AB50812B90D8CB359EB7E45059F51
                APIs
                • _memset.LIBCMT ref: 00FD4370
                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00FD4415
                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00FD4432
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: IconNotifyShell_$_memset
                • String ID:
                • API String ID: 1505330794-0
                • Opcode ID: 5268ecc473bd2621fe51f05abe2a70a8ce36f2d4f0f507e5bee2d47420086c14
                • Instruction ID: 1bd867febc869b111468fc70d18209ca70299c8768170916b8c953fa9a050a7f
                • Opcode Fuzzy Hash: 5268ecc473bd2621fe51f05abe2a70a8ce36f2d4f0f507e5bee2d47420086c14
                • Instruction Fuzzy Hash: C1318FB09047019FD731DF24D88469BBBE8FB49318F04096FF6DA82381E775A944DB92
                APIs
                • __FF_MSGBANNER.LIBCMT ref: 00FF5733
                  • Part of subcall function 00FFA16B: __NMSG_WRITE.LIBCMT ref: 00FFA192
                  • Part of subcall function 00FFA16B: __NMSG_WRITE.LIBCMT ref: 00FFA19C
                • __NMSG_WRITE.LIBCMT ref: 00FF573A
                  • Part of subcall function 00FFA1C8: GetModuleFileNameW.KERNEL32(00000000,010933BA,00000104,?,00000001,00000000), ref: 00FFA25A
                  • Part of subcall function 00FFA1C8: ___crtMessageBoxW.LIBCMT ref: 00FFA308
                  • Part of subcall function 00FF309F: ___crtCorExitProcess.LIBCMT ref: 00FF30A5
                  • Part of subcall function 00FF309F: ExitProcess.KERNEL32 ref: 00FF30AE
                  • Part of subcall function 00FF8B28: __getptd_noexit.LIBCMT ref: 00FF8B28
                • RtlAllocateHeap.NTDLL(01250000,00000000,00000001,00000000,?,?,?,00FF0DD3,?), ref: 00FF575F
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                • String ID:
                • API String ID: 1372826849-0
                • Opcode ID: 62d60e9f73b6ee96ca8c3faa39d4145a9abd170171c19e9ef111a43720b01a7e
                • Instruction ID: 2f4c88bd63d68d2651d95ae1bc5e6e88ef3d7648877da3fdf51fcec915b9f9d2
                • Opcode Fuzzy Hash: 62d60e9f73b6ee96ca8c3faa39d4145a9abd170171c19e9ef111a43720b01a7e
                • Instruction Fuzzy Hash: 1301D237700B0EDAD6213B34EC52B7E7748AF82B72F210025F7059A1A1DEB898017B60
                APIs
                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,01039548,?,?,?,?,?,00000004), ref: 010398BB
                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,01039548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 010398D1
                • CloseHandle.KERNEL32(00000000,?,01039548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 010398D8
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: File$CloseCreateHandleTime
                • String ID:
                • API String ID: 3397143404-0
                • Opcode ID: 8f9aab16a74a63a887a4736f54e04e2caae8085c635a6333e754403f4c62180b
                • Instruction ID: 2b3bba269b4c4f23d6c26ff0802e42ef6b86f9823e9629957797859569f12c2f
                • Opcode Fuzzy Hash: 8f9aab16a74a63a887a4736f54e04e2caae8085c635a6333e754403f4c62180b
                • Instruction Fuzzy Hash: FAE08632141315B7E7312B54EC09FCB7F59AB46764F108110FB94A90D087BA15119798
                APIs
                • _free.LIBCMT ref: 01038D1B
                  • Part of subcall function 00FF2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00FF9A24), ref: 00FF2D69
                  • Part of subcall function 00FF2D55: GetLastError.KERNEL32(00000000,?,00FF9A24), ref: 00FF2D7B
                • _free.LIBCMT ref: 01038D2C
                • _free.LIBCMT ref: 01038D3E
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: c56cf7ee783aa8295308e84720220828ccc4d403300e1e82c1220f1652f177a4
                • Instruction ID: 42c748a43608b1a2133fcc58bab025b9d7f753d5fcfcf76420a9e7cea1a108b4
                • Opcode Fuzzy Hash: c56cf7ee783aa8295308e84720220828ccc4d403300e1e82c1220f1652f177a4
                • Instruction Fuzzy Hash: 3BE0C2A160160842DBA0B57CAC45AA723DC4F887527044A8EBA4DD7152CE68F4429024
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID: CALL
                • API String ID: 0-4196123274
                • Opcode ID: 796e93d729a0a201bcec3c3c7297788da01bb6542b5e2809566888d7c8cfc9e7
                • Instruction ID: ef639e47282c6f7975a7d88f41792b7835187fffbec0166894c4075d77037ab1
                • Opcode Fuzzy Hash: 796e93d729a0a201bcec3c3c7297788da01bb6542b5e2809566888d7c8cfc9e7
                • Instruction Fuzzy Hash: EC227C71908301DFDB25DF14C490B2AB7E2BF84310F19895EE89A8B361DB35EC45EB86
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _memmove
                • String ID: EA06
                • API String ID: 4104443479-3962188686
                • Opcode ID: d678158cf958337f81be3f7d640763eff187bcdc475617ebaa837795df76ef68
                • Instruction ID: 8b88cec139b8e9d51f8f0863a584dc564f57e0c1b76f77df8cde591c28e37a9e
                • Opcode Fuzzy Hash: d678158cf958337f81be3f7d640763eff187bcdc475617ebaa837795df76ef68
                • Instruction Fuzzy Hash: 63415B22E041586BDF229B948C917BE7FA39B45310F2C4477ED86DB382D634BD44B7A1
                APIs
                • IsThemeActive.UXTHEME ref: 00FD4834
                  • Part of subcall function 00FF336C: __lock.LIBCMT ref: 00FF3372
                  • Part of subcall function 00FF336C: DecodePointer.KERNEL32(00000001,?,00FD4849,01027C74), ref: 00FF337E
                  • Part of subcall function 00FF336C: EncodePointer.KERNEL32(?,?,00FD4849,01027C74), ref: 00FF3389
                  • Part of subcall function 00FD48FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00FD4915
                  • Part of subcall function 00FD48FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00FD492A
                  • Part of subcall function 00FD3B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FD3B68
                  • Part of subcall function 00FD3B3A: IsDebuggerPresent.KERNEL32 ref: 00FD3B7A
                  • Part of subcall function 00FD3B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,010952F8,010952E0,?,?), ref: 00FD3BEB
                  • Part of subcall function 00FD3B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00FD3C6F
                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00FD4874
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                • String ID:
                • API String ID: 1438897964-0
                • Opcode ID: 10777bfcaf87287fd6ece23b87f16f174da25cea061c54a091829269b4c189b9
                • Instruction ID: 180063fde083afb6c0a144a69151c560e11d3b17b607c46a483cbec8ff4c8dad
                • Opcode Fuzzy Hash: 10777bfcaf87287fd6ece23b87f16f174da25cea061c54a091829269b4c189b9
                • Instruction Fuzzy Hash: 6F119D719083459BC710EF69DC1590EBFE9FF89750F10451FF080972A1DBBAA544DB92
                APIs
                  • Part of subcall function 00FF571C: __FF_MSGBANNER.LIBCMT ref: 00FF5733
                  • Part of subcall function 00FF571C: __NMSG_WRITE.LIBCMT ref: 00FF573A
                  • Part of subcall function 00FF571C: RtlAllocateHeap.NTDLL(01250000,00000000,00000001,00000000,?,?,?,00FF0DD3,?), ref: 00FF575F
                • std::exception::exception.LIBCMT ref: 00FF0DEC
                • __CxxThrowException@8.LIBCMT ref: 00FF0E01
                  • Part of subcall function 00FF859B: RaiseException.KERNEL32(?,?,?,01089E78,00000000,?,?,?,?,00FF0E06,?,01089E78,?,00000001), ref: 00FF85F0
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                • String ID:
                • API String ID: 3902256705-0
                • Opcode ID: 900c12354e5a679dcbce11a561a0d0af8c297e177fb28ddb0a267fe7f3d4a93b
                • Instruction ID: 3e3302a01b659197d341cbd86be375ff473766beb5c163f85c5515de5d8623e6
                • Opcode Fuzzy Hash: 900c12354e5a679dcbce11a561a0d0af8c297e177fb28ddb0a267fe7f3d4a93b
                • Instruction Fuzzy Hash: F1F0A432D0021E66CB14FA94EC019FE7BAC9F113A1F104469FB44961A2EF749A81A6D1
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __lock_file_memset
                • String ID:
                • API String ID: 26237723-0
                • Opcode ID: 9777a9315467a5a40f9bc223e5e8bf983b13479f3f8c6114b58c50178a7926c4
                • Instruction ID: e49c649dd819bcd0cb70894708a149bcdef2c7acd26b2c4e1a4587dda05b5e8e
                • Opcode Fuzzy Hash: 9777a9315467a5a40f9bc223e5e8bf983b13479f3f8c6114b58c50178a7926c4
                • Instruction Fuzzy Hash: AA01F771C00A0CEBCF22AF648C024BE7B61AF90B61F404115FB249B271DB798A12FF91
                APIs
                  • Part of subcall function 00FF8B28: __getptd_noexit.LIBCMT ref: 00FF8B28
                • __lock_file.LIBCMT ref: 00FF53EB
                  • Part of subcall function 00FF6C11: __lock.LIBCMT ref: 00FF6C34
                • __fclose_nolock.LIBCMT ref: 00FF53F6
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                • String ID:
                • API String ID: 2800547568-0
                • Opcode ID: 285f36b519f068d5aef62047a84ea3311c76d511bf86f8c0bedbce0206f91b90
                • Instruction ID: 57c093b3f3e0d56ae4c1a1f5cb200a4ddafe3146c0ce4cb0a750fd3cc957dba0
                • Opcode Fuzzy Hash: 285f36b519f068d5aef62047a84ea3311c76d511bf86f8c0bedbce0206f91b90
                • Instruction Fuzzy Hash: 54F09631D00A1C9ADB21AB799C017BD76A16F41BB5F208109A764AB1F1DFFC8942BB51
                APIs
                  • Part of subcall function 012E7750: GetFileAttributesW.KERNELBASE(?), ref: 012E775B
                • CreateDirectoryW.KERNELBASE(?,00000000), ref: 012E8060
                Memory Dump Source
                • Source File: 00000000.00000002.2155444950.00000000012E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 012E6000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_12e6000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AttributesCreateDirectoryFile
                • String ID:
                • API String ID: 3401506121-0
                • Opcode ID: 6ed1242addcb4bb7395cb0d4ecf0272f6914d865e7bca932fb83c44b20bed765
                • Instruction ID: fe8c608311fcbca169feb37259d14a3f057a03fe7f5a8b8e522a4b78c523565f
                • Opcode Fuzzy Hash: 6ed1242addcb4bb7395cb0d4ecf0272f6914d865e7bca932fb83c44b20bed765
                • Instruction Fuzzy Hash: 7C619431A2420997EF14DFB4D854BEF737AEF58300F004569A60DEB290EB759A44CBA5
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                • Instruction ID: 696c99a35b8e1faff84c9fbe07ca3b2ffb85f2f94844093b2d181b0ff60047b5
                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                • Instruction Fuzzy Hash: FE31D2B5A001099BC718DF58C484A79F7A6FF59310B6487A5E90ACB366DB31EDC1EBC0
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ClearVariant
                • String ID:
                • API String ID: 1473721057-0
                • Opcode ID: fee4933f311677d126432f673d9384ef261b7f937311f3e208d17479b398d3c0
                • Instruction ID: 4c928acc6c3ebef1ff82b9fdef933cb40537aff8a683cae79995b68cfcc7d347
                • Opcode Fuzzy Hash: fee4933f311677d126432f673d9384ef261b7f937311f3e208d17479b398d3c0
                • Instruction Fuzzy Hash: 4A413774A08341CFDB25DF28C444B1ABBE2BF45318F09889DE9998B362C776E845DF52
                APIs
                  • Part of subcall function 00FD4BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00FD4BEF
                  • Part of subcall function 00FF525B: __wfsopen.LIBCMT ref: 00FF5266
                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,010952F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00FD4E0F
                  • Part of subcall function 00FD4B6A: FreeLibrary.KERNEL32(00000000), ref: 00FD4BA4
                  • Part of subcall function 00FD4C70: _memmove.LIBCMT ref: 00FD4CBA
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Library$Free$Load__wfsopen_memmove
                • String ID:
                • API String ID: 1396898556-0
                • Opcode ID: 57ed0563b569a1027702821b7ab0f802737e55c790c0352bc1c9d4daa9b38cf6
                • Instruction ID: 66e7375f1b52e2f0ec7a658ec431521d505c1a314bbbc2160062d3eec918a423
                • Opcode Fuzzy Hash: 57ed0563b569a1027702821b7ab0f802737e55c790c0352bc1c9d4daa9b38cf6
                • Instruction Fuzzy Hash: 7111EB31600206B7DF11FFB4CC12F6D77A6AF84710F14842FF545A7281DA79AA00B751
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ClearVariant
                • String ID:
                • API String ID: 1473721057-0
                • Opcode ID: 894f06a38bc623dbcdc3656fb4eab51f47b0be4c4e8277b453cf2dea8d7c3636
                • Instruction ID: 34987fb3b5dfcd1aa57fde54e2c0fa0b218fe9f5406dbda92cb105ba300f7c64
                • Opcode Fuzzy Hash: 894f06a38bc623dbcdc3656fb4eab51f47b0be4c4e8277b453cf2dea8d7c3636
                • Instruction Fuzzy Hash: 8B212674908341DFDB14DF64C844B1ABBE2BF88314F09895DF98957722D735E805DB92
                APIs
                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FF07B0
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: LongNamePath
                • String ID:
                • API String ID: 82841172-0
                • Opcode ID: 75527f81eef7fd904e20a4994de80c1dbf6295db52c90ce1c282923914999723
                • Instruction ID: 50c3c6415f5cf0ecc5c8fa82901ff0e28e0a8bff4a1a30cfb863484361b69722
                • Opcode Fuzzy Hash: 75527f81eef7fd904e20a4994de80c1dbf6295db52c90ce1c282923914999723
                • Instruction Fuzzy Hash: 48F0C8725441946FC3215B749C899F6BFB8EFC7264B1841FBECC88E926E9254847C7C1
                APIs
                • __lock_file.LIBCMT ref: 00FF48A6
                  • Part of subcall function 00FF8B28: __getptd_noexit.LIBCMT ref: 00FF8B28
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __getptd_noexit__lock_file
                • String ID:
                • API String ID: 2597487223-0
                • Opcode ID: 2ea42835b527c2f18086d3c3d46cf9969564db06d80a2a4bcb500f3049688cf0
                • Instruction ID: 5fc1944fb7f8a07fe26dd0c4beb06958f56d075cbae64c70ff8181e4fb76bebe
                • Opcode Fuzzy Hash: 2ea42835b527c2f18086d3c3d46cf9969564db06d80a2a4bcb500f3049688cf0
                • Instruction Fuzzy Hash: 68F0FF3290020CABDF21AFB48C063BF36A0AF007A6F008404B6209A1B1DBBC8952FB51
                APIs
                • FreeLibrary.KERNEL32(?,?,010952F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00FD4E7E
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: FreeLibrary
                • String ID:
                • API String ID: 3664257935-0
                • Opcode ID: 0f8e87b8ab2299ea487051b0b5086a159bc90f10ccf729fd88924486b589b63d
                • Instruction ID: e38b6ea64af4bc267306c7bc008bf28744d11dc9cb8b9ab2436b1ce2ad52d7ce
                • Opcode Fuzzy Hash: 0f8e87b8ab2299ea487051b0b5086a159bc90f10ccf729fd88924486b589b63d
                • Instruction Fuzzy Hash: 35F01C71501711DFCB349F64D494812B7E2BF14335318896EE2D682710C776A840EB40
                APIs
                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FF07B0
                  • Part of subcall function 00FD7BCC: _memmove.LIBCMT ref: 00FD7C06
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: LongNamePath_memmove
                • String ID:
                • API String ID: 2514874351-0
                • Opcode ID: e12b5f801011d1cead23d71057e0f372f75a47cb83042841e421ee0af191b514
                • Instruction ID: b6b658512db3a0eaf43509d971d27a579c7d901ec2568a935423a8e5f45315c7
                • Opcode Fuzzy Hash: e12b5f801011d1cead23d71057e0f372f75a47cb83042841e421ee0af191b514
                • Instruction Fuzzy Hash: F2E0867690422957C721A5689C05FEA77DDDBC86A0F0441B6FD4CD7248D9659C808690
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __fread_nolock
                • String ID:
                • API String ID: 2638373210-0
                • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                • Instruction ID: 9ce9ad7dfa3a84a66e62a45ccc5d1deb4cc6ac72920d7388cb034aba32f04b60
                • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                • Instruction Fuzzy Hash: 93E092B0104B045FD7398A28D800BA377E5AB05305F04099DF2EA83242EB6278458759
                APIs
                • GetFileAttributesW.KERNELBASE(?), ref: 012E775B
                Memory Dump Source
                • Source File: 00000000.00000002.2155444950.00000000012E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 012E6000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_12e6000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AttributesFile
                • String ID:
                • API String ID: 3188754299-0
                • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                • Instruction ID: 962056254fceb433cdeac6d4bb219dd63b0ddf4c0b66245a3d02015ebf40b4c4
                • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                • Instruction Fuzzy Hash: FBE08C30A65208EBDB28CABC8D0DAA977E8D709321F504654EA16C3290D5308A409B94
                APIs
                • GetFileAttributesW.KERNELBASE(?), ref: 012E772B
                Memory Dump Source
                • Source File: 00000000.00000002.2155444950.00000000012E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 012E6000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_12e6000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AttributesFile
                • String ID:
                • API String ID: 3188754299-0
                • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                • Instruction ID: d1df9c9de5cd0e3ee85b06f4fe3def5bb55a182aaa1fc42f091a045d4221ddc1
                • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                • Instruction Fuzzy Hash: E3D0A77095520CEBCB10CFB89C0C9DA77E8D704320F004764FD15C3280D5319D4097D0
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __wfsopen
                • String ID:
                • API String ID: 197181222-0
                • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                • Instruction ID: f90413dfbd64c80c5f5f0d197ff2bd5c3e8347fb515e7ee6ccc792dff290d58a
                • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                • Instruction Fuzzy Hash: 01B0927644020C77CE012A82FC02A593F199B42B64F408020FB0C18172E677A664AA89
                APIs
                • Sleep.KERNELBASE(000001F4), ref: 012E9171
                Memory Dump Source
                • Source File: 00000000.00000002.2155444950.00000000012E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 012E6000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_12e6000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Sleep
                • String ID:
                • API String ID: 3472027048-0
                • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                • Instruction ID: 5ac4f71ea6877e4144b147c2dfb263791bf02385ce33a8d55134ccf8dc2cb49b
                • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                • Instruction Fuzzy Hash: 34E0BF7494010DEFDB10EFA4D54D6DE7BB4EF04301F1006A5FD05D7681DB309E549A62
                APIs
                • Sleep.KERNELBASE(000001F4), ref: 012E9171
                Memory Dump Source
                • Source File: 00000000.00000002.2155444950.00000000012E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 012E6000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_12e6000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Sleep
                • String ID:
                • API String ID: 3472027048-0
                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                • Instruction ID: 3e445280bd8007b1ec722656bfd9c08986a8b173a2f6334e3a12adedc6af750a
                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                • Instruction Fuzzy Hash: 7BE0BF7494010DAFDB00EFA4D54D69E7BB4EF04301F100265FD0192281D63099509A62
                APIs
                  • Part of subcall function 00FD2612: GetWindowLongW.USER32(?,000000EB), ref: 00FD2623
                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0105CB37
                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0105CB95
                • GetWindowLongW.USER32(?,000000F0), ref: 0105CBD6
                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0105CC00
                • SendMessageW.USER32 ref: 0105CC29
                • _wcsncpy.LIBCMT ref: 0105CC95
                • GetKeyState.USER32(00000011), ref: 0105CCB6
                • GetKeyState.USER32(00000009), ref: 0105CCC3
                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0105CCD9
                • GetKeyState.USER32(00000010), ref: 0105CCE3
                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0105CD0C
                • SendMessageW.USER32 ref: 0105CD33
                • SendMessageW.USER32(?,00001030,?,0105B348), ref: 0105CE37
                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0105CE4D
                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0105CE60
                • SetCapture.USER32(?), ref: 0105CE69
                • ClientToScreen.USER32(?,?), ref: 0105CECE
                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0105CEDB
                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0105CEF5
                • ReleaseCapture.USER32 ref: 0105CF00
                • GetCursorPos.USER32(?), ref: 0105CF3A
                • ScreenToClient.USER32(?,?), ref: 0105CF47
                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0105CFA3
                • SendMessageW.USER32 ref: 0105CFD1
                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0105D00E
                • SendMessageW.USER32 ref: 0105D03D
                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0105D05E
                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0105D06D
                • GetCursorPos.USER32(?), ref: 0105D08D
                • ScreenToClient.USER32(?,?), ref: 0105D09A
                • GetParent.USER32(?), ref: 0105D0BA
                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0105D123
                • SendMessageW.USER32 ref: 0105D154
                • ClientToScreen.USER32(?,?), ref: 0105D1B2
                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0105D1E2
                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0105D20C
                • SendMessageW.USER32 ref: 0105D22F
                • ClientToScreen.USER32(?,?), ref: 0105D281
                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0105D2B5
                  • Part of subcall function 00FD25DB: GetWindowLongW.USER32(?,000000EB), ref: 00FD25EC
                • GetWindowLongW.USER32(?,000000F0), ref: 0105D351
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                • String ID: @GUI_DRAGID$F
                • API String ID: 3977979337-4164748364
                • Opcode ID: e33a48190e689529ab204eded5e336fde4eb93f1830cb674ef91f2c1fa5499a7
                • Instruction ID: df56c47a1e80ad3d60ec41fc8919b6f65fefda8e14a3bd7ae1ee5a31adca51be
                • Opcode Fuzzy Hash: e33a48190e689529ab204eded5e336fde4eb93f1830cb674ef91f2c1fa5499a7
                • Instruction Fuzzy Hash: B742BF38104341AFEBA1CF29C944AABBFE9FF48350F04055AFAD5972A5C736D840EB91
                APIs
                • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 010584D0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend
                • String ID: %d/%02d/%02d
                • API String ID: 3850602802-328681919
                • Opcode ID: b47b0846d7330f4aecff5e156b99072c633f02ed1a14b90a5c5092066987a9ce
                • Instruction ID: afcb2fa848078c62f67661c1ef0125c4682f066b68505ef7bd3dacb7ae3259a8
                • Opcode Fuzzy Hash: b47b0846d7330f4aecff5e156b99072c633f02ed1a14b90a5c5092066987a9ce
                • Instruction Fuzzy Hash: DF12E370501304ABEBA59F29CC49FAF7FE4EF49350F14815AFE95EA2A1DB788941CB10
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _memmove$_memset
                • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                • API String ID: 1357608183-1798697756
                • Opcode ID: 5e3d9d375217f3e9d70c9dd70b02bd1afc846ad0307246a63876d011590cff52
                • Instruction ID: 746fe1334fde343f2225aebdba3e38ab5c93cacc9a851195b5c8f259b06cdd65
                • Opcode Fuzzy Hash: 5e3d9d375217f3e9d70c9dd70b02bd1afc846ad0307246a63876d011590cff52
                • Instruction Fuzzy Hash: FF93A575E04325DBDB24DF98C881BADB7F1FF48310F2581AAE985EB281E7749981DB40
                APIs
                • GetForegroundWindow.USER32(00000000,?), ref: 00FD48DF
                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0100D665
                • IsIconic.USER32(?), ref: 0100D66E
                • ShowWindow.USER32(?,00000009), ref: 0100D67B
                • SetForegroundWindow.USER32(?), ref: 0100D685
                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0100D69B
                • GetCurrentThreadId.KERNEL32 ref: 0100D6A2
                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0100D6AE
                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0100D6BF
                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0100D6C7
                • AttachThreadInput.USER32(00000000,?,00000001), ref: 0100D6CF
                • SetForegroundWindow.USER32(?), ref: 0100D6D2
                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0100D6E7
                • keybd_event.USER32(00000012,00000000), ref: 0100D6F2
                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0100D6FC
                • keybd_event.USER32(00000012,00000000), ref: 0100D701
                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0100D70A
                • keybd_event.USER32(00000012,00000000), ref: 0100D70F
                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0100D719
                • keybd_event.USER32(00000012,00000000), ref: 0100D71E
                • SetForegroundWindow.USER32(?), ref: 0100D721
                • AttachThreadInput.USER32(?,?,00000000), ref: 0100D748
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                • String ID: Shell_TrayWnd
                • API String ID: 4125248594-2988720461
                • Opcode ID: c348a2336ba2ec4383f50df3f63ac27eee3d8800d5a63a7c02fbe9e91e08f585
                • Instruction ID: 809ecc09d548e7720cdef27339236a66b7e6e3e3f425693372274697a57d592a
                • Opcode Fuzzy Hash: c348a2336ba2ec4383f50df3f63ac27eee3d8800d5a63a7c02fbe9e91e08f585
                • Instruction Fuzzy Hash: 3E318071A40318BBFB312BA19C49F7F3E6CEB48B50F104055FB44EA1C1D6B95900ABB0
                APIs
                  • Part of subcall function 010287E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0102882B
                  • Part of subcall function 010287E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 01028858
                  • Part of subcall function 010287E1: GetLastError.KERNEL32 ref: 01028865
                • _memset.LIBCMT ref: 01028353
                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 010283A5
                • CloseHandle.KERNEL32(?), ref: 010283B6
                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 010283CD
                • GetProcessWindowStation.USER32 ref: 010283E6
                • SetProcessWindowStation.USER32(00000000), ref: 010283F0
                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0102840A
                  • Part of subcall function 010281CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,01028309), ref: 010281E0
                  • Part of subcall function 010281CB: CloseHandle.KERNEL32(?,?,01028309), ref: 010281F2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                • String ID: $default$winsta0
                • API String ID: 2063423040-1027155976
                • Opcode ID: 1a7a1a39e9a1b3dc8f611f71a76b522182e624e56ffe5433930ecd9bfeb3c1e6
                • Instruction ID: a228f5214919f59d2d427a592ed0ef1d29533f1a04f5b9865d72db049e6cfde0
                • Opcode Fuzzy Hash: 1a7a1a39e9a1b3dc8f611f71a76b522182e624e56ffe5433930ecd9bfeb3c1e6
                • Instruction Fuzzy Hash: 9A81707590022DAFEF51DFA4CC44AEE7BF8FF08304F14819AFA90A6164D7398A54DB20
                APIs
                • FindFirstFileW.KERNEL32(?,?), ref: 0103C78D
                • FindClose.KERNEL32(00000000), ref: 0103C7E1
                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0103C806
                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0103C81D
                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0103C844
                • __swprintf.LIBCMT ref: 0103C890
                • __swprintf.LIBCMT ref: 0103C8D3
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                • __swprintf.LIBCMT ref: 0103C927
                  • Part of subcall function 00FF3698: __woutput_l.LIBCMT ref: 00FF36F1
                • __swprintf.LIBCMT ref: 0103C975
                  • Part of subcall function 00FF3698: __flsbuf.LIBCMT ref: 00FF3713
                  • Part of subcall function 00FF3698: __flsbuf.LIBCMT ref: 00FF372B
                • __swprintf.LIBCMT ref: 0103C9C4
                • __swprintf.LIBCMT ref: 0103CA13
                • __swprintf.LIBCMT ref: 0103CA62
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                • API String ID: 3953360268-2428617273
                • Opcode ID: 712613429bfbe70be35d69b7981450b3cdd309d5230c2aabfa6cbbbadb302baf
                • Instruction ID: 6685b1453d26079be1cf1e76a8bc59e5b6e6106ff4b2709e8de617891672e95d
                • Opcode Fuzzy Hash: 712613429bfbe70be35d69b7981450b3cdd309d5230c2aabfa6cbbbadb302baf
                • Instruction Fuzzy Hash: 7BA14BB2408345ABD710EFA4CC85DAFB7EDFF84704F44091AF585C6291EA79DA08DB62
                APIs
                • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 0103EFB6
                • _wcscmp.LIBCMT ref: 0103EFCB
                • _wcscmp.LIBCMT ref: 0103EFE2
                • GetFileAttributesW.KERNEL32(?), ref: 0103EFF4
                • SetFileAttributesW.KERNEL32(?,?), ref: 0103F00E
                • FindNextFileW.KERNEL32(00000000,?), ref: 0103F026
                • FindClose.KERNEL32(00000000), ref: 0103F031
                • FindFirstFileW.KERNEL32(*.*,?), ref: 0103F04D
                • _wcscmp.LIBCMT ref: 0103F074
                • _wcscmp.LIBCMT ref: 0103F08B
                • SetCurrentDirectoryW.KERNEL32(?), ref: 0103F09D
                • SetCurrentDirectoryW.KERNEL32(01088920), ref: 0103F0BB
                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0103F0C5
                • FindClose.KERNEL32(00000000), ref: 0103F0D2
                • FindClose.KERNEL32(00000000), ref: 0103F0E4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                • String ID: *.*
                • API String ID: 1803514871-438819550
                • Opcode ID: cecfbca9a07084417c6aa01e47b48410ebe4af8b11a6fdb5be746ae19ea142f1
                • Instruction ID: b9a554848958964e2a90d099c73aedb90b71b57be661ddb4e8290dcfd004e3c8
                • Opcode Fuzzy Hash: cecfbca9a07084417c6aa01e47b48410ebe4af8b11a6fdb5be746ae19ea142f1
                • Instruction Fuzzy Hash: FE31D87290121B7AEB24EBB8DC48AEFB7EC9F84260F044196F9D4D3050DB79DA44CB52
                APIs
                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01050953
                • RegCreateKeyExW.ADVAPI32(?,?,00000000,0105F910,00000000,?,00000000,?,?), ref: 010509C1
                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 01050A09
                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 01050A92
                • RegCloseKey.ADVAPI32(?), ref: 01050DB2
                • RegCloseKey.ADVAPI32(00000000), ref: 01050DBF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Close$ConnectCreateRegistryValue
                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                • API String ID: 536824911-966354055
                • Opcode ID: b01a6de091c3e95242cea9853bad00c92c701f8c13c8918c8276e347044feced
                • Instruction ID: 1059f88e0a019746a0a74abb7b6b3da3efce9cfcf03c86a07f40669c3c81321c
                • Opcode Fuzzy Hash: b01a6de091c3e95242cea9853bad00c92c701f8c13c8918c8276e347044feced
                • Instruction Fuzzy Hash: C70246756046019FDB94EF18C850E2EBBE5EF89710F08885DF9899B362CB74ED01DB81
                APIs
                • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 0103F113
                • _wcscmp.LIBCMT ref: 0103F128
                • _wcscmp.LIBCMT ref: 0103F13F
                  • Part of subcall function 01034385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 010343A0
                • FindNextFileW.KERNEL32(00000000,?), ref: 0103F16E
                • FindClose.KERNEL32(00000000), ref: 0103F179
                • FindFirstFileW.KERNEL32(*.*,?), ref: 0103F195
                • _wcscmp.LIBCMT ref: 0103F1BC
                • _wcscmp.LIBCMT ref: 0103F1D3
                • SetCurrentDirectoryW.KERNEL32(?), ref: 0103F1E5
                • SetCurrentDirectoryW.KERNEL32(01088920), ref: 0103F203
                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0103F20D
                • FindClose.KERNEL32(00000000), ref: 0103F21A
                • FindClose.KERNEL32(00000000), ref: 0103F22C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                • String ID: *.*
                • API String ID: 1824444939-438819550
                • Opcode ID: 730e537bdb521a18b8fd156fe55ebc239c1fc289c2f8f3a5e161a05f11c231e2
                • Instruction ID: 8525f59a75480d610ec44711d7f4ffa1cf9c83506ddce1de93d7e8dca46e5abf
                • Opcode Fuzzy Hash: 730e537bdb521a18b8fd156fe55ebc239c1fc289c2f8f3a5e161a05f11c231e2
                • Instruction Fuzzy Hash: 50311A7690021FBAEB60AE64EC48EEF77AC9F85260F144196E9C0E3090DB35DA45CB55
                APIs
                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0103A20F
                • __swprintf.LIBCMT ref: 0103A231
                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0103A26E
                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0103A293
                • _memset.LIBCMT ref: 0103A2B2
                • _wcsncpy.LIBCMT ref: 0103A2EE
                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0103A323
                • CloseHandle.KERNEL32(00000000), ref: 0103A32E
                • RemoveDirectoryW.KERNEL32(?), ref: 0103A337
                • CloseHandle.KERNEL32(00000000), ref: 0103A341
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                • String ID: :$\$\??\%s
                • API String ID: 2733774712-3457252023
                • Opcode ID: 59b44c3ecd8cc27e27d94d6a30a3400ef0fb58c70b55d4e50f28165006794f0d
                • Instruction ID: 46a7ec73e7027997c50401b77b3bc51051643f8f578f746c71b34bbf155d119e
                • Opcode Fuzzy Hash: 59b44c3ecd8cc27e27d94d6a30a3400ef0fb58c70b55d4e50f28165006794f0d
                • Instruction Fuzzy Hash: 7331D4B560020AABDB21DFA4DC49FEB37BCEF89740F1041A6F688D6161E77992448B24
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                • API String ID: 0-4052911093
                • Opcode ID: eba1c0a0280730b9e632dc3f62ad0107ba65989c2579118c4b54b7a558c64df2
                • Instruction ID: 845f90edcd985379fc0a4a8b6e2e7040ae9ebd45c39a6175577be34bfd23e2b7
                • Opcode Fuzzy Hash: eba1c0a0280730b9e632dc3f62ad0107ba65989c2579118c4b54b7a558c64df2
                • Instruction Fuzzy Hash: D572A271E00269DBDF24DF59C8807AEB7F5FF58350F1481AAE849EB281DB349A41DB90
                APIs
                • GetKeyboardState.USER32(?), ref: 01030097
                • SetKeyboardState.USER32(?), ref: 01030102
                • GetAsyncKeyState.USER32(000000A0), ref: 01030122
                • GetKeyState.USER32(000000A0), ref: 01030139
                • GetAsyncKeyState.USER32(000000A1), ref: 01030168
                • GetKeyState.USER32(000000A1), ref: 01030179
                • GetAsyncKeyState.USER32(00000011), ref: 010301A5
                • GetKeyState.USER32(00000011), ref: 010301B3
                • GetAsyncKeyState.USER32(00000012), ref: 010301DC
                • GetKeyState.USER32(00000012), ref: 010301EA
                • GetAsyncKeyState.USER32(0000005B), ref: 01030213
                • GetKeyState.USER32(0000005B), ref: 01030221
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: State$Async$Keyboard
                • String ID:
                • API String ID: 541375521-0
                • Opcode ID: eea990666be577d71be7b1ef8774c52604323a161d981fdc7cc67a5ebf2be509
                • Instruction ID: c92e60f04e2c216c7b455325b69919e95fe1add45378d0e6740a42a88b6c7e44
                • Opcode Fuzzy Hash: eea990666be577d71be7b1ef8774c52604323a161d981fdc7cc67a5ebf2be509
                • Instruction Fuzzy Hash: 6A51FB3090678929FB75DBA888147EAFFFC9F41280F0845C9EAC2575C7DAA4978CC761
                APIs
                  • Part of subcall function 01050E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0104FDAD,?,?), ref: 01050E31
                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010504AC
                  • Part of subcall function 00FD9837: __itow.LIBCMT ref: 00FD9862
                  • Part of subcall function 00FD9837: __swprintf.LIBCMT ref: 00FD98AC
                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0105054B
                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 010505E3
                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 01050822
                • RegCloseKey.ADVAPI32(00000000), ref: 0105082F
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                • String ID:
                • API String ID: 1240663315-0
                • Opcode ID: 2e4a9b63a18c6a89f0610acc0a04511ab4e130fb8d3b3542162b85f39d38aaaf
                • Instruction ID: b88d6680a905eafa44d479c1d09c7ebad7dc44d55c36d81a5e24fef7801bfed3
                • Opcode Fuzzy Hash: 2e4a9b63a18c6a89f0610acc0a04511ab4e130fb8d3b3542162b85f39d38aaaf
                • Instruction Fuzzy Hash: CAE17E31604205AFCB54DF28C894D2FBBE5FF89714F08856DF88ADB265DA35E805CB91
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                • String ID:
                • API String ID: 1737998785-0
                • Opcode ID: fbcf7a16ea246b36c8988c6723f0a2a74da6e135703864a758e6f0b72af05356
                • Instruction ID: 1628317bec70a9c4cfdb7c6fd5de9fb6e24260ce8d7c3d165a0c9571b21d1139
                • Opcode Fuzzy Hash: fbcf7a16ea246b36c8988c6723f0a2a74da6e135703864a758e6f0b72af05356
                • Instruction Fuzzy Hash: 1521A1B53002129FDB21AF64DC59B6E7BA8FF05750F04806AF9C6DB2A5DB79AC00CB54
                APIs
                  • Part of subcall function 00FD4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FD4743,?,?,00FD37AE,?), ref: 00FD4770
                  • Part of subcall function 01034A31: GetFileAttributesW.KERNEL32(?,0103370B), ref: 01034A32
                • FindFirstFileW.KERNEL32(?,?), ref: 010338A3
                • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0103394B
                • MoveFileW.KERNEL32(?,?), ref: 0103395E
                • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0103397B
                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0103399D
                • FindClose.KERNEL32(00000000,?,?,?,?), ref: 010339B9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                • String ID: \*.*
                • API String ID: 4002782344-1173974218
                • Opcode ID: 8f9f523155c51f134adfb17bdf922ed455a69ab3a373e202efc412cd0dfdd6a3
                • Instruction ID: 3dc7377317704d7f16ef8e9488b0e671fed85cbe06a6abec18ae287df3529940
                • Opcode Fuzzy Hash: 8f9f523155c51f134adfb17bdf922ed455a69ab3a373e202efc412cd0dfdd6a3
                • Instruction Fuzzy Hash: 3551A33180524D9ACF11FBA4DD929EDB7B9AF50300F6400AAE482BB291EF356F0DDB51
                APIs
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0103F440
                • Sleep.KERNEL32(0000000A), ref: 0103F470
                • _wcscmp.LIBCMT ref: 0103F484
                • _wcscmp.LIBCMT ref: 0103F49F
                • FindNextFileW.KERNEL32(?,?), ref: 0103F53D
                • FindClose.KERNEL32(00000000), ref: 0103F553
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                • String ID: *.*
                • API String ID: 713712311-438819550
                • Opcode ID: 1ec7ee45d0783dc501d75ed5a94896300a10bbcb47b865ab05dad456a421198e
                • Instruction ID: a6232bea56d28b3af1fd7de8294e2fc2c3db37e3ce85a9c45ad4db1511d05b14
                • Opcode Fuzzy Hash: 1ec7ee45d0783dc501d75ed5a94896300a10bbcb47b865ab05dad456a421198e
                • Instruction Fuzzy Hash: D3418E71C0020A9FDF50EF68DC48AEEBBB8FF45310F184096E995A7291EB359A84CB51
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _memmove
                • String ID:
                • API String ID: 4104443479-0
                • Opcode ID: 8806ccfae76aea09dedceba7b1930d7c97795206eda40efdcfb03d1f6b1b84a3
                • Instruction ID: 9d0770e0ba47929280e369c4df7fb68b724477687a9198f7fca329f9f12e64cd
                • Opcode Fuzzy Hash: 8806ccfae76aea09dedceba7b1930d7c97795206eda40efdcfb03d1f6b1b84a3
                • Instruction Fuzzy Hash: 3D12CC70A00619DFDF14DFA5C981AEEB7F6FF48304F10452AE886E7255EB3AA910DB50
                APIs
                  • Part of subcall function 00FD4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FD4743,?,?,00FD37AE,?), ref: 00FD4770
                  • Part of subcall function 01034A31: GetFileAttributesW.KERNEL32(?,0103370B), ref: 01034A32
                • FindFirstFileW.KERNEL32(?,?), ref: 01033B89
                • DeleteFileW.KERNEL32(?,?,?,?), ref: 01033BD9
                • FindNextFileW.KERNEL32(00000000,00000010), ref: 01033BEA
                • FindClose.KERNEL32(00000000), ref: 01033C01
                • FindClose.KERNEL32(00000000), ref: 01033C0A
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                • String ID: \*.*
                • API String ID: 2649000838-1173974218
                • Opcode ID: 481f9cae444ac237a549fb4cb16a3a47260e141fe97982fcf0b0508b7d327edf
                • Instruction ID: 2fc309fb25bb13b4ab3a130e0e85c949a3edb9073b32325e3788f3cb8e72002b
                • Opcode Fuzzy Hash: 481f9cae444ac237a549fb4cb16a3a47260e141fe97982fcf0b0508b7d327edf
                • Instruction Fuzzy Hash: 2C31A0310083859FC305FF28D8918AFB7EDBE91204F484D5EF4D586292EB29DA09DB63
                APIs
                  • Part of subcall function 010287E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0102882B
                  • Part of subcall function 010287E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 01028858
                  • Part of subcall function 010287E1: GetLastError.KERNEL32 ref: 01028865
                • ExitWindowsEx.USER32(?,00000000), ref: 010351F9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                • String ID: $@$SeShutdownPrivilege
                • API String ID: 2234035333-194228
                • Opcode ID: 080c367d44749aa838160397c54c74df83d68937f0718ba99c24ea61ffaa6e9f
                • Instruction ID: ceb1a7e4ad2e452794c338378acadcd9c8634324362173b35703e2b569709bb1
                • Opcode Fuzzy Hash: 080c367d44749aa838160397c54c74df83d68937f0718ba99c24ea61ffaa6e9f
                • Instruction Fuzzy Hash: 44012B357912126BF778726C9C8AFBB76DCEB86240F140865FAC3E60E1D5555C008690
                APIs
                • socket.WSOCK32(00000002,00000001,00000006), ref: 010462DC
                • WSAGetLastError.WSOCK32(00000000), ref: 010462EB
                • bind.WSOCK32(00000000,?,00000010), ref: 01046307
                • listen.WSOCK32(00000000,00000005), ref: 01046316
                • WSAGetLastError.WSOCK32(00000000), ref: 01046330
                • closesocket.WSOCK32(00000000), ref: 01046344
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ErrorLast$bindclosesocketlistensocket
                • String ID:
                • API String ID: 1279440585-0
                • Opcode ID: 9278d5e868049b8bc2ae3d50815d9aa327ddda265ceef498e342b81285ffd1a8
                • Instruction ID: 878059b502ee5d63887a872fdc0254a5c52731342b62e2712eba5d2e759c0fe3
                • Opcode Fuzzy Hash: 9278d5e868049b8bc2ae3d50815d9aa327ddda265ceef498e342b81285ffd1a8
                • Instruction Fuzzy Hash: A721F2706002159FCB10EF68C889A7EB7F9EF45720F148169E896E73C1DB79AD00DB51
                APIs
                  • Part of subcall function 00FF0DB6: std::exception::exception.LIBCMT ref: 00FF0DEC
                  • Part of subcall function 00FF0DB6: __CxxThrowException@8.LIBCMT ref: 00FF0E01
                • _memmove.LIBCMT ref: 01020258
                • _memmove.LIBCMT ref: 0102036D
                • _memmove.LIBCMT ref: 01020414
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _memmove$Exception@8Throwstd::exception::exception
                • String ID:
                • API String ID: 1300846289-0
                • Opcode ID: a698ebd642c732d443fe2ee8a706b824bca4b40d31e47cd76581a8819a7b14db
                • Instruction ID: a655db93352f321251eae04be6a83ecefb7a70e73f3e71443595e9fde5a74000
                • Opcode Fuzzy Hash: a698ebd642c732d443fe2ee8a706b824bca4b40d31e47cd76581a8819a7b14db
                • Instruction Fuzzy Hash: 2302CDB1A00219DBCF04DF68D981ABEBBB5EF44304F1480AAF84ADB355EB35D910DB91
                APIs
                  • Part of subcall function 00FD2612: GetWindowLongW.USER32(?,000000EB), ref: 00FD2623
                • DefDlgProcW.USER32(?,?,?,?,?), ref: 00FD19FA
                • GetSysColor.USER32(0000000F), ref: 00FD1A4E
                • SetBkColor.GDI32(?,00000000), ref: 00FD1A61
                  • Part of subcall function 00FD1290: DefDlgProcW.USER32(?,00000020,?), ref: 00FD12D8
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ColorProc$LongWindow
                • String ID:
                • API String ID: 3744519093-0
                • Opcode ID: 9a80bc3b4dda5667b2163f51b4672ddfcdd6ce2b215db735a534f16034374798
                • Instruction ID: c8fe93895bf1cf6cc43cbf42efc0cb6bdd9aa7b595750263fb52e71b9cee70a1
                • Opcode Fuzzy Hash: 9a80bc3b4dda5667b2163f51b4672ddfcdd6ce2b215db735a534f16034374798
                • Instruction Fuzzy Hash: F5A13772106546BAF735AA298C58EBF399EFB42351F1C020BF582D53C5C9298D41B3B2
                APIs
                  • Part of subcall function 01047D8B: inet_addr.WSOCK32(00000000), ref: 01047DB6
                • socket.WSOCK32(00000002,00000002,00000011), ref: 0104679E
                • WSAGetLastError.WSOCK32(00000000), ref: 010467C7
                • bind.WSOCK32(00000000,?,00000010), ref: 01046800
                • WSAGetLastError.WSOCK32(00000000), ref: 0104680D
                • closesocket.WSOCK32(00000000), ref: 01046821
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ErrorLast$bindclosesocketinet_addrsocket
                • String ID:
                • API String ID: 99427753-0
                • Opcode ID: 4287864cd2b2693039bb09a9fa8532c0fc35cdb243be95a1f04b345346ee6e7b
                • Instruction ID: 0f03efba4df27caa18da0ad33785a3a0cb12e1b696646227a94b83e560567582
                • Opcode Fuzzy Hash: 4287864cd2b2693039bb09a9fa8532c0fc35cdb243be95a1f04b345346ee6e7b
                • Instruction Fuzzy Hash: EB41E375A002106FEB10BF68CC86F7E77EAAF05B10F48845DF955AB3C2DA789D019791
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                • String ID:
                • API String ID: 292994002-0
                • Opcode ID: e55a460d8bd0a7df519ebff1d8271ef5af391aabc3f9b62f0173810ec4518fa7
                • Instruction ID: 5fc21f258dfcfdd1f341a6be8bcc1e88c33e4e722c4fdf7f7734962eaa956404
                • Opcode Fuzzy Hash: e55a460d8bd0a7df519ebff1d8271ef5af391aabc3f9b62f0173810ec4518fa7
                • Instruction Fuzzy Hash: 2911E231300211ABEB616F2ADC48A6F7BDDEF44760F448069EDC9D3242CBB898018AA0
                APIs
                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 01028121
                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0102812B
                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0102813A
                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 01028141
                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 01028157
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: HeapInformationToken$AllocErrorLastProcess
                • String ID:
                • API String ID: 44706859-0
                • Opcode ID: aaaaa121cb743bbf8944a61e3a87ff12a66ece0039e20c82b5e32e8c0c8caa26
                • Instruction ID: 96366769b90b7b7d8007f85e5c1e22cad9b135eb0ff358ce014e8752e1834f19
                • Opcode Fuzzy Hash: aaaaa121cb743bbf8944a61e3a87ff12a66ece0039e20c82b5e32e8c0c8caa26
                • Instruction Fuzzy Hash: 97F0C274201325AFEB611FA8EC8DE6B3BECFF4A654B104056F9C5C3180DB6A9800DB60
                APIs
                • CoInitialize.OLE32(00000000), ref: 0103C432
                • CoCreateInstance.OLE32(01062D6C,00000000,00000001,01062BDC,?), ref: 0103C44A
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                • CoUninitialize.OLE32 ref: 0103C6B7
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CreateInitializeInstanceUninitialize_memmove
                • String ID: .lnk
                • API String ID: 2683427295-24824748
                • Opcode ID: 7f6e9a6a5d3449d677d8a8b88e29ad0adc5e5a941ad98417e50613650c5ce81d
                • Instruction ID: 7e46d2581a6369262fde8415c12ed9cc94ae2b9ab52ecec525e85a3cb526cd8f
                • Opcode Fuzzy Hash: 7f6e9a6a5d3449d677d8a8b88e29ad0adc5e5a941ad98417e50613650c5ce81d
                • Instruction Fuzzy Hash: E3A15A71108205AFD300EF54CC81EABB7EDEF88744F04491EF1959B291EBB5E909DB52
                APIs
                • LoadLibraryA.KERNEL32(kernel32.dll,?,00FD4AD0), ref: 00FD4B45
                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00FD4B57
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID: GetNativeSystemInfo$kernel32.dll
                • API String ID: 2574300362-192647395
                • Opcode ID: a25ae9c3c181fe83110fda6ccfc049760857f369f32de18719e1c1da1967d03a
                • Instruction ID: fed0ca14145defcf048eaf2234063fd2ac7c0dd97cbe567166913f4322a62fa0
                • Opcode Fuzzy Hash: a25ae9c3c181fe83110fda6ccfc049760857f369f32de18719e1c1da1967d03a
                • Instruction Fuzzy Hash: E8D01234A10713CFD7209F32D828B0776D5AF56251B15882F98C5DA200E678E880C758
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __itow__swprintf
                • String ID:
                • API String ID: 674341424-0
                • Opcode ID: 4f19a9be96955eb21a481c0be830c168f358559919bfa1e8a20455bddca4e54c
                • Instruction ID: bc02510d84b3bff6f693666802c88f1639f0ebd01c0fdd861e312acba81bf063
                • Opcode Fuzzy Hash: 4f19a9be96955eb21a481c0be830c168f358559919bfa1e8a20455bddca4e54c
                • Instruction Fuzzy Hash: E422DD71A083419FC724DF24C884BAFB7E5AF84710F04492DF99A97391DB79EA04DB92
                APIs
                • CreateToolhelp32Snapshot.KERNEL32 ref: 0104EE3D
                • Process32FirstW.KERNEL32(00000000,?), ref: 0104EE4B
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                • Process32NextW.KERNEL32(00000000,?), ref: 0104EF0B
                • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0104EF1A
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                • String ID:
                • API String ID: 2576544623-0
                • Opcode ID: 8dbe9fac0a76723e2da0dbffde4137d2250cefefcb46ce9e14d2314c2dfb22fa
                • Instruction ID: 7a3144a45852bddffdbd2157446b66afb87c3e0227b25ec1240ba7db90f0a67f
                • Opcode Fuzzy Hash: 8dbe9fac0a76723e2da0dbffde4137d2250cefefcb46ce9e14d2314c2dfb22fa
                • Instruction Fuzzy Hash: 5C517BB1508301ABD320EF24DC81E6BB7E9EF84750F44482EF595972A1EB74E908DB92
                APIs
                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0102E628
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: lstrlen
                • String ID: ($|
                • API String ID: 1659193697-1631851259
                • Opcode ID: 6afabf8243f65b2d8393930a4b702dc1708e13a524871054312cd1aadb69270b
                • Instruction ID: 7a426954a07be8b3c23d5eefe1e51b7272e14680edc472abda852abcaa74233d
                • Opcode Fuzzy Hash: 6afabf8243f65b2d8393930a4b702dc1708e13a524871054312cd1aadb69270b
                • Instruction Fuzzy Hash: 44323775A407159FDB28CF19C4819AAB7F0FF48310B15C4AEE99ADB3A2D770E941CB40
                APIs
                • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0104180A,00000000), ref: 010423E1
                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 01042418
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Internet$AvailableDataFileQueryRead
                • String ID:
                • API String ID: 599397726-0
                • Opcode ID: 290c446fcb374b57f296e85c30f7d382c90f857f05c8fa4c2f68ba0c778a345d
                • Instruction ID: 1b926e4df9211b6123c73aa1bc108d10282c6c500749f192addf23d1045ab83a
                • Opcode Fuzzy Hash: 290c446fcb374b57f296e85c30f7d382c90f857f05c8fa4c2f68ba0c778a345d
                • Instruction Fuzzy Hash: DF41A4B1A04209BFEB109E99ECC5EBFB7FCEB80715F00807AF781A6141DAB59E419650
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0103B343
                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0103B39D
                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0103B3EA
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ErrorMode$DiskFreeSpace
                • String ID:
                • API String ID: 1682464887-0
                • Opcode ID: 92977a4eb4a36396bf87323bf2e5f36c6e0ca1be3c359d5a1050c9ec6595bc5b
                • Instruction ID: bd6851435575aefeb1798e74af02ead1ba998216bc287b299cdc17219480ff68
                • Opcode Fuzzy Hash: 92977a4eb4a36396bf87323bf2e5f36c6e0ca1be3c359d5a1050c9ec6595bc5b
                • Instruction Fuzzy Hash: 64217135A00218EFCB00EFA5D880AEEFBB9FF49314F0480AAE945EB355CB359915DB51
                APIs
                  • Part of subcall function 00FF0DB6: std::exception::exception.LIBCMT ref: 00FF0DEC
                  • Part of subcall function 00FF0DB6: __CxxThrowException@8.LIBCMT ref: 00FF0E01
                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0102882B
                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 01028858
                • GetLastError.KERNEL32 ref: 01028865
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                • String ID:
                • API String ID: 1922334811-0
                • Opcode ID: 88e7dac880d7a7a66dc725599368d57bd1a9ed5df2c2e1fb582e732e683cc70b
                • Instruction ID: ae7efa3b15e58490894ba9c3f0a02dff64789b7a8dd0a7c9daa7414e5b7f4ae1
                • Opcode Fuzzy Hash: 88e7dac880d7a7a66dc725599368d57bd1a9ed5df2c2e1fb582e732e683cc70b
                • Instruction Fuzzy Hash: FB119DB2804305AFE728DFA4EC85D6BB7E8EB04310B24C52EF49583251EB74B8008B60
                APIs
                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 01028774
                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0102878B
                • FreeSid.ADVAPI32(?), ref: 0102879B
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AllocateCheckFreeInitializeMembershipToken
                • String ID:
                • API String ID: 3429775523-0
                • Opcode ID: 869cebc9c2b70708988e5deb585543d9fd08b3e574cc763d93e97b9cabcdbc57
                • Instruction ID: 193928c3ba55e00c6ad6a3354ec87e548d77a6ebaea82b09abf02809f9a5a632
                • Opcode Fuzzy Hash: 869cebc9c2b70708988e5deb585543d9fd08b3e574cc763d93e97b9cabcdbc57
                • Instruction Fuzzy Hash: 7DF04F7591130DBFDF04DFF4DC89AAEBBBCEF08211F0044A9A901E2180D6795A148B50
                APIs
                • FindFirstFileW.KERNEL32(?,?), ref: 0103C6FB
                • FindClose.KERNEL32(00000000), ref: 0103C72B
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Find$CloseFileFirst
                • String ID:
                • API String ID: 2295610775-0
                • Opcode ID: 3584c64584beccf86aa8feb79cc1653401b312c50c892d206b445b3ca0fb4502
                • Instruction ID: a82dc891111c0640c7139f0f19b84f3ad69985c4154a6db42873b3062c1184f9
                • Opcode Fuzzy Hash: 3584c64584beccf86aa8feb79cc1653401b312c50c892d206b445b3ca0fb4502
                • Instruction Fuzzy Hash: B911A1726042009FDB10EF29C844A2EF7E9FF85320F04851EF9A9D7391DB74A801DB81
                APIs
                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,01049468,?,0105FB84,?), ref: 0103A097
                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,01049468,?,0105FB84,?), ref: 0103A0A9
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ErrorFormatLastMessage
                • String ID:
                • API String ID: 3479602957-0
                • Opcode ID: 6f6d9fb9dcb09f5054fb75d80c993f10b7917e24c3798e1f137f59175367b1da
                • Instruction ID: 2f155e299cfed1dd6262fa1a1996a267f4283fcc5ebb015c777c378d81b6bf1b
                • Opcode Fuzzy Hash: 6f6d9fb9dcb09f5054fb75d80c993f10b7917e24c3798e1f137f59175367b1da
                • Instruction Fuzzy Hash: 7AF0823520532EABDB21AEA4CC48FEA776DBF08361F008156F989D7181D6359540CBA1
                APIs
                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,01028309), ref: 010281E0
                • CloseHandle.KERNEL32(?,?,01028309), ref: 010281F2
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AdjustCloseHandlePrivilegesToken
                • String ID:
                • API String ID: 81990902-0
                • Opcode ID: 2db35b9ad3cb82eda3a2243c4c0f9c004a9e2b8591454e43c0bff554de610564
                • Instruction ID: 7e779a6b59f09d755479e4ed2ea6f5c196c8d0990543a32f18f3c493e6aea104
                • Opcode Fuzzy Hash: 2db35b9ad3cb82eda3a2243c4c0f9c004a9e2b8591454e43c0bff554de610564
                • Instruction Fuzzy Hash: BBE0E671011611AFF7252B64EC05D777BEDEF04310714C85DF99584475DB665C90DB10
                APIs
                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00FF8D57,?,?,?,00000001), ref: 00FFA15A
                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00FFA163
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: 318e5d769ebef2fabf6f2dcf7acd6439551ce5aa07acfa46602aa1c59eb37445
                • Instruction ID: 9749f5e08931272b569c6de2ab0fafd139a1b32e9d08a42b93eb135f9ccc598e
                • Opcode Fuzzy Hash: 318e5d769ebef2fabf6f2dcf7acd6439551ce5aa07acfa46602aa1c59eb37445
                • Instruction Fuzzy Hash: EDB0923105430AABEB102F91E909B8A3F68EB44AA2F408010F64D84066CBEB54508B91
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4ea8ad4a3954974332cafbfdcc9f2ead1e904a0e7d10cf53e3b751076275b8e2
                • Instruction ID: 180e4b29c517d128d659c7a0230612a5f79b0f1d89206e04b541820dc1e80c48
                • Opcode Fuzzy Hash: 4ea8ad4a3954974332cafbfdcc9f2ead1e904a0e7d10cf53e3b751076275b8e2
                • Instruction Fuzzy Hash: A932F032D29F054DD7339534C872336A248AFB73D8F15D737E95AB5ABAEB2984835200
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cfbfc5897fc5a961a4f6d83b3553d1658f836966d79ee44531c5b5a9f9bb8f73
                • Instruction ID: 6b99ee05ea5452482335d5ddc54ad36a382d71d72f00c0d8821559431f76c55c
                • Opcode Fuzzy Hash: cfbfc5897fc5a961a4f6d83b3553d1658f836966d79ee44531c5b5a9f9bb8f73
                • Instruction Fuzzy Hash: 94B12330E2AF508DD323A6398835336B64CAFBB2C5F51D71BFC9675D66EB2681834240
                APIs
                • __time64.LIBCMT ref: 0103889B
                  • Part of subcall function 00FF520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,01038F6E,00000000,?,?,?,?,0103911F,00000000,?), ref: 00FF5213
                  • Part of subcall function 00FF520A: __aulldiv.LIBCMT ref: 00FF5233
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Time$FileSystem__aulldiv__time64
                • String ID:
                • API String ID: 2893107130-0
                • Opcode ID: e93233c2c3a5f35b62692009e0af8d1e44d58cdf04d06fc933b28244144c8a74
                • Instruction ID: 6606e7ebb0c05823cdfc2393c175be00bca654c33767bd9cd54e916a25009ce1
                • Opcode Fuzzy Hash: e93233c2c3a5f35b62692009e0af8d1e44d58cdf04d06fc933b28244144c8a74
                • Instruction Fuzzy Hash: C721AF72625610CBC729CF29E451A52B3E5EFA5311F288FADE1F5CB2C0CA39A905CB54
                APIs
                • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 01034C4A
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: mouse_event
                • String ID:
                • API String ID: 2434400541-0
                • Opcode ID: df4d2e6c4cbb2d744c5291c5a6fab7ffed33f9253cdd777b318ed2779518dabc
                • Instruction ID: 68018834b9c42555b6009b95b05c614085aefe23b8c69ad3b3726aa061aeb829
                • Opcode Fuzzy Hash: df4d2e6c4cbb2d744c5291c5a6fab7ffed33f9253cdd777b318ed2779518dabc
                • Instruction Fuzzy Hash: 91D017A517420E68F9EC0A259A2FF7A15CCE380686FC081896281CE1C1A88858408130
                APIs
                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,01028389), ref: 010287D1
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: LogonUser
                • String ID:
                • API String ID: 1244722697-0
                • Opcode ID: 740e41591f62da0644e4ef90406150f6272cce94cc47cdbc3925aab39d1fecff
                • Instruction ID: eb3a0d6d38a6bc8177134d370b3a6fe214c429ece50c9e88f88ae1a16ebb245c
                • Opcode Fuzzy Hash: 740e41591f62da0644e4ef90406150f6272cce94cc47cdbc3925aab39d1fecff
                • Instruction Fuzzy Hash: DED05E3226060EABEF018EA4DC01EAF3B69EB04B01F408111FE15C5090C77AD835AF60
                APIs
                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00FFA12A
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: 16a270f6e82e4bb2e7110b903f30630ef18944159b32d8b186cc9b585f24308a
                • Instruction ID: 3cd324821c728bfacab9b952046202fdaab9eac246179859342eedec31b16944
                • Opcode Fuzzy Hash: 16a270f6e82e4bb2e7110b903f30630ef18944159b32d8b186cc9b585f24308a
                • Instruction Fuzzy Hash: 12A0113000020EAB8B002E82E80888ABFACEA002A0B008020F80C800228BBBA8208A80
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 39ce2fee2afebd5557fbec474e87175a3559582bea3f9286cf8e6ac4bc8cdb3c
                • Instruction ID: bde707faa119f550a56ace1136f8282c6df34c257fcc07c5bcfdb4de4c507c8c
                • Opcode Fuzzy Hash: 39ce2fee2afebd5557fbec474e87175a3559582bea3f9286cf8e6ac4bc8cdb3c
                • Instruction Fuzzy Hash: 1D223A30D041E69BDF38AE1AC8947BC77A1FB01794F288076D9CACB592DB789D82D741
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                • Instruction ID: 828f84964bb3b5388eb9a8c734729e380799cbd3d0ba8f312089bd15ff522b42
                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                • Instruction Fuzzy Hash: 3EC1A7326050974ADF6D863AC47413EFBA16EA27B131E075DD9B3CF1E5EE20C925E620
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                • Instruction ID: fc1163076a6476605917c1afcce2277d59f689cf10d4f9359c0322cb5443d29e
                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                • Instruction Fuzzy Hash: C3C1A2336051974ADF6D463AC47413EFAA16EA27B131A076ED5B3DB1E4EE20C924F620
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                • Instruction ID: b293f2ae56f7e43a865ac2cc7a7162c1db1f053843917be31e4d57a647c03b91
                • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                • Instruction Fuzzy Hash: 92C1C5336050978ADF6D463AC43413EFBB16EA27B131A076DD9B3DB1E4EE10D925E620
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                • Instruction ID: 6909636390c0c3d751931dee37ee810d870c1e821266399ea3afbb09d6ccd4f9
                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                • Instruction Fuzzy Hash: 15C1A33260519789DF2D463AC47413EFBB17EA27B131A076DD5B3DB2E4EE20C925E620
                APIs
                • DeleteObject.GDI32(00000000), ref: 0104785B
                • DeleteObject.GDI32(00000000), ref: 0104786D
                • DestroyWindow.USER32 ref: 0104787B
                • GetDesktopWindow.USER32 ref: 01047895
                • GetWindowRect.USER32(00000000), ref: 0104789C
                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 010479DD
                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 010479ED
                • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01047A35
                • GetClientRect.USER32(00000000,?), ref: 01047A41
                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 01047A7B
                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01047A9D
                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01047AB0
                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01047ABB
                • GlobalLock.KERNEL32(00000000), ref: 01047AC4
                • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01047AD3
                • GlobalUnlock.KERNEL32(00000000), ref: 01047ADC
                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01047AE3
                • GlobalFree.KERNEL32(00000000), ref: 01047AEE
                • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01047B00
                • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,01062CAC,00000000), ref: 01047B16
                • GlobalFree.KERNEL32(00000000), ref: 01047B26
                • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 01047B4C
                • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 01047B6B
                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01047B8D
                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01047D7A
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                • String ID: $AutoIt v3$DISPLAY$static
                • API String ID: 2211948467-2373415609
                • Opcode ID: c37a9f2f7a44af660b07ce26ccf52f64249d8207492f02abd13c0819def462d1
                • Instruction ID: 059c0d53508e58d14c64741c19903a7ab2d1ed33f7d319cf8337aadb31676654
                • Opcode Fuzzy Hash: c37a9f2f7a44af660b07ce26ccf52f64249d8207492f02abd13c0819def462d1
                • Instruction Fuzzy Hash: 55027FB5900209AFDB14EFA8DC89EAF7BB9FF49310F048159F955AB290C7799D01CB60
                APIs
                • CharUpperBuffW.USER32(?,?,0105F910), ref: 01053627
                • IsWindowVisible.USER32(?), ref: 0105364B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: BuffCharUpperVisibleWindow
                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                • API String ID: 4105515805-45149045
                • Opcode ID: 9f386c7f0cb9c41fd0f281d74b4a47f8d1f67c547dceaf0eac63f5700720cf7e
                • Instruction ID: 3a5ccc5c3553a8a9c818ed4b72322c837300043b8c1af779f108f007dc293c36
                • Opcode Fuzzy Hash: 9f386c7f0cb9c41fd0f281d74b4a47f8d1f67c547dceaf0eac63f5700720cf7e
                • Instruction Fuzzy Hash: B0D16B302083059BCB44FF14C955ABFBBE6BF94394F084459EDC25B3A2DB29E90ADB51
                APIs
                • SetTextColor.GDI32(?,00000000), ref: 0105A630
                • GetSysColorBrush.USER32(0000000F), ref: 0105A661
                • GetSysColor.USER32(0000000F), ref: 0105A66D
                • SetBkColor.GDI32(?,000000FF), ref: 0105A687
                • SelectObject.GDI32(?,00000000), ref: 0105A696
                • InflateRect.USER32(?,000000FF,000000FF), ref: 0105A6C1
                • GetSysColor.USER32(00000010), ref: 0105A6C9
                • CreateSolidBrush.GDI32(00000000), ref: 0105A6D0
                • FrameRect.USER32(?,?,00000000), ref: 0105A6DF
                • DeleteObject.GDI32(00000000), ref: 0105A6E6
                • InflateRect.USER32(?,000000FE,000000FE), ref: 0105A731
                • FillRect.USER32(?,?,00000000), ref: 0105A763
                • GetWindowLongW.USER32(?,000000F0), ref: 0105A78E
                  • Part of subcall function 0105A8CA: GetSysColor.USER32(00000012), ref: 0105A903
                  • Part of subcall function 0105A8CA: SetTextColor.GDI32(?,?), ref: 0105A907
                  • Part of subcall function 0105A8CA: GetSysColorBrush.USER32(0000000F), ref: 0105A91D
                  • Part of subcall function 0105A8CA: GetSysColor.USER32(0000000F), ref: 0105A928
                  • Part of subcall function 0105A8CA: GetSysColor.USER32(00000011), ref: 0105A945
                  • Part of subcall function 0105A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0105A953
                  • Part of subcall function 0105A8CA: SelectObject.GDI32(?,00000000), ref: 0105A964
                  • Part of subcall function 0105A8CA: SetBkColor.GDI32(?,00000000), ref: 0105A96D
                  • Part of subcall function 0105A8CA: SelectObject.GDI32(?,?), ref: 0105A97A
                  • Part of subcall function 0105A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0105A999
                  • Part of subcall function 0105A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0105A9B0
                  • Part of subcall function 0105A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0105A9C5
                  • Part of subcall function 0105A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0105A9ED
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                • String ID:
                • API String ID: 3521893082-0
                • Opcode ID: 80a45d929a693411813a3b08ba6617b39b54c5ec3cc35228649dd34eb3d96a44
                • Instruction ID: 993d6c7c1ed5b96e9102550cdb8b81664754eb4fbebdb0d115e4373fef776143
                • Opcode Fuzzy Hash: 80a45d929a693411813a3b08ba6617b39b54c5ec3cc35228649dd34eb3d96a44
                • Instruction Fuzzy Hash: 29918D72108306EFDB619F64DC08A5B7BE9FF89325F100B19FAA297190D73AD944CB51
                APIs
                • DestroyWindow.USER32(00000000), ref: 010474DE
                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0104759D
                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 010475DB
                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 010475ED
                • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 01047633
                • GetClientRect.USER32(00000000,?), ref: 0104763F
                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 01047683
                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 01047692
                • GetStockObject.GDI32(00000011), ref: 010476A2
                • SelectObject.GDI32(00000000,00000000), ref: 010476A6
                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 010476B6
                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 010476BF
                • DeleteDC.GDI32(00000000), ref: 010476C8
                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 010476F4
                • SendMessageW.USER32(00000030,00000000,00000001), ref: 0104770B
                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 01047746
                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0104775A
                • SendMessageW.USER32(00000404,00000001,00000000), ref: 0104776B
                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0104779B
                • GetStockObject.GDI32(00000011), ref: 010477A6
                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 010477B1
                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 010477BB
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                • API String ID: 2910397461-517079104
                • Opcode ID: 0f8d9389b6f94cfcaa86fd81012c050645c92dacdfb329f8faadeb8a5319b52e
                • Instruction ID: 8ed0947c96259ba1adc5369facb9876a7c88b6e949140ae39929ad91907af914
                • Opcode Fuzzy Hash: 0f8d9389b6f94cfcaa86fd81012c050645c92dacdfb329f8faadeb8a5319b52e
                • Instruction Fuzzy Hash: 81A170B1A00205BFEB24DBA5DC5AFAF7BB9EB05710F044155FA54AB2D0C7B9AD00CB64
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0103AD1E
                • GetDriveTypeW.KERNEL32(?,0105FAC0,?,\\.\,0105F910), ref: 0103ADFB
                • SetErrorMode.KERNEL32(00000000,0105FAC0,?,\\.\,0105F910), ref: 0103AF59
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ErrorMode$DriveType
                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                • API String ID: 2907320926-4222207086
                • Opcode ID: 0ed43d6116b5d06861935c32238b7f00196dcd1ad80196c6183a40caa4820c3c
                • Instruction ID: 82f427ef86258bc7844bac84841cbb1f03aff96073cf68c902e19b882255e01e
                • Opcode Fuzzy Hash: 0ed43d6116b5d06861935c32238b7f00196dcd1ad80196c6183a40caa4820c3c
                • Instruction Fuzzy Hash: 7C51FFB4748205EF8B50FB95C882DBEB7A9EFC8600B94895BE4C3EF2D0D6359901DB51
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __wcsnicmp
                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                • API String ID: 1038674560-86951937
                • Opcode ID: 95744fb93368bbf75d0ee08520d30b01ade1c0860e71bce2b32d7d4aa8259770
                • Instruction ID: bf4a30f0ea59163f4c13bcbfe3bc1f77d7574818bb7f48a280028afe6db07749
                • Opcode Fuzzy Hash: 95744fb93368bbf75d0ee08520d30b01ade1c0860e71bce2b32d7d4aa8259770
                • Instruction Fuzzy Hash: 76815EB16002056ADB11BF25DC52FBF37A9AF04750F084016FE81EA2D2EB74DE05F251
                APIs
                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 01059AD2
                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 01059B8B
                • SendMessageW.USER32(?,00001102,00000002,?), ref: 01059BA7
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$Window
                • String ID: 0
                • API String ID: 2326795674-4108050209
                • Opcode ID: 90c761f730f5ba9e957a9e374ef507c13f06b818dd2442ea47a231f64129aa49
                • Instruction ID: b3d5d63c19252ea6fc0dbccc880e91ebf4629ca88122107337ab3476ab8f453f
                • Opcode Fuzzy Hash: 90c761f730f5ba9e957a9e374ef507c13f06b818dd2442ea47a231f64129aa49
                • Instruction Fuzzy Hash: 9C028B30104301EBEBA58F28C858BABBFE5FF49318F04495DFAD9962A1C779D944CB91
                APIs
                • GetSysColor.USER32(00000012), ref: 0105A903
                • SetTextColor.GDI32(?,?), ref: 0105A907
                • GetSysColorBrush.USER32(0000000F), ref: 0105A91D
                • GetSysColor.USER32(0000000F), ref: 0105A928
                • CreateSolidBrush.GDI32(?), ref: 0105A92D
                • GetSysColor.USER32(00000011), ref: 0105A945
                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0105A953
                • SelectObject.GDI32(?,00000000), ref: 0105A964
                • SetBkColor.GDI32(?,00000000), ref: 0105A96D
                • SelectObject.GDI32(?,?), ref: 0105A97A
                • InflateRect.USER32(?,000000FF,000000FF), ref: 0105A999
                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0105A9B0
                • GetWindowLongW.USER32(00000000,000000F0), ref: 0105A9C5
                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0105A9ED
                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0105AA14
                • InflateRect.USER32(?,000000FD,000000FD), ref: 0105AA32
                • DrawFocusRect.USER32(?,?), ref: 0105AA3D
                • GetSysColor.USER32(00000011), ref: 0105AA4B
                • SetTextColor.GDI32(?,00000000), ref: 0105AA53
                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0105AA67
                • SelectObject.GDI32(?,0105A5FA), ref: 0105AA7E
                • DeleteObject.GDI32(?), ref: 0105AA89
                • SelectObject.GDI32(?,?), ref: 0105AA8F
                • DeleteObject.GDI32(?), ref: 0105AA94
                • SetTextColor.GDI32(?,?), ref: 0105AA9A
                • SetBkColor.GDI32(?,?), ref: 0105AAA4
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                • String ID:
                • API String ID: 1996641542-0
                • Opcode ID: a365819092eaa4e805e09bfc63d374bd0c884939083282d6f624c0483e65946f
                • Instruction ID: b5b6cc9782e14e46c15c96f7e794573cdf399c1c5958a0daddc9f18d68dcec57
                • Opcode Fuzzy Hash: a365819092eaa4e805e09bfc63d374bd0c884939083282d6f624c0483e65946f
                • Instruction Fuzzy Hash: 92516C75900219EFDF219FA8DC48EAF7BB9FF08320F114615FA51AB291D77A9940CB90
                APIs
                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 01058AC1
                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01058AD2
                • CharNextW.USER32(0000014E), ref: 01058B01
                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 01058B42
                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 01058B58
                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01058B69
                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 01058B86
                • SetWindowTextW.USER32(?,0000014E), ref: 01058BD8
                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 01058BEE
                • SendMessageW.USER32(?,00001002,00000000,?), ref: 01058C1F
                • _memset.LIBCMT ref: 01058C44
                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 01058C8D
                • _memset.LIBCMT ref: 01058CEC
                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 01058D16
                • SendMessageW.USER32(?,00001074,?,00000001), ref: 01058D6E
                • SendMessageW.USER32(?,0000133D,?,?), ref: 01058E1B
                • InvalidateRect.USER32(?,00000000,00000001), ref: 01058E3D
                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 01058E87
                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 01058EB4
                • DrawMenuBar.USER32(?), ref: 01058EC3
                • SetWindowTextW.USER32(?,0000014E), ref: 01058EEB
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                • String ID: 0
                • API String ID: 1073566785-4108050209
                • Opcode ID: 014b8902506b759d45e92e8e2244b5f88fc1a63ed245e754d3abce186dd0b17b
                • Instruction ID: 43432b34ae85f7c3b8917398ea212b2a1ede3509c6795e7b4ac1c8195cedd7f5
                • Opcode Fuzzy Hash: 014b8902506b759d45e92e8e2244b5f88fc1a63ed245e754d3abce186dd0b17b
                • Instruction Fuzzy Hash: 73E17470900209EBEF619F65CC88EEF7BB9EF09710F008196FE95AA191D7759680DF60
                APIs
                • GetCursorPos.USER32(?), ref: 010549CA
                • GetDesktopWindow.USER32 ref: 010549DF
                • GetWindowRect.USER32(00000000), ref: 010549E6
                • GetWindowLongW.USER32(?,000000F0), ref: 01054A48
                • DestroyWindow.USER32(?), ref: 01054A74
                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 01054A9D
                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 01054ABB
                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 01054AE1
                • SendMessageW.USER32(?,00000421,?,?), ref: 01054AF6
                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 01054B09
                • IsWindowVisible.USER32(?), ref: 01054B29
                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 01054B44
                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 01054B58
                • GetWindowRect.USER32(?,?), ref: 01054B70
                • MonitorFromPoint.USER32(?,?,00000002), ref: 01054B96
                • GetMonitorInfoW.USER32(00000000,?), ref: 01054BB0
                • CopyRect.USER32(?,?), ref: 01054BC7
                • SendMessageW.USER32(?,00000412,00000000), ref: 01054C32
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                • String ID: ($0$tooltips_class32
                • API String ID: 698492251-4156429822
                • Opcode ID: 8c84c527c586dff63dd06f745a9eb20075d9a009b208c482793054f4f36f2070
                • Instruction ID: aae82d38549bc4f2c0a761e3986b5671d5b055420f0b0b6b9df3f8d3b4a031c5
                • Opcode Fuzzy Hash: 8c84c527c586dff63dd06f745a9eb20075d9a009b208c482793054f4f36f2070
                • Instruction Fuzzy Hash: 54B1AA70608341AFDB84DF68C848BABBBE5BF88314F04891DF9D99B291E775E844CB51
                APIs
                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 010344AC
                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 010344D2
                • _wcscpy.LIBCMT ref: 01034500
                • _wcscmp.LIBCMT ref: 0103450B
                • _wcscat.LIBCMT ref: 01034521
                • _wcsstr.LIBCMT ref: 0103452C
                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 01034548
                • _wcscat.LIBCMT ref: 01034591
                • _wcscat.LIBCMT ref: 01034598
                • _wcsncpy.LIBCMT ref: 010345C3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                • API String ID: 699586101-1459072770
                • Opcode ID: 0192dcd31c0116abf0ae061d5bdacfe013a94b0868981862e3638b8bebd71961
                • Instruction ID: 6e2b8c1cadc807a2879f115b99cd5b92e457ed909c81f0d82aeb5e8ece1b164e
                • Opcode Fuzzy Hash: 0192dcd31c0116abf0ae061d5bdacfe013a94b0868981862e3638b8bebd71961
                • Instruction Fuzzy Hash: 35414B719002097BDB11BA75CC03EBF37ACEF85310F04005AFA40EA193EF7C9A01A6A9
                APIs
                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00FD28BC
                • GetSystemMetrics.USER32(00000007), ref: 00FD28C4
                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00FD28EF
                • GetSystemMetrics.USER32(00000008), ref: 00FD28F7
                • GetSystemMetrics.USER32(00000004), ref: 00FD291C
                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00FD2939
                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00FD2949
                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00FD297C
                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00FD2990
                • GetClientRect.USER32(00000000,000000FF), ref: 00FD29AE
                • GetStockObject.GDI32(00000011), ref: 00FD29CA
                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00FD29D5
                  • Part of subcall function 00FD2344: GetCursorPos.USER32(?), ref: 00FD2357
                  • Part of subcall function 00FD2344: ScreenToClient.USER32(010957B0,?), ref: 00FD2374
                  • Part of subcall function 00FD2344: GetAsyncKeyState.USER32(00000001), ref: 00FD2399
                  • Part of subcall function 00FD2344: GetAsyncKeyState.USER32(00000002), ref: 00FD23A7
                • SetTimer.USER32(00000000,00000000,00000028,00FD1256), ref: 00FD29FC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                • String ID: AutoIt v3 GUI
                • API String ID: 1458621304-248962490
                • Opcode ID: 9ec2d573434d1cf85071f3fa78fe8d38558171b140d7d755e94935efe10a5952
                • Instruction ID: 193cec7b25bf11a12b3ba343cc1b25a1c32be235eecea2d3010a39fa0fceab31
                • Opcode Fuzzy Hash: 9ec2d573434d1cf85071f3fa78fe8d38558171b140d7d755e94935efe10a5952
                • Instruction Fuzzy Hash: 9CB1B171A0020ADFEB25DFA8DC55BAE7BB5FB08310F14421AFA55E72D4CB799801DB90
                APIs
                • CharUpperBuffW.USER32(?,?), ref: 01053E6F
                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 01053F2F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: BuffCharMessageSendUpper
                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                • API String ID: 3974292440-719923060
                • Opcode ID: 396767739963464f8ce54115972e1fc1c9f48aee91e8cb07697ef24364884b2b
                • Instruction ID: a2fc415e34bda96ec6cad314323b60778823d74a7684880a582ff4d59d785598
                • Opcode Fuzzy Hash: 396767739963464f8ce54115972e1fc1c9f48aee91e8cb07697ef24364884b2b
                • Instruction Fuzzy Hash: 40A166302082029BCB54FF24C951AABB7E6BF84354F044859FDE69B392DB79E805DB51
                APIs
                • GetClassNameW.USER32(?,?,00000100), ref: 0102A47A
                • __swprintf.LIBCMT ref: 0102A51B
                • _wcscmp.LIBCMT ref: 0102A52E
                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0102A583
                • _wcscmp.LIBCMT ref: 0102A5BF
                • GetClassNameW.USER32(?,?,00000400), ref: 0102A5F6
                • GetDlgCtrlID.USER32(?), ref: 0102A648
                • GetWindowRect.USER32(?,?), ref: 0102A67E
                • GetParent.USER32(?), ref: 0102A69C
                • ScreenToClient.USER32(00000000), ref: 0102A6A3
                • GetClassNameW.USER32(?,?,00000100), ref: 0102A71D
                • _wcscmp.LIBCMT ref: 0102A731
                • GetWindowTextW.USER32(?,?,00000400), ref: 0102A757
                • _wcscmp.LIBCMT ref: 0102A76B
                  • Part of subcall function 00FF362C: _iswctype.LIBCMT ref: 00FF3634
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                • String ID: %s%u
                • API String ID: 3744389584-679674701
                • Opcode ID: 5801a399314162c0b17761bf0e67a7917c7e195cd9482007159480a50aeb841c
                • Instruction ID: cd90b1e8724918efe90a72708a643f9d6e93edbda2de67271a02ec17cec03e75
                • Opcode Fuzzy Hash: 5801a399314162c0b17761bf0e67a7917c7e195cd9482007159480a50aeb841c
                • Instruction Fuzzy Hash: F4A1C071304726EBDB15DE68C888BAABBE8FF88314F008519EADAC3551DF34E545CB91
                APIs
                • GetClassNameW.USER32(00000008,?,00000400), ref: 0102AF18
                • _wcscmp.LIBCMT ref: 0102AF29
                • GetWindowTextW.USER32(00000001,?,00000400), ref: 0102AF51
                • CharUpperBuffW.USER32(?,00000000), ref: 0102AF6E
                • _wcscmp.LIBCMT ref: 0102AF8C
                • _wcsstr.LIBCMT ref: 0102AF9D
                • GetClassNameW.USER32(00000018,?,00000400), ref: 0102AFD5
                • _wcscmp.LIBCMT ref: 0102AFE5
                • GetWindowTextW.USER32(00000002,?,00000400), ref: 0102B00C
                • GetClassNameW.USER32(00000018,?,00000400), ref: 0102B055
                • _wcscmp.LIBCMT ref: 0102B065
                • GetClassNameW.USER32(00000010,?,00000400), ref: 0102B08D
                • GetWindowRect.USER32(00000004,?), ref: 0102B0F6
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                • String ID: @$ThumbnailClass
                • API String ID: 1788623398-1539354611
                • Opcode ID: 075b1dfa212ca48f9af199d603efdc387a9d611d72dd0ce10259b63702e15ced
                • Instruction ID: 517b9529a8a12f1c95df9705dda4f4fa1a0d156fb3970d57235cedf60ed83962
                • Opcode Fuzzy Hash: 075b1dfa212ca48f9af199d603efdc387a9d611d72dd0ce10259b63702e15ced
                • Instruction Fuzzy Hash: 9C81E47110431A9FDB51DF18C884FAABBD8FF84314F1884AAFEC58A096DB38D945CB61
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __wcsnicmp
                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                • API String ID: 1038674560-1810252412
                • Opcode ID: c3c7ba96b5ac31392d4c4f6cf3c4485ea122de47fdcec48a85b18e0368f4a927
                • Instruction ID: ee8c30b3d723fed9eed73c73856c7f3ef462bf103ae581aa99bc251d81cb985c
                • Opcode Fuzzy Hash: c3c7ba96b5ac31392d4c4f6cf3c4485ea122de47fdcec48a85b18e0368f4a927
                • Instruction Fuzzy Hash: F131F231648219E6DB00FAA4DE43EBEB7A59F50750F30002AF8C27B5A5FE256B049651
                APIs
                • LoadCursorW.USER32(00000000,00007F8A), ref: 01045013
                • LoadCursorW.USER32(00000000,00007F00), ref: 0104501E
                • LoadCursorW.USER32(00000000,00007F03), ref: 01045029
                • LoadCursorW.USER32(00000000,00007F8B), ref: 01045034
                • LoadCursorW.USER32(00000000,00007F01), ref: 0104503F
                • LoadCursorW.USER32(00000000,00007F81), ref: 0104504A
                • LoadCursorW.USER32(00000000,00007F88), ref: 01045055
                • LoadCursorW.USER32(00000000,00007F80), ref: 01045060
                • LoadCursorW.USER32(00000000,00007F86), ref: 0104506B
                • LoadCursorW.USER32(00000000,00007F83), ref: 01045076
                • LoadCursorW.USER32(00000000,00007F85), ref: 01045081
                • LoadCursorW.USER32(00000000,00007F82), ref: 0104508C
                • LoadCursorW.USER32(00000000,00007F84), ref: 01045097
                • LoadCursorW.USER32(00000000,00007F04), ref: 010450A2
                • LoadCursorW.USER32(00000000,00007F02), ref: 010450AD
                • LoadCursorW.USER32(00000000,00007F89), ref: 010450B8
                • GetCursorInfo.USER32(?), ref: 010450C8
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Cursor$Load$Info
                • String ID:
                • API String ID: 2577412497-0
                • Opcode ID: c5d003450d74b4810474b77f568486f51d5f22a02e5da4bd6d92bfb050f108aa
                • Instruction ID: 7a70447a4c6d8c855cd1782e7fd7f09603f7e8f8c763f03bb288d29b74298332
                • Opcode Fuzzy Hash: c5d003450d74b4810474b77f568486f51d5f22a02e5da4bd6d92bfb050f108aa
                • Instruction Fuzzy Hash: C931F4B1D4831A6BDF609FB68C8995FBFE8FF04750F50453AA54DE7280DA7865008F91
                APIs
                • _memset.LIBCMT ref: 0105A259
                • DestroyWindow.USER32(?,?), ref: 0105A2D3
                  • Part of subcall function 00FD7BCC: _memmove.LIBCMT ref: 00FD7C06
                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0105A34D
                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0105A36F
                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0105A382
                • DestroyWindow.USER32(00000000), ref: 0105A3A4
                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00FD0000,00000000), ref: 0105A3DB
                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0105A3F4
                • GetDesktopWindow.USER32 ref: 0105A40D
                • GetWindowRect.USER32(00000000), ref: 0105A414
                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0105A42C
                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0105A444
                  • Part of subcall function 00FD25DB: GetWindowLongW.USER32(?,000000EB), ref: 00FD25EC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                • String ID: 0$tooltips_class32
                • API String ID: 1297703922-3619404913
                • Opcode ID: 717ad4bba265574d223142f8f09c60bac83083441333d08bf008fa8bd0a3d799
                • Instruction ID: 4eb0b9b016f6ee46d4fccadc54391a1858643bdeea53345a33078a0dce05c0c2
                • Opcode Fuzzy Hash: 717ad4bba265574d223142f8f09c60bac83083441333d08bf008fa8bd0a3d799
                • Instruction Fuzzy Hash: DC717E70240205AFEB61DF28CC49F6B7BE5FB88304F04465DF9C59B2A1DB7AA902CB51
                APIs
                  • Part of subcall function 00FD2612: GetWindowLongW.USER32(?,000000EB), ref: 00FD2623
                • DragQueryPoint.SHELL32(?,?), ref: 0105C627
                  • Part of subcall function 0105AB37: ClientToScreen.USER32(?,?), ref: 0105AB60
                  • Part of subcall function 0105AB37: GetWindowRect.USER32(?,?), ref: 0105ABD6
                  • Part of subcall function 0105AB37: PtInRect.USER32(?,?,0105C014), ref: 0105ABE6
                • SendMessageW.USER32(?,000000B0,?,?), ref: 0105C690
                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0105C69B
                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0105C6BE
                • _wcscat.LIBCMT ref: 0105C6EE
                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0105C705
                • SendMessageW.USER32(?,000000B0,?,?), ref: 0105C71E
                • SendMessageW.USER32(?,000000B1,?,?), ref: 0105C735
                • SendMessageW.USER32(?,000000B1,?,?), ref: 0105C757
                • DragFinish.SHELL32(?), ref: 0105C75E
                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0105C851
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                • API String ID: 169749273-3440237614
                • Opcode ID: c0506696cfa41110a398bff7964ec97bfaa519b1819a8ac8cba608479f97d028
                • Instruction ID: 5241e5f0e3b0087592d7bd8215036484fc910bd50fbadd47e88bd89781388bdb
                • Opcode Fuzzy Hash: c0506696cfa41110a398bff7964ec97bfaa519b1819a8ac8cba608479f97d028
                • Instruction Fuzzy Hash: A0615771108301AFDB11EF64CC85DAFBBE9EF88750F00091EF5D1962A1DB75AA09DB62
                APIs
                • VariantInit.OLEAUT32(00000000), ref: 01037D5F
                • VariantCopy.OLEAUT32(00000000,?), ref: 01037D68
                • VariantClear.OLEAUT32(00000000), ref: 01037D74
                • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 01037E62
                • __swprintf.LIBCMT ref: 01037E92
                • VarR8FromDec.OLEAUT32(?,?), ref: 01037EBE
                • VariantInit.OLEAUT32(?), ref: 01037F6F
                • SysFreeString.OLEAUT32(00000016), ref: 01038003
                • VariantClear.OLEAUT32(?), ref: 0103805D
                • VariantClear.OLEAUT32(?), ref: 0103806C
                • VariantInit.OLEAUT32(00000000), ref: 010380AA
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                • String ID: %4d%02d%02d%02d%02d%02d$Default
                • API String ID: 3730832054-3931177956
                • Opcode ID: 96fbe7010532a83e3646eb5429fa0342a8f6e50eb09cab4b9d8e765089254993
                • Instruction ID: 926bb2e984307a80336146abc854480af2db0f0f0ac886eb5a37f8cd567a39aa
                • Opcode Fuzzy Hash: 96fbe7010532a83e3646eb5429fa0342a8f6e50eb09cab4b9d8e765089254993
                • Instruction Fuzzy Hash: 43D117B1600606EBDF10AF65D848B7EBBF9BF85300F048596F5859B284DF79E840CBA1
                APIs
                • CharUpperBuffW.USER32(?,?), ref: 01054424
                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0105446F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: BuffCharMessageSendUpper
                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                • API String ID: 3974292440-4258414348
                • Opcode ID: 9ea3a7c451ddfbf3640690da4c905848e0706026533197ca63b726c51da1cc57
                • Instruction ID: c19c872abc9495cc1f416a348229cc3a352284f046f6951e319bf30996487a9f
                • Opcode Fuzzy Hash: 9ea3a7c451ddfbf3640690da4c905848e0706026533197ca63b726c51da1cc57
                • Instruction Fuzzy Hash: DC919D302047118BCB04FF14C851AAEB7E2AF94754F48485DECD69B3A2DB79EC49DB91
                APIs
                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0105B8B4
                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,010591C2), ref: 0105B910
                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0105B949
                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0105B98C
                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0105B9C3
                • FreeLibrary.KERNEL32(?), ref: 0105B9CF
                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0105B9DF
                • DestroyIcon.USER32(?,?,?,?,?,010591C2), ref: 0105B9EE
                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0105BA0B
                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0105BA17
                  • Part of subcall function 00FF2EFD: __wcsicmp_l.LIBCMT ref: 00FF2F86
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                • String ID: .dll$.exe$.icl
                • API String ID: 1212759294-1154884017
                • Opcode ID: 23a450dd9a02eaaeb38cce6d7046e64b37f8dca615845dfd22f5616634c5e7e8
                • Instruction ID: 79734d28f541dfb41e2add011ff96ecc38e89ede59d0367f80fc1d5ca70be953
                • Opcode Fuzzy Hash: 23a450dd9a02eaaeb38cce6d7046e64b37f8dca615845dfd22f5616634c5e7e8
                • Instruction Fuzzy Hash: B361BC71900219BAEB94DF68CC45BBF7BA9FB08710F10414AFD95D61C1DB79AA80DBA0
                APIs
                • GetLocalTime.KERNEL32(?), ref: 0103DCDC
                • SystemTimeToFileTime.KERNEL32(?,?), ref: 0103DCEC
                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0103DCF8
                • __wsplitpath.LIBCMT ref: 0103DD56
                • _wcscat.LIBCMT ref: 0103DD6E
                • _wcscat.LIBCMT ref: 0103DD80
                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0103DD95
                • SetCurrentDirectoryW.KERNEL32(?), ref: 0103DDA9
                • SetCurrentDirectoryW.KERNEL32(?), ref: 0103DDDB
                • SetCurrentDirectoryW.KERNEL32(?), ref: 0103DDFC
                • _wcscpy.LIBCMT ref: 0103DE08
                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0103DE47
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                • String ID: *.*
                • API String ID: 3566783562-438819550
                • Opcode ID: 156ff71565de9f4c8ea056ab735d71ea85b0729dee01b9a5dc61774aa8f08d17
                • Instruction ID: 057952b4cca27e4cc1013a4947c6b8bea73e2f209843b577aae91dd77ab6bce6
                • Opcode Fuzzy Hash: 156ff71565de9f4c8ea056ab735d71ea85b0729dee01b9a5dc61774aa8f08d17
                • Instruction Fuzzy Hash: ED6179725083069FCB10EFA4C8449AEB7E9FF89310F44481EE9C987251DB75EA05CB92
                APIs
                • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 01039C7F
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 01039CA0
                • __swprintf.LIBCMT ref: 01039CF9
                • __swprintf.LIBCMT ref: 01039D12
                • _wprintf.LIBCMT ref: 01039DB9
                • _wprintf.LIBCMT ref: 01039DD7
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: LoadString__swprintf_wprintf$_memmove
                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                • API String ID: 311963372-3080491070
                • Opcode ID: 87fec9861e60dafd58ab2f0d002350f9386962b8c6d531a09a0db96cfd9a8c1c
                • Instruction ID: ea5290e1eeda587253ddcd68eb6f349f75684883b97c30cb094f9d0c07c98872
                • Opcode Fuzzy Hash: 87fec9861e60dafd58ab2f0d002350f9386962b8c6d531a09a0db96cfd9a8c1c
                • Instruction Fuzzy Hash: C151E23190020AAACF15FBE5DD46EEEBB79EF04300F540066F54576161EB396F58EB60
                APIs
                  • Part of subcall function 00FD9837: __itow.LIBCMT ref: 00FD9862
                  • Part of subcall function 00FD9837: __swprintf.LIBCMT ref: 00FD98AC
                • CharLowerBuffW.USER32(?,?), ref: 0103A3CB
                • GetDriveTypeW.KERNEL32 ref: 0103A418
                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0103A460
                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0103A497
                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0103A4C5
                  • Part of subcall function 00FD7BCC: _memmove.LIBCMT ref: 00FD7C06
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                • API String ID: 2698844021-4113822522
                • Opcode ID: 137ecfa76d71dbf405e6ab5b2a93dccfe4d791f66323523dfe716520e0aeed6d
                • Instruction ID: 07e0f6905b8aec2ffd0648e2596d41b715c7999856eeccdefdce59934b135892
                • Opcode Fuzzy Hash: 137ecfa76d71dbf405e6ab5b2a93dccfe4d791f66323523dfe716520e0aeed6d
                • Instruction Fuzzy Hash: C65139712083059FC700EF25C99186AB7E9EF88718F44885EF8D69B262DB35ED09DB52
                APIs
                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0100E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0102F8DF
                • LoadStringW.USER32(00000000,?,0100E029,00000001), ref: 0102F8E8
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                • GetModuleHandleW.KERNEL32(00000000,01095310,?,00000FFF,?,?,0100E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0102F90A
                • LoadStringW.USER32(00000000,?,0100E029,00000001), ref: 0102F90D
                • __swprintf.LIBCMT ref: 0102F95D
                • __swprintf.LIBCMT ref: 0102F96E
                • _wprintf.LIBCMT ref: 0102FA17
                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0102FA2E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                • API String ID: 984253442-2268648507
                • Opcode ID: 6af9ba9b5a4f910a65032128788258e04ec03d6144330e93bec7221ebb6da32f
                • Instruction ID: 5614410358a3894b1f6f95976345a79bc191bbaea077111674967749910e53d8
                • Opcode Fuzzy Hash: 6af9ba9b5a4f910a65032128788258e04ec03d6144330e93bec7221ebb6da32f
                • Instruction Fuzzy Hash: E5419F7280421EAACF04FFE0DD86DEEB779AF14340F540056F645BA191EA396F09DB61
                APIs
                • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,01059207,?,?), ref: 0105BA56
                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,01059207,?,?,00000000,?), ref: 0105BA6D
                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,01059207,?,?,00000000,?), ref: 0105BA78
                • CloseHandle.KERNEL32(00000000,?,?,?,?,01059207,?,?,00000000,?), ref: 0105BA85
                • GlobalLock.KERNEL32(00000000), ref: 0105BA8E
                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,01059207,?,?,00000000,?), ref: 0105BA9D
                • GlobalUnlock.KERNEL32(00000000), ref: 0105BAA6
                • CloseHandle.KERNEL32(00000000,?,?,?,?,01059207,?,?,00000000,?), ref: 0105BAAD
                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,01059207,?,?,00000000,?), ref: 0105BABE
                • OleLoadPicture.OLEAUT32(?,00000000,00000000,01062CAC,?), ref: 0105BAD7
                • GlobalFree.KERNEL32(00000000), ref: 0105BAE7
                • GetObjectW.GDI32(00000000,00000018,?), ref: 0105BB0B
                • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0105BB36
                • DeleteObject.GDI32(00000000), ref: 0105BB5E
                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0105BB74
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                • String ID:
                • API String ID: 3840717409-0
                • Opcode ID: e51108ac123b12b8a8ce4ecc63c623ec59aff2b1f893d084768f2ea9550c3cb1
                • Instruction ID: ecdfa28aaf714a105a8de844fa02dc7b39b8b8785258f077581693e91e3465f9
                • Opcode Fuzzy Hash: e51108ac123b12b8a8ce4ecc63c623ec59aff2b1f893d084768f2ea9550c3cb1
                • Instruction Fuzzy Hash: 00416775600309AFDB619F69DC88EABBBF9FF89711F104058F989D7254C779AA01CB20
                APIs
                • __wsplitpath.LIBCMT ref: 0103DA10
                • _wcscat.LIBCMT ref: 0103DA28
                • _wcscat.LIBCMT ref: 0103DA3A
                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0103DA4F
                • SetCurrentDirectoryW.KERNEL32(?), ref: 0103DA63
                • GetFileAttributesW.KERNEL32(?), ref: 0103DA7B
                • SetFileAttributesW.KERNEL32(?,00000000), ref: 0103DA95
                • SetCurrentDirectoryW.KERNEL32(?), ref: 0103DAA7
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                • String ID: *.*
                • API String ID: 34673085-438819550
                • Opcode ID: d6c987923a5b1657b91cc7c0251398ae427aca553ae3a89110bea46591c1afe4
                • Instruction ID: 868efb789e188a6b670377d6e9481490799b7163b50b40f19a07d11a83e7b751
                • Opcode Fuzzy Hash: d6c987923a5b1657b91cc7c0251398ae427aca553ae3a89110bea46591c1afe4
                • Instruction Fuzzy Hash: 2981AF715082419FCB64EFA8C8409AEB7E9AFC9310F88486EF9C9C7211E734D945CB52
                APIs
                  • Part of subcall function 00FD2612: GetWindowLongW.USER32(?,000000EB), ref: 00FD2623
                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0105C1FC
                • GetFocus.USER32 ref: 0105C20C
                • GetDlgCtrlID.USER32(00000000), ref: 0105C217
                • _memset.LIBCMT ref: 0105C342
                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0105C36D
                • GetMenuItemCount.USER32(?), ref: 0105C38D
                • GetMenuItemID.USER32(?,00000000), ref: 0105C3A0
                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0105C3D4
                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0105C41C
                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0105C454
                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0105C489
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                • String ID: 0
                • API String ID: 1296962147-4108050209
                • Opcode ID: 49c22b7bd3157a2c5779e56c0a60b58a783e9fd5e8d65d47d787b6bce056d538
                • Instruction ID: eb47b37130210c1fb59ea71c59fa0cd5cf585056a630537ef58f3f30d2db82c4
                • Opcode Fuzzy Hash: 49c22b7bd3157a2c5779e56c0a60b58a783e9fd5e8d65d47d787b6bce056d538
                • Instruction Fuzzy Hash: CC819E701083059FE7A1CF18C984A6BBBE8FB88754F00496EFED597292CB75D904CB62
                APIs
                • GetDC.USER32(00000000), ref: 0104738F
                • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0104739B
                • CreateCompatibleDC.GDI32(?), ref: 010473A7
                • SelectObject.GDI32(00000000,?), ref: 010473B4
                • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 01047408
                • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 01047444
                • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 01047468
                • SelectObject.GDI32(00000006,?), ref: 01047470
                • DeleteObject.GDI32(?), ref: 01047479
                • DeleteDC.GDI32(00000006), ref: 01047480
                • ReleaseDC.USER32(00000000,?), ref: 0104748B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                • String ID: (
                • API String ID: 2598888154-3887548279
                • Opcode ID: 2f1c5bd74709a73888018cbdbf359afeb23b3c086c44f622b5779788a4ae2dac
                • Instruction ID: 7fe0270d2854fd6ae1e533ae3598458725ba839ab098096f4c4c05615c31962a
                • Opcode Fuzzy Hash: 2f1c5bd74709a73888018cbdbf359afeb23b3c086c44f622b5779788a4ae2dac
                • Instruction Fuzzy Hash: 7D512BB5900309EFDB25CFA8C885EAFBBB9EF48310F14852DFA9997210D775A940CB50
                APIs
                  • Part of subcall function 00FF0957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00FD6B0C,?,00008000), ref: 00FF0973
                  • Part of subcall function 00FD4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FD4743,?,?,00FD37AE,?), ref: 00FD4770
                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00FD6BAD
                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FD6CFA
                  • Part of subcall function 00FD586D: _wcscpy.LIBCMT ref: 00FD58A5
                  • Part of subcall function 00FF363D: _iswctype.LIBCMT ref: 00FF3645
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                • API String ID: 537147316-1018226102
                • Opcode ID: ace8b2de2e5fa74ea55c3e584b8405ae386d636edfa659bc25735304128449d5
                • Instruction ID: 025c9271be693580065534449d74cf60228b8b751e85be8234562d30c6718b5c
                • Opcode Fuzzy Hash: ace8b2de2e5fa74ea55c3e584b8405ae386d636edfa659bc25735304128449d5
                • Instruction Fuzzy Hash: 4902BB311083419FD725EF24C880AAFBBE6BF98314F08481EF5C9972A2DB34D949DB52
                APIs
                • _memset.LIBCMT ref: 01032D50
                • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 01032DDD
                • GetMenuItemCount.USER32(01095890), ref: 01032E66
                • DeleteMenu.USER32(01095890,00000005,00000000,000000F5,?,?), ref: 01032EF6
                • DeleteMenu.USER32(01095890,00000004,00000000), ref: 01032EFE
                • DeleteMenu.USER32(01095890,00000006,00000000), ref: 01032F06
                • DeleteMenu.USER32(01095890,00000003,00000000), ref: 01032F0E
                • GetMenuItemCount.USER32(01095890), ref: 01032F16
                • SetMenuItemInfoW.USER32(01095890,00000004,00000000,00000030), ref: 01032F4C
                • GetCursorPos.USER32(?), ref: 01032F56
                • SetForegroundWindow.USER32(00000000), ref: 01032F5F
                • TrackPopupMenuEx.USER32(01095890,00000000,?,00000000,00000000,00000000), ref: 01032F72
                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 01032F7E
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                • String ID:
                • API String ID: 3993528054-0
                • Opcode ID: b4694422944906341c4509977f8dc043d81a1d7c562b629fd559be469dc21487
                • Instruction ID: 6d803edb5ea2c453afc63297c110e15d79a075f0615e5ecb57c65bdd5d3f6848
                • Opcode Fuzzy Hash: b4694422944906341c4509977f8dc043d81a1d7c562b629fd559be469dc21487
                • Instruction Fuzzy Hash: 4871C570600206BEFB219F58DC49FAABFACFF84754F144256F7A5AA1D0C7756820CBA0
                APIs
                  • Part of subcall function 00FD7BCC: _memmove.LIBCMT ref: 00FD7C06
                • _memset.LIBCMT ref: 0102786B
                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 010278A0
                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 010278BC
                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 010278D8
                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 01027902
                • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0102792A
                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 01027935
                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0102793A
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                • API String ID: 1411258926-22481851
                • Opcode ID: 65c37711702cce5ef6b86dab53f0f11b000d7be3ca14969f6152d200a3444dff
                • Instruction ID: 1210fdde078dda5925af774e967a90ad4d8c935ca280c63fd76eec79f119e3b0
                • Opcode Fuzzy Hash: 65c37711702cce5ef6b86dab53f0f11b000d7be3ca14969f6152d200a3444dff
                • Instruction Fuzzy Hash: 81412872C10229AACF21EBA4DC85DEEB7B9FF14710F44406AF945A7261EB399904DB90
                APIs
                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0104FDAD,?,?), ref: 01050E31
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: BuffCharUpper
                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                • API String ID: 3964851224-909552448
                • Opcode ID: d61bc5655e110c49e2555c756a00053cb6d526954fc1a2fa17a7c16bf2c866c8
                • Instruction ID: 7aafd6793aaf7d0b4e70ae08f83670f75a3d1dd402ff48e68a7fa94e3d7fcf90
                • Opcode Fuzzy Hash: d61bc5655e110c49e2555c756a00053cb6d526954fc1a2fa17a7c16bf2c866c8
                • Instruction Fuzzy Hash: 4C41573110424A8BCF81FE18DD61AFF37A0BF41304F144445FCD51B6AADB399919DBA0
                APIs
                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0100E2A0,00000010,?,Bad directive syntax error,0105F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0102F7C2
                • LoadStringW.USER32(00000000,?,0100E2A0,00000010), ref: 0102F7C9
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                • _wprintf.LIBCMT ref: 0102F7FC
                • __swprintf.LIBCMT ref: 0102F81E
                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0102F88D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                • API String ID: 1506413516-4153970271
                • Opcode ID: 44198db8d94a228524dfb96357e83a4cb201430dfbf90f3537d00b8fdc1c9e28
                • Instruction ID: 22f3fb48bbb1a6fbeff84e89e9242f7f884703432c658d0f3686fc2047044c23
                • Opcode Fuzzy Hash: 44198db8d94a228524dfb96357e83a4cb201430dfbf90f3537d00b8fdc1c9e28
                • Instruction Fuzzy Hash: AA21713190421EAFCF11FF90CC0AEFE7779BF18300F04445AF5456A161EA7A9618EB51
                APIs
                  • Part of subcall function 00FD7BCC: _memmove.LIBCMT ref: 00FD7C06
                  • Part of subcall function 00FD7924: _memmove.LIBCMT ref: 00FD79AD
                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 01035330
                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 01035346
                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 01035357
                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 01035369
                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0103537A
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: SendString$_memmove
                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                • API String ID: 2279737902-1007645807
                • Opcode ID: 14c175e53c57600c201bf8ea94522954e4f52ea240ea4f67689d3dcb846db0f3
                • Instruction ID: dacbe4d19e2c8f5880f464fab00a709846778a49ae8cec7dbbff321399b2c5fd
                • Opcode Fuzzy Hash: 14c175e53c57600c201bf8ea94522954e4f52ea240ea4f67689d3dcb846db0f3
                • Instruction Fuzzy Hash: 42110471A9422979D760B676CC4ADFF7BBCFFD5B00F84445BB481AA1A1EAA04804C5A0
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                • String ID: 0.0.0.0
                • API String ID: 208665112-3771769585
                • Opcode ID: 2373462bc14b5ff5b5fb86be8d6171d4dae7e6ea1c01e78ddcea45a682589456
                • Instruction ID: 736d98169a21622e06da57a78217aabaf552eda9ae5e076a2a73c956ca164dab
                • Opcode Fuzzy Hash: 2373462bc14b5ff5b5fb86be8d6171d4dae7e6ea1c01e78ddcea45a682589456
                • Instruction Fuzzy Hash: A61105315002196BDB61AA349C4AEFF7BBCEF42311F0001AAF5C5DA061EF798981C750
                APIs
                • timeGetTime.WINMM ref: 01034F7A
                  • Part of subcall function 00FF049F: timeGetTime.WINMM(?,7694B400,00FE0E7B), ref: 00FF04A3
                • Sleep.KERNEL32(0000000A), ref: 01034FA6
                • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 01034FCA
                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 01034FEC
                • SetActiveWindow.USER32 ref: 0103500B
                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 01035019
                • SendMessageW.USER32(00000010,00000000,00000000), ref: 01035038
                • Sleep.KERNEL32(000000FA), ref: 01035043
                • IsWindow.USER32 ref: 0103504F
                • EndDialog.USER32(00000000), ref: 01035060
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                • String ID: BUTTON
                • API String ID: 1194449130-3405671355
                • Opcode ID: 22c62ac847ce5be3cbf6916a0875264d21656e9e1bd75f8e2c82eb91778b2fab
                • Instruction ID: f987fb31edc589b5390cdd2edb2885bf9076feffcc8416eb68b22318887fabcb
                • Opcode Fuzzy Hash: 22c62ac847ce5be3cbf6916a0875264d21656e9e1bd75f8e2c82eb91778b2fab
                • Instruction Fuzzy Hash: 47215070204206AFE7315F35EC98B2B7BADFB8B745F091014F2C5861A9DB6F8D509761
                APIs
                  • Part of subcall function 00FD9837: __itow.LIBCMT ref: 00FD9862
                  • Part of subcall function 00FD9837: __swprintf.LIBCMT ref: 00FD98AC
                • CoInitialize.OLE32(00000000), ref: 0103D5EA
                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0103D67D
                • SHGetDesktopFolder.SHELL32(?), ref: 0103D691
                • CoCreateInstance.OLE32(01062D7C,00000000,00000001,01088C1C,?), ref: 0103D6DD
                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0103D74C
                • CoTaskMemFree.OLE32(?,?), ref: 0103D7A4
                • _memset.LIBCMT ref: 0103D7E1
                • SHBrowseForFolderW.SHELL32(?), ref: 0103D81D
                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0103D840
                • CoTaskMemFree.OLE32(00000000), ref: 0103D847
                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0103D87E
                • CoUninitialize.OLE32(00000001,00000000), ref: 0103D880
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                • String ID:
                • API String ID: 1246142700-0
                • Opcode ID: 89a50567242562763eb8236078ae25f919028e40a8d31465a99a6d809f71c612
                • Instruction ID: 5a7eb7bf748676967966bd5e051c0a5e3eff2ea08d14a28ec2ce63dc201981a9
                • Opcode Fuzzy Hash: 89a50567242562763eb8236078ae25f919028e40a8d31465a99a6d809f71c612
                • Instruction Fuzzy Hash: 1CB11B75A00209AFDB04DFA4C888DAEBBF9FF88314F148499E949EB251DB35ED41DB50
                APIs
                • GetDlgItem.USER32(?,00000001), ref: 0102C283
                • GetWindowRect.USER32(00000000,?), ref: 0102C295
                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0102C2F3
                • GetDlgItem.USER32(?,00000002), ref: 0102C2FE
                • GetWindowRect.USER32(00000000,?), ref: 0102C310
                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0102C364
                • GetDlgItem.USER32(?,000003E9), ref: 0102C372
                • GetWindowRect.USER32(00000000,?), ref: 0102C383
                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0102C3C6
                • GetDlgItem.USER32(?,000003EA), ref: 0102C3D4
                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0102C3F1
                • InvalidateRect.USER32(?,00000000,00000001), ref: 0102C3FE
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$ItemMoveRect$Invalidate
                • String ID:
                • API String ID: 3096461208-0
                • Opcode ID: 578770f04baf3c24b387d9109eb359adda2e0c6e0063bb7bf56524b8a445aa52
                • Instruction ID: 17953bcb2d62aadc9fef68bd371ee5faca215f324c6bd3dc989590b9704cb3d3
                • Opcode Fuzzy Hash: 578770f04baf3c24b387d9109eb359adda2e0c6e0063bb7bf56524b8a445aa52
                • Instruction Fuzzy Hash: 2D516171B00205ABDB18CFADDD89A6EBBB9EB88310F14856DF515D7294DB7599008B10
                APIs
                  • Part of subcall function 00FD1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00FD2036,?,00000000,?,?,?,?,00FD16CB,00000000,?), ref: 00FD1B9A
                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00FD20D3
                • KillTimer.USER32(-00000001,?,?,?,?,00FD16CB,00000000,?,?,00FD1AE2,?,?), ref: 00FD216E
                • DestroyAcceleratorTable.USER32(00000000), ref: 0100BCA6
                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00FD16CB,00000000,?,?,00FD1AE2,?,?), ref: 0100BCD7
                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00FD16CB,00000000,?,?,00FD1AE2,?,?), ref: 0100BCEE
                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00FD16CB,00000000,?,?,00FD1AE2,?,?), ref: 0100BD0A
                • DeleteObject.GDI32(00000000), ref: 0100BD1C
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                • String ID:
                • API String ID: 641708696-0
                • Opcode ID: 571f70944787597d21982e2f19a07e885a676c95c4e3e781c4f1cf4b9092b544
                • Instruction ID: 595f3bf3343769f62b45bb3d48b5de712d32114cc4c6f1523b7efae26d0d3271
                • Opcode Fuzzy Hash: 571f70944787597d21982e2f19a07e885a676c95c4e3e781c4f1cf4b9092b544
                • Instruction Fuzzy Hash: 1C61E135504701DFDB76AF19D858B2AB7F2FF50312F18841BE1C25B6A4C77AA881EB81
                APIs
                  • Part of subcall function 00FD25DB: GetWindowLongW.USER32(?,000000EB), ref: 00FD25EC
                • GetSysColor.USER32(0000000F), ref: 00FD21D3
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ColorLongWindow
                • String ID:
                • API String ID: 259745315-0
                • Opcode ID: dd6ce67b00c360bbf61be0a523a4c63005d0de3b6ba125be56ab530e9a9477e1
                • Instruction ID: d0617f74fdceb1b888ef93cdac3476a90697b76be749442de5f6437b60172118
                • Opcode Fuzzy Hash: dd6ce67b00c360bbf61be0a523a4c63005d0de3b6ba125be56ab530e9a9477e1
                • Instruction Fuzzy Hash: 7B41BC354042409FEF665F28DC48BB93B66EB16332F184356FEA58B2D5C7368C41EB61
                APIs
                • CharLowerBuffW.USER32(?,?,0105F910), ref: 0103A90B
                • GetDriveTypeW.KERNEL32(00000061,010889A0,00000061), ref: 0103A9D5
                • _wcscpy.LIBCMT ref: 0103A9FF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: BuffCharDriveLowerType_wcscpy
                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                • API String ID: 2820617543-1000479233
                • Opcode ID: 426f97a7d1b518d44519360239b437dfda0ae7e6a171f97f39ba97df6936c768
                • Instruction ID: cfe52b22864e2ef5afb0056c1f81ac7d3ce7eaf94f0a1f6b204f9f7549db78c4
                • Opcode Fuzzy Hash: 426f97a7d1b518d44519360239b437dfda0ae7e6a171f97f39ba97df6936c768
                • Instruction Fuzzy Hash: 56519C352183019BC300EF14CD92AAFB7EAFF84740F48485EF5D5AB2A2DB759909CA52
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __i64tow__itow__swprintf
                • String ID: %.15g$0x%p$False$True
                • API String ID: 421087845-2263619337
                • Opcode ID: 86bcc1956265985d3d999fecffe50cf7dabc379f74f8684356061853de162271
                • Instruction ID: 6cc1b7422c8d38d06c675051e1fcd8c9dbb18da2bf4d3ae414687b5082378cf2
                • Opcode Fuzzy Hash: 86bcc1956265985d3d999fecffe50cf7dabc379f74f8684356061853de162271
                • Instruction Fuzzy Hash: 4B41297150420A9FEB25DF78DC42E7A77E9EF05700F2444AFE689CB392EA769901B710
                APIs
                • _memset.LIBCMT ref: 0105716A
                • CreateMenu.USER32 ref: 01057185
                • SetMenu.USER32(?,00000000), ref: 01057194
                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01057221
                • IsMenu.USER32(?), ref: 01057237
                • CreatePopupMenu.USER32 ref: 01057241
                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0105726E
                • DrawMenuBar.USER32 ref: 01057276
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                • String ID: 0$F
                • API String ID: 176399719-3044882817
                • Opcode ID: e061f2ecdf6838ac3ed90e1f5eab84f0d861ee0b2ef59c2901c7ad271e37bc34
                • Instruction ID: 76a394c2a260d7a13ae01b9f43292ea24f4f66ffd94359b021874a8b77c11846
                • Opcode Fuzzy Hash: e061f2ecdf6838ac3ed90e1f5eab84f0d861ee0b2ef59c2901c7ad271e37bc34
                • Instruction Fuzzy Hash: DA414574A01209AFDB61DF68D884E9ABBF5FF08350F144069FE85A7351D736A910DB90
                APIs
                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0105755E
                • CreateCompatibleDC.GDI32(00000000), ref: 01057565
                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 01057578
                • SelectObject.GDI32(00000000,00000000), ref: 01057580
                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0105758B
                • DeleteDC.GDI32(00000000), ref: 01057594
                • GetWindowLongW.USER32(?,000000EC), ref: 0105759E
                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 010575B2
                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 010575BE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                • String ID: static
                • API String ID: 2559357485-2160076837
                • Opcode ID: 3f90998b8ebb5936406213ddc7976195d59e591fd07e4881cb409ffb08d87716
                • Instruction ID: ee28f2efc9fbf0bbea967d4dc6b39402e49a043815530130ca62777c450ad628
                • Opcode Fuzzy Hash: 3f90998b8ebb5936406213ddc7976195d59e591fd07e4881cb409ffb08d87716
                • Instruction Fuzzy Hash: E4315A72101216ABDF629F68DC08FDB3BA9FF09364F110215FA9596190CB7AD811DBA4
                APIs
                • _memset.LIBCMT ref: 00FF6E3E
                  • Part of subcall function 00FF8B28: __getptd_noexit.LIBCMT ref: 00FF8B28
                • __gmtime64_s.LIBCMT ref: 00FF6ED7
                • __gmtime64_s.LIBCMT ref: 00FF6F0D
                • __gmtime64_s.LIBCMT ref: 00FF6F2A
                • __allrem.LIBCMT ref: 00FF6F80
                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FF6F9C
                • __allrem.LIBCMT ref: 00FF6FB3
                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FF6FD1
                • __allrem.LIBCMT ref: 00FF6FE8
                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FF7006
                • __invoke_watson.LIBCMT ref: 00FF7077
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                • String ID:
                • API String ID: 384356119-0
                • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                • Instruction ID: 66bae7601b4116fa0d7b1a8eb6a80517846498271fbce7dddb163498c1469da8
                • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                • Instruction Fuzzy Hash: 2E711876E0071BABE715AF68DC41BBAB7A8AF14734F14422AE614E72D0EF70DD409790
                APIs
                • _memset.LIBCMT ref: 01032542
                • GetMenuItemInfoW.USER32(01095890,000000FF,00000000,00000030), ref: 010325A3
                • SetMenuItemInfoW.USER32(01095890,00000004,00000000,00000030), ref: 010325D9
                • Sleep.KERNEL32(000001F4), ref: 010325EB
                • GetMenuItemCount.USER32(?), ref: 0103262F
                • GetMenuItemID.USER32(?,00000000), ref: 0103264B
                • GetMenuItemID.USER32(?,-00000001), ref: 01032675
                • GetMenuItemID.USER32(?,?), ref: 010326BA
                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 01032700
                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01032714
                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01032735
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                • String ID:
                • API String ID: 4176008265-0
                • Opcode ID: 991942cd0ba31c3db7a0ac84989ee786486431f006671fded5a017c93e18b551
                • Instruction ID: abb67981537220ccea233c10ff1bd384a52c7388e78f7cb33a6a61911ff1c0d4
                • Opcode Fuzzy Hash: 991942cd0ba31c3db7a0ac84989ee786486431f006671fded5a017c93e18b551
                • Instruction Fuzzy Hash: 8A61817490024AAFDB22DF68D988DBF7BBCFF85304F140499E9C2A7251D736A905DB21
                APIs
                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 01056FA5
                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 01056FA8
                • GetWindowLongW.USER32(?,000000F0), ref: 01056FCC
                • _memset.LIBCMT ref: 01056FDD
                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 01056FEF
                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 01057067
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$LongWindow_memset
                • String ID:
                • API String ID: 830647256-0
                • Opcode ID: 602ec4ccce10a371ddb8636cda9f83dff5f92b16a0947cff42ae3d7da46c4f96
                • Instruction ID: c0736cda12637e23ac1e64482e08798dc9ec1dd24855a43fed18894ac1352da3
                • Opcode Fuzzy Hash: 602ec4ccce10a371ddb8636cda9f83dff5f92b16a0947cff42ae3d7da46c4f96
                • Instruction Fuzzy Hash: DC618E75900208AFDB11DFA8CC80EEF77F9EF09710F50019AFA54AB291C775A941DBA0
                APIs
                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 01026BBF
                • SafeArrayAllocData.OLEAUT32(?), ref: 01026C18
                • VariantInit.OLEAUT32(?), ref: 01026C2A
                • SafeArrayAccessData.OLEAUT32(?,?), ref: 01026C4A
                • VariantCopy.OLEAUT32(?,?), ref: 01026C9D
                • SafeArrayUnaccessData.OLEAUT32(?), ref: 01026CB1
                • VariantClear.OLEAUT32(?), ref: 01026CC6
                • SafeArrayDestroyData.OLEAUT32(?), ref: 01026CD3
                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 01026CDC
                • VariantClear.OLEAUT32(?), ref: 01026CEE
                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 01026CF9
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                • String ID:
                • API String ID: 2706829360-0
                • Opcode ID: e06e683ddab3b3461b92e2b3ba8019b6d6dd09d4a68701556d19f482d37c68b0
                • Instruction ID: 1fb1d93079246cf2e21e666322980c226a287e396860f0089e8d2cf37520a684
                • Opcode Fuzzy Hash: e06e683ddab3b3461b92e2b3ba8019b6d6dd09d4a68701556d19f482d37c68b0
                • Instruction Fuzzy Hash: D8413175D0021E9FCF10EFA8D8449EEBFB9EF08354F108069E995A7251CB3AA945CF90
                APIs
                • GetKeyboardState.USER32(?), ref: 0102FD31
                • GetAsyncKeyState.USER32(000000A0), ref: 0102FDB2
                • GetKeyState.USER32(000000A0), ref: 0102FDCD
                • GetAsyncKeyState.USER32(000000A1), ref: 0102FDE7
                • GetKeyState.USER32(000000A1), ref: 0102FDFC
                • GetAsyncKeyState.USER32(00000011), ref: 0102FE14
                • GetKeyState.USER32(00000011), ref: 0102FE26
                • GetAsyncKeyState.USER32(00000012), ref: 0102FE3E
                • GetKeyState.USER32(00000012), ref: 0102FE50
                • GetAsyncKeyState.USER32(0000005B), ref: 0102FE68
                • GetKeyState.USER32(0000005B), ref: 0102FE7A
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: State$Async$Keyboard
                • String ID:
                • API String ID: 541375521-0
                • Opcode ID: 9d031e0bafc1ad5d3c9e3c14dbbb2365eeac8fa3886f31eb727850b9ecc6baff
                • Instruction ID: 3b301d789f7501dfad777633abdc260569f8fb0af1264303efe75245dbbf0833
                • Opcode Fuzzy Hash: 9d031e0bafc1ad5d3c9e3c14dbbb2365eeac8fa3886f31eb727850b9ecc6baff
                • Instruction Fuzzy Hash: C741D6745047DB69FFB3AA6884043B6BEF16F01784F0840D9D6D6871C3EBE995C887A2
                APIs
                  • Part of subcall function 00FD9837: __itow.LIBCMT ref: 00FD9862
                  • Part of subcall function 00FD9837: __swprintf.LIBCMT ref: 00FD98AC
                • CoInitialize.OLE32 ref: 01048403
                • CoUninitialize.OLE32 ref: 0104840E
                • CoCreateInstance.OLE32(?,00000000,00000017,01062BEC,?), ref: 0104846E
                • IIDFromString.OLE32(?,?), ref: 010484E1
                • VariantInit.OLEAUT32(?), ref: 0104857B
                • VariantClear.OLEAUT32(?), ref: 010485DC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                • API String ID: 834269672-1287834457
                • Opcode ID: 2b8e9f77b42fa9a8df8b09e99a79757162d916a8097a1dd1067d6d518ea9a178
                • Instruction ID: 611462534cd02ac8a709d807e74979c6e3f74b39b8b96a02506d4e3ff52da265
                • Opcode Fuzzy Hash: 2b8e9f77b42fa9a8df8b09e99a79757162d916a8097a1dd1067d6d518ea9a178
                • Instruction Fuzzy Hash: FF6191B06083129FD711DF94C888B6EBBE4AF85754F04886EF9C19B291CB74ED44CB92
                APIs
                • WSAStartup.WSOCK32(00000101,?), ref: 01045793
                • inet_addr.WSOCK32(?), ref: 010457D8
                • gethostbyname.WSOCK32(?), ref: 010457E4
                • IcmpCreateFile.IPHLPAPI ref: 010457F2
                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 01045862
                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 01045878
                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 010458ED
                • WSACleanup.WSOCK32 ref: 010458F3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                • String ID: Ping
                • API String ID: 1028309954-2246546115
                • Opcode ID: f68df6a119cda88361874813ebb3bab7d808e43a4f5717b331e3e1116971b0ab
                • Instruction ID: 544125c872351bd07cbfa5ce78f4a8aa0c47eccd8abbaf747c220b27f8f9408c
                • Opcode Fuzzy Hash: f68df6a119cda88361874813ebb3bab7d808e43a4f5717b331e3e1116971b0ab
                • Instruction Fuzzy Hash: FC516E716043019FEB21EF68DC85B2A7BE4EF49720F04456AF996EB291DB74E900DB42
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0103B4D0
                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0103B546
                • GetLastError.KERNEL32 ref: 0103B550
                • SetErrorMode.KERNEL32(00000000,READY), ref: 0103B5BD
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Error$Mode$DiskFreeLastSpace
                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                • API String ID: 4194297153-14809454
                • Opcode ID: 56b5cd28c616e1d3bc579222d024fb73d49ec2235eeade5d7d4c462e7c7dec67
                • Instruction ID: e7c64cd5fd1b297d376fc887f1f9cd862ecddfcda0148b41e146a4a622d0c0be
                • Opcode Fuzzy Hash: 56b5cd28c616e1d3bc579222d024fb73d49ec2235eeade5d7d4c462e7c7dec67
                • Instruction Fuzzy Hash: 9631C435A00205EFDB10EF68C885FAEBBB8FF85314F44815AE682DB2D1DB759A01CB41
                APIs
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                  • Part of subcall function 0102AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0102AABC
                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 01029014
                • GetDlgCtrlID.USER32 ref: 0102901F
                • GetParent.USER32 ref: 0102903B
                • SendMessageW.USER32(00000000,?,00000111,?), ref: 0102903E
                • GetDlgCtrlID.USER32(?), ref: 01029047
                • GetParent.USER32(?), ref: 01029063
                • SendMessageW.USER32(00000000,?,?,00000111), ref: 01029066
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$CtrlParent$ClassName_memmove
                • String ID: ComboBox$ListBox
                • API String ID: 1536045017-1403004172
                • Opcode ID: 977716ba1b5d4acd6a1ea54fc95cfdcc3f55a493fb736001296379723ebc1c8d
                • Instruction ID: 83d862c6acafcf2b7e50e9b03003548b17ed7d8a94998724de442db67bc7559e
                • Opcode Fuzzy Hash: 977716ba1b5d4acd6a1ea54fc95cfdcc3f55a493fb736001296379723ebc1c8d
                • Instruction Fuzzy Hash: 1A210370A00219BFDF10ABA4CC84EFEBBB5EF49310F00015AF9A1972A1DB3E5418DB20
                APIs
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                  • Part of subcall function 0102AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0102AABC
                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 010290FD
                • GetDlgCtrlID.USER32 ref: 01029108
                • GetParent.USER32 ref: 01029124
                • SendMessageW.USER32(00000000,?,00000111,?), ref: 01029127
                • GetDlgCtrlID.USER32(?), ref: 01029130
                • GetParent.USER32(?), ref: 0102914C
                • SendMessageW.USER32(00000000,?,?,00000111), ref: 0102914F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$CtrlParent$ClassName_memmove
                • String ID: ComboBox$ListBox
                • API String ID: 1536045017-1403004172
                • Opcode ID: 79ebb097f371f1d1aabf7b63f4d955c0b7acef9d0143eceebfe83b15a94fc206
                • Instruction ID: 81079a0b8e0a87790135ae729015f38da67b15fb5b9f58a55d16c2a40cbbb655
                • Opcode Fuzzy Hash: 79ebb097f371f1d1aabf7b63f4d955c0b7acef9d0143eceebfe83b15a94fc206
                • Instruction Fuzzy Hash: 9321C574A00219BBDF11ABA5CC85EFEBBB5EF48300F10405AF991972A5DB7E9419DB20
                APIs
                • GetParent.USER32 ref: 0102916F
                • GetClassNameW.USER32(00000000,?,00000100), ref: 01029184
                • _wcscmp.LIBCMT ref: 01029196
                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 01029211
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ClassMessageNameParentSend_wcscmp
                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                • API String ID: 1704125052-3381328864
                • Opcode ID: 37ac460dc6d41c8ad4a78e28ee8ebae1b3a6d56794bd463661746080a2d5e6dd
                • Instruction ID: d6be6afb31adff16393be1cb8745aeae8f02233d404d4531ef08182643489310
                • Opcode Fuzzy Hash: 37ac460dc6d41c8ad4a78e28ee8ebae1b3a6d56794bd463661746080a2d5e6dd
                • Instruction Fuzzy Hash: 57115C3624833BB9FB213529DC0ADB737DC9F05324F30005AFAD0E40A7FE6655115694
                APIs
                • VariantInit.OLEAUT32(?), ref: 010488D7
                • CoInitialize.OLE32(00000000), ref: 01048904
                • CoUninitialize.OLE32 ref: 0104890E
                • GetRunningObjectTable.OLE32(00000000,?), ref: 01048A0E
                • SetErrorMode.KERNEL32(00000001,00000029), ref: 01048B3B
                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,01062C0C), ref: 01048B6F
                • CoGetObject.OLE32(?,00000000,01062C0C,?), ref: 01048B92
                • SetErrorMode.KERNEL32(00000000), ref: 01048BA5
                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 01048C25
                • VariantClear.OLEAUT32(?), ref: 01048C35
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                • String ID:
                • API String ID: 2395222682-0
                • Opcode ID: 9cd3b032615dca1fa8dde0fbe7dc0a7c158bf22fbba958e70f0dbf433967fab8
                • Instruction ID: 8b49a6f536a067ee5c19482d02b975da4316a996ef7057b09bb2d566958086c0
                • Opcode Fuzzy Hash: 9cd3b032615dca1fa8dde0fbe7dc0a7c158bf22fbba958e70f0dbf433967fab8
                • Instruction Fuzzy Hash: 5BC137B1608305AFD700EFA8C88492BBBE9FF89348F04496DF9859B251D771ED05CB52
                APIs
                • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 01037A6C
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ArraySafeVartype
                • String ID:
                • API String ID: 1725837607-0
                • Opcode ID: e8d7df829ab6a72291b33de39fce40c3031017c6fc67416fae74bb49f5b1be83
                • Instruction ID: cefe169dcb8f44ebc7db5ed35ce67a5863ff7893cd6ef78e81ae5e58780ff240
                • Opcode Fuzzy Hash: e8d7df829ab6a72291b33de39fce40c3031017c6fc67416fae74bb49f5b1be83
                • Instruction Fuzzy Hash: CCB1A4B591020A9FDB11DF98C884BBEBBF8FF89321F144469E681E7251D778E941CB90
                APIs
                • GetSysColor.USER32(00000008), ref: 00FD2231
                • SetTextColor.GDI32(?,000000FF), ref: 00FD223B
                • SetBkMode.GDI32(?,00000001), ref: 00FD2250
                • GetStockObject.GDI32(00000005), ref: 00FD2258
                • GetClientRect.USER32(?), ref: 0100BDBB
                • SendMessageW.USER32(?,00001328,00000000,?), ref: 0100BDD2
                • GetWindowDC.USER32(?), ref: 0100BDDE
                • GetPixel.GDI32(00000000,?,?), ref: 0100BDED
                • ReleaseDC.USER32(?,00000000), ref: 0100BDFF
                • GetSysColor.USER32(00000005), ref: 0100BE1D
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                • String ID:
                • API String ID: 3430376129-0
                • Opcode ID: 2f1cdd54a8dfd768e0a04aa82a3a836f36eaad3c9369fb36fea6729a78ac5f81
                • Instruction ID: 8ecc57d3d278e35a516036b620ff10ef2f6e4d926dbc52cb89ca4dfba41c2f28
                • Opcode Fuzzy Hash: 2f1cdd54a8dfd768e0a04aa82a3a836f36eaad3c9369fb36fea6729a78ac5f81
                • Instruction Fuzzy Hash: 8D217235500206AFEB615F74EC08BAA7BB1EB19332F104265FAA5951E5CB3A0951EF11
                APIs
                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00FDFAA6
                • OleUninitialize.OLE32(?,00000000), ref: 00FDFB45
                • UnregisterHotKey.USER32(?), ref: 00FDFC9C
                • DestroyWindow.USER32(?), ref: 010145D6
                • FreeLibrary.KERNEL32(?), ref: 0101463B
                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 01014668
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                • String ID: close all
                • API String ID: 469580280-3243417748
                • Opcode ID: fe49a0d824e376c4181582b4a751ec2f1c58e1890db9902a0b20639001dc91c3
                • Instruction ID: a1815a946f2a16ad4138bcf2bfbf6485a567f5f34cfc81a1398167db296d7321
                • Opcode Fuzzy Hash: fe49a0d824e376c4181582b4a751ec2f1c58e1890db9902a0b20639001dc91c3
                • Instruction Fuzzy Hash: 34A1BF31701212CFCB29EF14C994E69F7A5BF04714F1442AEE94AAB362CB38AD16DF51
                APIs
                • EnumChildWindows.USER32(?,0102A439), ref: 0102A377
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ChildEnumWindows
                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                • API String ID: 3555792229-1603158881
                • Opcode ID: ba3e22167ea244630445ddcf5d90a979a79528c9ecc5b524e1b8df4fad3a098f
                • Instruction ID: c42325796fcbd268e9e0d4afd1db017f385e8df2433f28742661e521682bc882
                • Opcode Fuzzy Hash: ba3e22167ea244630445ddcf5d90a979a79528c9ecc5b524e1b8df4fad3a098f
                • Instruction Fuzzy Hash: D9911630700626EBDB08EFA8C841BEDFBB5BF04310F54815AE9C9A7651DF346589DB90
                APIs
                • SetWindowLongW.USER32(?,000000EB), ref: 00FD2EAE
                  • Part of subcall function 00FD1DB3: GetClientRect.USER32(?,?), ref: 00FD1DDC
                  • Part of subcall function 00FD1DB3: GetWindowRect.USER32(?,?), ref: 00FD1E1D
                  • Part of subcall function 00FD1DB3: ScreenToClient.USER32(?,?), ref: 00FD1E45
                • GetDC.USER32 ref: 0100CD32
                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0100CD45
                • SelectObject.GDI32(00000000,00000000), ref: 0100CD53
                • SelectObject.GDI32(00000000,00000000), ref: 0100CD68
                • ReleaseDC.USER32(?,00000000), ref: 0100CD70
                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0100CDFB
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                • String ID: U
                • API String ID: 4009187628-3372436214
                • Opcode ID: f71cd0e52c21a6cece7edcc8ef00a1d2c93b9a61e70286ffee0bd68f349ea4ac
                • Instruction ID: 045d05c335e8c1a7bb999026f5566b68ef82f06827ca55b3fbcda2102376f9b6
                • Opcode Fuzzy Hash: f71cd0e52c21a6cece7edcc8ef00a1d2c93b9a61e70286ffee0bd68f349ea4ac
                • Instruction Fuzzy Hash: 2C71C831500205DFEF629F68C984AEA7FB6FF48320F1843EBED955A296C7358841DB60
                APIs
                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 01041A50
                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 01041A7C
                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 01041ABE
                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 01041AD3
                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 01041AE0
                • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 01041B10
                • InternetCloseHandle.WININET(00000000), ref: 01041B57
                  • Part of subcall function 01042483: GetLastError.KERNEL32(?,?,01041817,00000000,00000000,00000001), ref: 01042498
                  • Part of subcall function 01042483: SetEvent.KERNEL32(?,?,01041817,00000000,00000000,00000001), ref: 010424AD
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                • String ID:
                • API String ID: 2603140658-3916222277
                • Opcode ID: e2de2f33190a0c07037e9cdf5a7df8a871a27b5d17213bf43e035b2e48835ec4
                • Instruction ID: 31ff3214860385029943efdd99b4a2a4bfb8ac75aeb7810a8d797c6996a90237
                • Opcode Fuzzy Hash: e2de2f33190a0c07037e9cdf5a7df8a871a27b5d17213bf43e035b2e48835ec4
                • Instruction Fuzzy Hash: 60417FB1500219BFEB129F54CC89FFB7BACFF08354F004166FA859A141E775AA948BA0
                APIs
                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0105F910), ref: 01048D28
                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0105F910), ref: 01048D5C
                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 01048ED6
                • SysFreeString.OLEAUT32(?), ref: 01048F00
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                • String ID:
                • API String ID: 560350794-0
                • Opcode ID: 3b11e7d7f342134c12af2d08474409f127e4c77acdea8e4871fb2814541ae6a3
                • Instruction ID: 6d7828daf0e984e10929807d027ea5f45a67e3aced6b068adc13b19795368657
                • Opcode Fuzzy Hash: 3b11e7d7f342134c12af2d08474409f127e4c77acdea8e4871fb2814541ae6a3
                • Instruction Fuzzy Hash: 28F15EB1A00209EFDF54DF98C884EAEBBB5FF49314F1084A9F945AB251DB31AD45CB50
                APIs
                • _memset.LIBCMT ref: 0104F6B5
                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0104F848
                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0104F86C
                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0104F8AC
                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0104F8CE
                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0104FA4A
                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0104FA7C
                • CloseHandle.KERNEL32(?), ref: 0104FAAB
                • CloseHandle.KERNEL32(?), ref: 0104FB22
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                • String ID:
                • API String ID: 4090791747-0
                • Opcode ID: 5d18af0b5590b3942d83237bd35e652ca82391c335a68c36fde7ad75ddc67c34
                • Instruction ID: 8fc7268fac4884c9491ce326275fd8bd5f65e5336f8e88d27d1a2bc5ce4d32dd
                • Opcode Fuzzy Hash: 5d18af0b5590b3942d83237bd35e652ca82391c335a68c36fde7ad75ddc67c34
                • Instruction Fuzzy Hash: C4E1BE716043429FD714EF28C880A6EBBE1BF85314F18846EF9C58B2A2CB75ED45DB52
                APIs
                  • Part of subcall function 0103466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,01033697,?), ref: 0103468B
                  • Part of subcall function 0103466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,01033697,?), ref: 010346A4
                  • Part of subcall function 01034A31: GetFileAttributesW.KERNEL32(?,0103370B), ref: 01034A32
                • lstrcmpiW.KERNEL32(?,?), ref: 01034D40
                • _wcscmp.LIBCMT ref: 01034D5A
                • MoveFileW.KERNEL32(?,?), ref: 01034D75
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                • String ID:
                • API String ID: 793581249-0
                • Opcode ID: 0b448d82e138c02b97b03f6229a680cb13dc70df95ed2c4caba2d9b6dda0e094
                • Instruction ID: ec898ca6b20a341d38767590e832f54cbd4b661912f7c22bacbf3dd5ffae9991
                • Opcode Fuzzy Hash: 0b448d82e138c02b97b03f6229a680cb13dc70df95ed2c4caba2d9b6dda0e094
                • Instruction Fuzzy Hash: 415150B20083459BC765EBA4DC849EFB7ECAFC4350F04092EA6C9D7151EE75A288C766
                APIs
                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 010586FF
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: InvalidateRect
                • String ID:
                • API String ID: 634782764-0
                • Opcode ID: 0dfc9f8a8397466400f5b75190d02880aa347d0609db541a4829faa100206189
                • Instruction ID: 9e174b3f15feabdabf2d77acd0a32fce722472ea2a136cfc1f369f7cb9015490
                • Opcode Fuzzy Hash: 0dfc9f8a8397466400f5b75190d02880aa347d0609db541a4829faa100206189
                • Instruction Fuzzy Hash: 9651B330500209BEEFA19A2A9C85FAF3FA5FB09750F108153FED1E61A1DB76E550CB61
                APIs
                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0100C2F7
                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0100C319
                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0100C331
                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0100C34F
                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0100C370
                • DestroyIcon.USER32(00000000), ref: 0100C37F
                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0100C39C
                • DestroyIcon.USER32(?), ref: 0100C3AB
                  • Part of subcall function 0105A4AF: DeleteObject.GDI32(00000000), ref: 0105A4E8
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                • String ID:
                • API String ID: 2819616528-0
                • Opcode ID: 7c491a0b6bb17f0b828b9a58822d0b961a44d074379fb10fec4587a7dea6d967
                • Instruction ID: d921df3bb6c0bb4b1b933f53f61b1bb88b9e9a85165bb060b85e86c0d154e960
                • Opcode Fuzzy Hash: 7c491a0b6bb17f0b828b9a58822d0b961a44d074379fb10fec4587a7dea6d967
                • Instruction Fuzzy Hash: C1518D31A10205AFEB61DF24CC45BAA3BE6FB54310F14465AF982972D0DB75A940EB90
                APIs
                  • Part of subcall function 0102A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0102A84C
                  • Part of subcall function 0102A82C: GetCurrentThreadId.KERNEL32 ref: 0102A853
                  • Part of subcall function 0102A82C: AttachThreadInput.USER32(00000000,?,01029683,?,00000001), ref: 0102A85A
                • MapVirtualKeyW.USER32(00000025,00000000), ref: 0102968E
                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 010296AB
                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 010296AE
                • MapVirtualKeyW.USER32(00000025,00000000), ref: 010296B7
                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 010296D5
                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 010296D8
                • MapVirtualKeyW.USER32(00000025,00000000), ref: 010296E1
                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 010296F8
                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 010296FB
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                • String ID:
                • API String ID: 2014098862-0
                • Opcode ID: 1a642ba3f1c54f15452413d899fdaac73d72583821618fb946efcf77fbc69b21
                • Instruction ID: 37ae01af46eef0c4a657efd221394468a1cbfed8262c5f781c44eef0fc402f72
                • Opcode Fuzzy Hash: 1a642ba3f1c54f15452413d899fdaac73d72583821618fb946efcf77fbc69b21
                • Instruction Fuzzy Hash: 1A11C271910229BEF7206B709C49F6B3A5DDB4C754F100415F684AB090C9F75C10CBA8
                APIs
                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0102853C,00000B00,?,?), ref: 0102892A
                • HeapAlloc.KERNEL32(00000000,?,0102853C,00000B00,?,?), ref: 01028931
                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0102853C,00000B00,?,?), ref: 01028946
                • GetCurrentProcess.KERNEL32(?,00000000,?,0102853C,00000B00,?,?), ref: 0102894E
                • DuplicateHandle.KERNEL32(00000000,?,0102853C,00000B00,?,?), ref: 01028951
                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0102853C,00000B00,?,?), ref: 01028961
                • GetCurrentProcess.KERNEL32(0102853C,00000000,?,0102853C,00000B00,?,?), ref: 01028969
                • DuplicateHandle.KERNEL32(00000000,?,0102853C,00000B00,?,?), ref: 0102896C
                • CreateThread.KERNEL32(00000000,00000000,01028992,00000000,00000000,00000000), ref: 01028986
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                • String ID:
                • API String ID: 1957940570-0
                • Opcode ID: 9f6b570b3a51271e31605ef7a8c44be6857f11cf3716a320d9d55bc5a369fb19
                • Instruction ID: 96770bde61cf08d5dce314fdd869729277b243bc2a3a95d5d57bdce687f426ad
                • Opcode Fuzzy Hash: 9f6b570b3a51271e31605ef7a8c44be6857f11cf3716a320d9d55bc5a369fb19
                • Instruction Fuzzy Hash: 4D01B6B5240309BFEB20ABA5DC4DF6B3BACEB89711F408411FA45DB295CA799800CB25
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID: NULL Pointer assignment$Not an Object type
                • API String ID: 0-572801152
                • Opcode ID: e6e109b6f6b5a5390ef60eb28037f22e828978e98ffe018f13fbe44756e4069d
                • Instruction ID: fd48ebd3c5273a1948910264a39633f8c3604dd3b60d4e5a463464fa68a18492
                • Opcode Fuzzy Hash: e6e109b6f6b5a5390ef60eb28037f22e828978e98ffe018f13fbe44756e4069d
                • Instruction Fuzzy Hash: E5C183B1A0021A9BDF20DF59C884AAFB7F5FB48318F148479E985AB281E7719945CB90
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Variant$ClearInit$_memset
                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                • API String ID: 2862541840-625585964
                • Opcode ID: 67d2c070cdc89bb2f92d7861162c65cbfdeef42ac6d122dac95267a05e42e154
                • Instruction ID: 1e4bd05a28d53828f684dd490e5d53da6a5edab667a183190efdc103ab70aabf
                • Opcode Fuzzy Hash: 67d2c070cdc89bb2f92d7861162c65cbfdeef42ac6d122dac95267a05e42e154
                • Instruction Fuzzy Hash: A79194B1A00205ABDF24DF95C888FAFBBB8EF49715F008179F555AB281D7709901CFA0
                APIs
                  • Part of subcall function 0102710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01027044,80070057,?,?,?,01027455), ref: 01027127
                  • Part of subcall function 0102710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01027044,80070057,?,?), ref: 01027142
                  • Part of subcall function 0102710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01027044,80070057,?,?), ref: 01027150
                  • Part of subcall function 0102710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01027044,80070057,?), ref: 01027160
                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 01049806
                • _memset.LIBCMT ref: 01049813
                • _memset.LIBCMT ref: 01049956
                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 01049982
                • CoTaskMemFree.OLE32(?), ref: 0104998D
                Strings
                • NULL Pointer assignment, xrefs: 010499DB
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                • String ID: NULL Pointer assignment
                • API String ID: 1300414916-2785691316
                • Opcode ID: 24b779143ec6cf9a47f62b5609734a98799178d02054196baf8e3a1067e75225
                • Instruction ID: 6df166ff50e51a187317747fd7622486371941895d9b929b7af070c8786bc704
                • Opcode Fuzzy Hash: 24b779143ec6cf9a47f62b5609734a98799178d02054196baf8e3a1067e75225
                • Instruction Fuzzy Hash: 70914AB1D00219EBDF10DFA5DC84EDEBBB9BF08314F10416AE559A7281EB759A44CFA0
                APIs
                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 01056E24
                • SendMessageW.USER32(?,00001036,00000000,?), ref: 01056E38
                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 01056E52
                • _wcscat.LIBCMT ref: 01056EAD
                • SendMessageW.USER32(?,00001057,00000000,?), ref: 01056EC4
                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 01056EF2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$Window_wcscat
                • String ID: SysListView32
                • API String ID: 307300125-78025650
                • Opcode ID: 602b4b16253ad1d756cc0e473053dc49aecc29e8f5eafc030d974c84b8f01ed4
                • Instruction ID: 5dd860c67c00879a3e52313bd5215fe0ac0e420b92da30000d10e3f4da78e8a0
                • Opcode Fuzzy Hash: 602b4b16253ad1d756cc0e473053dc49aecc29e8f5eafc030d974c84b8f01ed4
                • Instruction Fuzzy Hash: F341A370900349ABEB619F68CC45BEF77E9EF08350F50046AF9C497191D6769984CB60
                APIs
                  • Part of subcall function 01033C55: CreateToolhelp32Snapshot.KERNEL32 ref: 01033C7A
                  • Part of subcall function 01033C55: Process32FirstW.KERNEL32(00000000,?), ref: 01033C88
                  • Part of subcall function 01033C55: CloseHandle.KERNEL32(00000000), ref: 01033D52
                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0104E9A4
                • GetLastError.KERNEL32 ref: 0104E9B7
                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0104E9E6
                • TerminateProcess.KERNEL32(00000000,00000000), ref: 0104EA63
                • GetLastError.KERNEL32(00000000), ref: 0104EA6E
                • CloseHandle.KERNEL32(00000000), ref: 0104EAA3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                • String ID: SeDebugPrivilege
                • API String ID: 2533919879-2896544425
                • Opcode ID: 07036f79ba27721a30a28d95be100212a5fd6c1797eef6fa9a1989df6b6fda3c
                • Instruction ID: 6668dc5ad36f655dac17d3cdf3bf83c8c075e5f40d15566c96dd77d2e2697cc6
                • Opcode Fuzzy Hash: 07036f79ba27721a30a28d95be100212a5fd6c1797eef6fa9a1989df6b6fda3c
                • Instruction Fuzzy Hash: A041AC702042019FDB21EF54CC94F6EBBA5BF80714F088459F9829B3C2CBB9A814DB91
                APIs
                • LoadIconW.USER32(00000000,00007F03), ref: 01033033
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: IconLoad
                • String ID: blank$info$question$stop$warning
                • API String ID: 2457776203-404129466
                • Opcode ID: 8700a3b795317d258e1adadcd1eae4daf7df308a45a4b65dc5b31bbfcfaedec6
                • Instruction ID: 5c85fa966a1aceb86f144f148f1f986c9a6024e541f9a00df29eeed629812376
                • Opcode Fuzzy Hash: 8700a3b795317d258e1adadcd1eae4daf7df308a45a4b65dc5b31bbfcfaedec6
                • Instruction Fuzzy Hash: 5F112B3534C34ABEE7159A59DCD2C6FBBDCAF55320B10406AFA80AE182DB755A4056A0
                APIs
                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 01034312
                • LoadStringW.USER32(00000000), ref: 01034319
                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0103432F
                • LoadStringW.USER32(00000000), ref: 01034336
                • _wprintf.LIBCMT ref: 0103435C
                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0103437A
                Strings
                • %s (%d) : ==> %s: %s %s, xrefs: 01034357
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: HandleLoadModuleString$Message_wprintf
                • String ID: %s (%d) : ==> %s: %s %s
                • API String ID: 3648134473-3128320259
                • Opcode ID: 350b8be224b9220bc52fe645e4722d1d5020843c655aef1a8a4b6189a9e32a49
                • Instruction ID: f08482e0275acc221b7c5effc7a3da2f3358f4bdc438e22ff796e574b0b22e57
                • Opcode Fuzzy Hash: 350b8be224b9220bc52fe645e4722d1d5020843c655aef1a8a4b6189a9e32a49
                • Instruction Fuzzy Hash: E00162F2900309BFE761ABA4DD89EFB776CEB08200F404595BB85E6005EA7D5E854B74
                APIs
                  • Part of subcall function 00FD2612: GetWindowLongW.USER32(?,000000EB), ref: 00FD2623
                • GetSystemMetrics.USER32(0000000F), ref: 0105D47C
                • GetSystemMetrics.USER32(0000000F), ref: 0105D49C
                • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0105D6D7
                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0105D6F5
                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0105D716
                • ShowWindow.USER32(00000003,00000000), ref: 0105D735
                • InvalidateRect.USER32(?,00000000,00000001), ref: 0105D75A
                • DefDlgProcW.USER32(?,00000005,?,?), ref: 0105D77D
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                • String ID:
                • API String ID: 1211466189-0
                • Opcode ID: 2f4789f7a0a14ed6a609ffe12303bafff3db7bb86eda16902f1127358c6565c5
                • Instruction ID: 26a5b0b235c8815c23b15a2f6130cb94c212c354b479b67704fb47d40c79201e
                • Opcode Fuzzy Hash: 2f4789f7a0a14ed6a609ffe12303bafff3db7bb86eda16902f1127358c6565c5
                • Instruction Fuzzy Hash: 2DB19D71500219EBDF94CFA8C5857AE7BF1FF08701F0480AAED889F299E735A950CB60
                APIs
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                  • Part of subcall function 01050E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0104FDAD,?,?), ref: 01050E31
                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0104FDEE
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: BuffCharConnectRegistryUpper_memmove
                • String ID:
                • API String ID: 3479070676-0
                • Opcode ID: 5eb2837b8fdf1dc29cf82dfb5408832fa6ccdbf5ded5b957c7cde43527d1ffa5
                • Instruction ID: 34522cbedcfa490bde3c70ce137d0df605226b28ca7d9559e0e7e012a644c1d9
                • Opcode Fuzzy Hash: 5eb2837b8fdf1dc29cf82dfb5408832fa6ccdbf5ded5b957c7cde43527d1ffa5
                • Instruction Fuzzy Hash: D7A18D712042029FDB10EF18C894F6EBBE5AF85314F08885DF9968B292DB79E945DF42
                APIs
                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0100C1C7,00000004,00000000,00000000,00000000), ref: 00FD2ACF
                • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0100C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00FD2B17
                • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0100C1C7,00000004,00000000,00000000,00000000), ref: 0100C21A
                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0100C1C7,00000004,00000000,00000000,00000000), ref: 0100C286
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ShowWindow
                • String ID:
                • API String ID: 1268545403-0
                • Opcode ID: 1fcf1c9cfd519bb81035f8d78a8f711b86fe6dcce52524e46a73f23ffbcf17f0
                • Instruction ID: 915719e7844dfe76929f84c03c893c2da92b74f3710856fc725086621cac5395
                • Opcode Fuzzy Hash: 1fcf1c9cfd519bb81035f8d78a8f711b86fe6dcce52524e46a73f23ffbcf17f0
                • Instruction Fuzzy Hash: 3C41FD317087809AE7B65B288D88B6B7B93FBA5310F5C854BE18786790C67E9841F790
                APIs
                • InterlockedExchange.KERNEL32(?,000001F5), ref: 010370DD
                  • Part of subcall function 00FF0DB6: std::exception::exception.LIBCMT ref: 00FF0DEC
                  • Part of subcall function 00FF0DB6: __CxxThrowException@8.LIBCMT ref: 00FF0E01
                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 01037114
                • EnterCriticalSection.KERNEL32(?), ref: 01037130
                • _memmove.LIBCMT ref: 0103717E
                • _memmove.LIBCMT ref: 0103719B
                • LeaveCriticalSection.KERNEL32(?), ref: 010371AA
                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 010371BF
                • InterlockedExchange.KERNEL32(?,000001F6), ref: 010371DE
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                • String ID:
                • API String ID: 256516436-0
                • Opcode ID: 67855f103edef4f79407a91eeb7f67c865e9ff0616cb644e8e64532181757a3e
                • Instruction ID: 925195b4e83c94d8e58495f847d79ac48a4f74d0e55678610d1eae5a49b9fe5e
                • Opcode Fuzzy Hash: 67855f103edef4f79407a91eeb7f67c865e9ff0616cb644e8e64532181757a3e
                • Instruction Fuzzy Hash: 1831A376900206EBCF10DFA8DC859AFBBB9EF45310F1440A5EA449B256DB399A10DB60
                APIs
                • DeleteObject.GDI32(00000000), ref: 010561EB
                • GetDC.USER32(00000000), ref: 010561F3
                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 010561FE
                • ReleaseDC.USER32(00000000,00000000), ref: 0105620A
                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 01056246
                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 01056257
                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0105902A,?,?,000000FF,00000000,?,000000FF,?), ref: 01056291
                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 010562B1
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                • String ID:
                • API String ID: 3864802216-0
                • Opcode ID: a2cf56f1dcef5aac9f64cf8832768b6c6df0d4f2a0964fc6b99bf6828a7268b4
                • Instruction ID: 92ce285cf8fb2e0cb5ea39b3f612e6da27df7a9e0b74231c061d610fc85d2d00
                • Opcode Fuzzy Hash: a2cf56f1dcef5aac9f64cf8832768b6c6df0d4f2a0964fc6b99bf6828a7268b4
                • Instruction Fuzzy Hash: 11319F721002107FEB218F64CC8AFEB3FA9EF49761F040055FE88DA191C67A9841CB74
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _memcmp
                • String ID:
                • API String ID: 2931989736-0
                • Opcode ID: ec16b1931cde2cf7747c4c0626e3c5bcc0b54bca747e1ab0aba686e699129290
                • Instruction ID: 7a33d955e3797514b2ba63eb5af1cb990132d630ca8e6f2db2ba2cff51c13717
                • Opcode Fuzzy Hash: ec16b1931cde2cf7747c4c0626e3c5bcc0b54bca747e1ab0aba686e699129290
                • Instruction Fuzzy Hash: 9E215B7170122EBBE215B6169D42FFF779CAE61368F084024FF849B647EB68DE10C1A5
                APIs
                  • Part of subcall function 00FD9837: __itow.LIBCMT ref: 00FD9862
                  • Part of subcall function 00FD9837: __swprintf.LIBCMT ref: 00FD98AC
                  • Part of subcall function 00FEFC86: _wcscpy.LIBCMT ref: 00FEFCA9
                • _wcstok.LIBCMT ref: 0103EC94
                • _wcscpy.LIBCMT ref: 0103ED23
                • _memset.LIBCMT ref: 0103ED56
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                • String ID: X
                • API String ID: 774024439-3081909835
                • Opcode ID: 8ba928cb8ac1ebd7596951532531164ad230ccb027dfa4eb116d8a852b6bb15b
                • Instruction ID: 6f67105a132224d6eb6a7fb4a09a26bbe7b294d20df9f9e435675b56f3eac345
                • Opcode Fuzzy Hash: 8ba928cb8ac1ebd7596951532531164ad230ccb027dfa4eb116d8a852b6bb15b
                • Instruction Fuzzy Hash: CBC18D315083019FC754FF68C885A6EB7E5AF85310F08496EF9D99B3A2DB74E805DB82
                APIs
                • __WSAFDIsSet.WSOCK32(00000000,?), ref: 01046C00
                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 01046C21
                • WSAGetLastError.WSOCK32(00000000), ref: 01046C34
                • htons.WSOCK32(?), ref: 01046CEA
                • inet_ntoa.WSOCK32(?), ref: 01046CA7
                  • Part of subcall function 0102A7E9: _strlen.LIBCMT ref: 0102A7F3
                  • Part of subcall function 0102A7E9: _memmove.LIBCMT ref: 0102A815
                • _strlen.LIBCMT ref: 01046D44
                • _memmove.LIBCMT ref: 01046DAD
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                • String ID:
                • API String ID: 3619996494-0
                • Opcode ID: 8980dff4fcb99820a15df9e42ba1fad530fb17c664ff13e4e5f3da6eadff9208
                • Instruction ID: 500e81da729ad1ece2c40255a82091390eafe8b5d9c6db7e4157835949a9c598
                • Opcode Fuzzy Hash: 8980dff4fcb99820a15df9e42ba1fad530fb17c664ff13e4e5f3da6eadff9208
                • Instruction Fuzzy Hash: 4B8100B1508300ABC710FB68CC81E6FB7E9AF85714F04492EF9859B292EB75ED45C792
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7401265f8ce060daf911d7774785de9027c82f67982f84e138bea707a8be9af2
                • Instruction ID: 0a8294fc1c8b76e07f143c871f0853a203f688a243c6977612456e1b3fec0412
                • Opcode Fuzzy Hash: 7401265f8ce060daf911d7774785de9027c82f67982f84e138bea707a8be9af2
                • Instruction Fuzzy Hash: A1716E35900109FFDB15CF98CC48ABE7B79FF86314F28824AF955AB251C7349A51DB60
                APIs
                • IsWindow.USER32(01265228), ref: 0105B3EB
                • IsWindowEnabled.USER32(01265228), ref: 0105B3F7
                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0105B4DB
                • SendMessageW.USER32(01265228,000000B0,?,?), ref: 0105B512
                • IsDlgButtonChecked.USER32(?,?), ref: 0105B54F
                • GetWindowLongW.USER32(01265228,000000EC), ref: 0105B571
                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0105B589
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                • String ID:
                • API String ID: 4072528602-0
                • Opcode ID: aabd42853ce8917db53e1c1254f98edeb96aaada244d7ccdc15640abed308dcd
                • Instruction ID: 2786d198689f279fda07ecbc2bccc462c6ba9fdf79ff1d7ef7e3ba32fd9affe4
                • Opcode Fuzzy Hash: aabd42853ce8917db53e1c1254f98edeb96aaada244d7ccdc15640abed308dcd
                • Instruction Fuzzy Hash: CF715E34604205AFEFB59E59C894BABBFE6FF09300F144099EEC597252CB36B941DB50
                APIs
                • _memset.LIBCMT ref: 0104F448
                • _memset.LIBCMT ref: 0104F511
                • ShellExecuteExW.SHELL32(?), ref: 0104F556
                  • Part of subcall function 00FD9837: __itow.LIBCMT ref: 00FD9862
                  • Part of subcall function 00FD9837: __swprintf.LIBCMT ref: 00FD98AC
                  • Part of subcall function 00FEFC86: _wcscpy.LIBCMT ref: 00FEFCA9
                • GetProcessId.KERNEL32(00000000), ref: 0104F5CD
                • CloseHandle.KERNEL32(00000000), ref: 0104F5FC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                • String ID: @
                • API String ID: 3522835683-2766056989
                • Opcode ID: 7cf1fe2502fbf856f6beb55f9b659371406243e64002c556753b919c55aa5562
                • Instruction ID: 76ebed73ce5d8bb4ff9a69bded1b45359fab36d2bc09e77b8cd80e53b4b7f4a2
                • Opcode Fuzzy Hash: 7cf1fe2502fbf856f6beb55f9b659371406243e64002c556753b919c55aa5562
                • Instruction Fuzzy Hash: F261A5B5A00619DFCB14EF98C8819AEBBF5FF48310F184069E955AB351CB74AD41DF90
                APIs
                • GetParent.USER32(?), ref: 01030F8C
                • GetKeyboardState.USER32(?), ref: 01030FA1
                • SetKeyboardState.USER32(?), ref: 01031002
                • PostMessageW.USER32(?,00000101,00000010,?), ref: 01031030
                • PostMessageW.USER32(?,00000101,00000011,?), ref: 0103104F
                • PostMessageW.USER32(?,00000101,00000012,?), ref: 01031095
                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 010310B8
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessagePost$KeyboardState$Parent
                • String ID:
                • API String ID: 87235514-0
                • Opcode ID: 6603e6b6c11cd617e2427c3c853c564e6a8ec602088e32cd728bc82ed57e6051
                • Instruction ID: 94036b1de6ad588c988f3b4e2427de56fd8d65cb7d6a6f35e5682fc9f02000af
                • Opcode Fuzzy Hash: 6603e6b6c11cd617e2427c3c853c564e6a8ec602088e32cd728bc82ed57e6051
                • Instruction Fuzzy Hash: DA51C3B06047D63DFB3642388845BBABEED5B8A304F0885C9F2D5468D3C2E9E8D4D751
                APIs
                • GetParent.USER32(00000000), ref: 01030DA5
                • GetKeyboardState.USER32(?), ref: 01030DBA
                • SetKeyboardState.USER32(?), ref: 01030E1B
                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 01030E47
                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 01030E64
                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 01030EA8
                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 01030EC9
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessagePost$KeyboardState$Parent
                • String ID:
                • API String ID: 87235514-0
                • Opcode ID: f446fc98a621f6f08ba018383586acc0c2297b859f1597940bdcd80e0434bd33
                • Instruction ID: 240d085fabe19961625fa3b4ca72233e9821e0990d285d50eb778ee45896f108
                • Opcode Fuzzy Hash: f446fc98a621f6f08ba018383586acc0c2297b859f1597940bdcd80e0434bd33
                • Instruction Fuzzy Hash: CC51E6A06467D63DFB7692388C45BBA7FED5F86300F0884C9F2D4468C6D395E898D760
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _wcsncpy$LocalTime
                • String ID:
                • API String ID: 2945705084-0
                • Opcode ID: 9fac40ba25e33a3655914bf6aeb1234f86b32f789c7e8d1318347563450b7c85
                • Instruction ID: 7bf2a05b830d0ce6ca49d33dba2a5fa93c06b73aeb7fa891dfabedbda47eafcb
                • Opcode Fuzzy Hash: 9fac40ba25e33a3655914bf6aeb1234f86b32f789c7e8d1318347563450b7c85
                • Instruction Fuzzy Hash: 9141B365C1121876CB11EBF49C4A9EFB7BCAF44310F448856E749E3231EA38E345D7AA
                APIs
                  • Part of subcall function 0103466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,01033697,?), ref: 0103468B
                  • Part of subcall function 0103466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,01033697,?), ref: 010346A4
                • lstrcmpiW.KERNEL32(?,?), ref: 010336B7
                • _wcscmp.LIBCMT ref: 010336D3
                • MoveFileW.KERNEL32(?,?), ref: 010336EB
                • _wcscat.LIBCMT ref: 01033733
                • SHFileOperationW.SHELL32(?), ref: 0103379F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                • String ID: \*.*
                • API String ID: 1377345388-1173974218
                • Opcode ID: 30ad877860137dc5fe3943107aad72f7cb113c325de2eceaa66709ecdd9aa3a1
                • Instruction ID: 0fce94206bbfeb95bba7c0863887ed8f2514d7a3f0323f077a93284c9aa38f78
                • Opcode Fuzzy Hash: 30ad877860137dc5fe3943107aad72f7cb113c325de2eceaa66709ecdd9aa3a1
                • Instruction Fuzzy Hash: 01418E71508345AED762EF64D4859DFB7ECBFC8280F00486EB5CAC7251EA38D289C752
                APIs
                • _memset.LIBCMT ref: 010572AA
                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01057351
                • IsMenu.USER32(?), ref: 01057369
                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 010573B1
                • DrawMenuBar.USER32 ref: 010573C4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Menu$Item$DrawInfoInsert_memset
                • String ID: 0
                • API String ID: 3866635326-4108050209
                • Opcode ID: 4373b766b720beaf8bf20114798edeb83a5d2171963f399468a87de5148a331e
                • Instruction ID: 701633a516bb46638f857b37cbaa62db2514f42d20940f403fad152cdba756f9
                • Opcode Fuzzy Hash: 4373b766b720beaf8bf20114798edeb83a5d2171963f399468a87de5148a331e
                • Instruction Fuzzy Hash: 99417671A00209EFDB61CF54D885AAABBF8FF08360F448069FE85AB251C735AD04EF50
                APIs
                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 01050FD4
                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 01050FFE
                • FreeLibrary.KERNEL32(00000000), ref: 010510B5
                  • Part of subcall function 01050FA5: RegCloseKey.ADVAPI32(?), ref: 0105101B
                  • Part of subcall function 01050FA5: FreeLibrary.KERNEL32(?), ref: 0105106D
                  • Part of subcall function 01050FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 01051090
                • RegDeleteKeyW.ADVAPI32(?,?), ref: 01051058
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: EnumFreeLibrary$CloseDeleteOpen
                • String ID:
                • API String ID: 395352322-0
                • Opcode ID: f89b6185d9d64cf24cef70d4622eb2f5fbfa3291689e18f60719f54f0a3ca89b
                • Instruction ID: 801375ef34c4c15bc973c77ed1cd736cb355fa6d34df6b3aff7463bfc2470f12
                • Opcode Fuzzy Hash: f89b6185d9d64cf24cef70d4622eb2f5fbfa3291689e18f60719f54f0a3ca89b
                • Instruction Fuzzy Hash: BF310F71A01209BFEB659F94DC89EFFBBBCEF08310F0411A9F941A2140DA759A459BA0
                APIs
                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 010562EC
                • GetWindowLongW.USER32(01265228,000000F0), ref: 0105631F
                • GetWindowLongW.USER32(01265228,000000F0), ref: 01056354
                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 01056386
                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 010563B0
                • GetWindowLongW.USER32(00000000,000000F0), ref: 010563C1
                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 010563DB
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: LongWindow$MessageSend
                • String ID:
                • API String ID: 2178440468-0
                • Opcode ID: 87c34c5c744eba692d20ebc00d2336f5d056cbe765dc43dd46ea9d2c543580ef
                • Instruction ID: 4f7ee094fc5886be22e841ab0d22427fe5d39f60de10d8cfce7d4902ed4e5753
                • Opcode Fuzzy Hash: 87c34c5c744eba692d20ebc00d2336f5d056cbe765dc43dd46ea9d2c543580ef
                • Instruction Fuzzy Hash: 1D313730600241AFDBB2CF29D894F563BE1FB4A754F5841A4F9919F2B6CB77A840CB50
                APIs
                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0102DB2E
                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0102DB54
                • SysAllocString.OLEAUT32(00000000), ref: 0102DB57
                • SysAllocString.OLEAUT32(?), ref: 0102DB75
                • SysFreeString.OLEAUT32(?), ref: 0102DB7E
                • StringFromGUID2.OLE32(?,?,00000028), ref: 0102DBA3
                • SysAllocString.OLEAUT32(?), ref: 0102DBB1
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                • String ID:
                • API String ID: 3761583154-0
                • Opcode ID: e94734d9cd726a8f27726362bf2d1dac8c14c5bc4047ca880229b5bbbde9a98b
                • Instruction ID: 6c6e76b3c0fdea697e0b4f544dd4cb0387356f91a7dc34d9832c67dc4150b22d
                • Opcode Fuzzy Hash: e94734d9cd726a8f27726362bf2d1dac8c14c5bc4047ca880229b5bbbde9a98b
                • Instruction Fuzzy Hash: B121B732600219AFDF11DEE8DC44CBB77ECEB09264B008165FE94DB151DA74DC418B60
                APIs
                  • Part of subcall function 01047D8B: inet_addr.WSOCK32(00000000), ref: 01047DB6
                • socket.WSOCK32(00000002,00000001,00000006), ref: 010461C6
                • WSAGetLastError.WSOCK32(00000000), ref: 010461D5
                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0104620E
                • connect.WSOCK32(00000000,?,00000010), ref: 01046217
                • WSAGetLastError.WSOCK32 ref: 01046221
                • closesocket.WSOCK32(00000000), ref: 0104624A
                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 01046263
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                • String ID:
                • API String ID: 910771015-0
                • Opcode ID: cb28c5221af7b9878a6eae4e5cfe693ca7185c3170f4f49d283cbd86f25d548b
                • Instruction ID: 269e45d8f6271ff4fd8fcb59907d623d70a815278f6b5a742d197812ad53ed1f
                • Opcode Fuzzy Hash: cb28c5221af7b9878a6eae4e5cfe693ca7185c3170f4f49d283cbd86f25d548b
                • Instruction Fuzzy Hash: 4A31B571600219AFDF10AF64CCC4BBE7BADEF45710F044069FD85E7291DB79A9049B61
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __wcsnicmp
                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                • API String ID: 1038674560-2734436370
                • Opcode ID: 07deddc9e45869bb97201f46465d8a22b76db69c70e8b42becf64a3183b9148c
                • Instruction ID: bf6cb43977c94fc2915e3a8800faa8eab8ba45f299db2f18d8c7e7e040aa98cc
                • Opcode Fuzzy Hash: 07deddc9e45869bb97201f46465d8a22b76db69c70e8b42becf64a3183b9148c
                • Instruction Fuzzy Hash: 6F21497220453366D331BB38AC06EBB73E8EF593C0F044029FAC6CA162EB959D45D395
                APIs
                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0102DC09
                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0102DC2F
                • SysAllocString.OLEAUT32(00000000), ref: 0102DC32
                • SysAllocString.OLEAUT32 ref: 0102DC53
                • SysFreeString.OLEAUT32 ref: 0102DC5C
                • StringFromGUID2.OLE32(?,?,00000028), ref: 0102DC76
                • SysAllocString.OLEAUT32(?), ref: 0102DC84
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                • String ID:
                • API String ID: 3761583154-0
                • Opcode ID: babe3f81c6c7f0b5cf8b17f57a4eb66da234cb125a3956ffb801c8f1c0542a20
                • Instruction ID: a6085901c4bda3f986be478b1be0c05c9fcc0953fd2efdc7ef1c4ca2d364ab9f
                • Opcode Fuzzy Hash: babe3f81c6c7f0b5cf8b17f57a4eb66da234cb125a3956ffb801c8f1c0542a20
                • Instruction Fuzzy Hash: AC21A735605219AF9B11EFECDC88CAB77ECEB09360B108165F984CB255DA78DC41CB64
                APIs
                  • Part of subcall function 00FD1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00FD1D73
                  • Part of subcall function 00FD1D35: GetStockObject.GDI32(00000011), ref: 00FD1D87
                  • Part of subcall function 00FD1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00FD1D91
                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 01057632
                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0105763F
                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0105764A
                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 01057659
                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 01057665
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$CreateObjectStockWindow
                • String ID: Msctls_Progress32
                • API String ID: 1025951953-3636473452
                • Opcode ID: 348ea8257eb4d58a5183282cb3ee3a685f04327a767d904cf8981a4a3deb7c98
                • Instruction ID: 4507df60307cc4cb2243188bbcaba65c58b792ba0b81bf569a33c579ddce4e73
                • Opcode Fuzzy Hash: 348ea8257eb4d58a5183282cb3ee3a685f04327a767d904cf8981a4a3deb7c98
                • Instruction Fuzzy Hash: 6E11B2B2110219BFEF159F65CC85EEBBF6EFF0C798F014115BA44A6050CA72AC21DBA4
                APIs
                • __init_pointers.LIBCMT ref: 00FF9AE6
                  • Part of subcall function 00FF3187: EncodePointer.KERNEL32(00000000), ref: 00FF318A
                  • Part of subcall function 00FF3187: __initp_misc_winsig.LIBCMT ref: 00FF31A5
                  • Part of subcall function 00FF3187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00FF9EA0
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00FF9EB4
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00FF9EC7
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00FF9EDA
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00FF9EED
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00FF9F00
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00FF9F13
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00FF9F26
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00FF9F39
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00FF9F4C
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00FF9F5F
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00FF9F72
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00FF9F85
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00FF9F98
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00FF9FAB
                  • Part of subcall function 00FF3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00FF9FBE
                • __mtinitlocks.LIBCMT ref: 00FF9AEB
                • __mtterm.LIBCMT ref: 00FF9AF4
                  • Part of subcall function 00FF9B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00FF9AF9,00FF7CD0,0108A0B8,00000014), ref: 00FF9C56
                  • Part of subcall function 00FF9B5C: _free.LIBCMT ref: 00FF9C5D
                  • Part of subcall function 00FF9B5C: DeleteCriticalSection.KERNEL32(0108EC00,?,?,00FF9AF9,00FF7CD0,0108A0B8,00000014), ref: 00FF9C7F
                • __calloc_crt.LIBCMT ref: 00FF9B19
                • __initptd.LIBCMT ref: 00FF9B3B
                • GetCurrentThreadId.KERNEL32 ref: 00FF9B42
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                • String ID:
                • API String ID: 3567560977-0
                • Opcode ID: f3ab66ed2e2856c786b85b859d150af24d5f60242864b0a6444963315d9a614c
                • Instruction ID: 25353f68e2b6fabdb854dc9a01f9151ce7cbcc4dceaaef9f73d3f138de7eb396
                • Opcode Fuzzy Hash: f3ab66ed2e2856c786b85b859d150af24d5f60242864b0a6444963315d9a614c
                • Instruction Fuzzy Hash: 33F0CD3291D7191AE7347674BC07B7E36809F42B74B200A19F7A0960FAEEE9850162A4
                APIs
                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00FF3F85), ref: 00FF4085
                • GetProcAddress.KERNEL32(00000000), ref: 00FF408C
                • EncodePointer.KERNEL32(00000000), ref: 00FF4097
                • DecodePointer.KERNEL32(00FF3F85), ref: 00FF40B2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                • String ID: RoUninitialize$combase.dll
                • API String ID: 3489934621-2819208100
                • Opcode ID: eb97210d8e4938d44e7333ed7fddd8339fc81d6447683d3d3b4b8410812aa2b2
                • Instruction ID: 0c62b58193295dd3e4870ae426df2610c78ea4855c951e4c734bc4ace63f8a0e
                • Opcode Fuzzy Hash: eb97210d8e4938d44e7333ed7fddd8339fc81d6447683d3d3b4b8410812aa2b2
                • Instruction Fuzzy Hash: BCE09AB0541301ABEB30AF71E919B173AB4BB14782F104418F5C6D90A8CF7F5500DF14
                APIs
                • GetClientRect.USER32(?,?), ref: 00FD1DDC
                • GetWindowRect.USER32(?,?), ref: 00FD1E1D
                • ScreenToClient.USER32(?,?), ref: 00FD1E45
                • GetClientRect.USER32(?,?), ref: 00FD1F74
                • GetWindowRect.USER32(?,?), ref: 00FD1F8D
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Rect$Client$Window$Screen
                • String ID:
                • API String ID: 1296646539-0
                • Opcode ID: b428377e18789bfc0cd9a1a9e9dd3bb06e798a9f7d79e27ce36f926a3699bd5f
                • Instruction ID: b4673f01b50f3c4956d9eefcd9e48ac310ec9dd3affbdb8bc38bcf2b8f609984
                • Opcode Fuzzy Hash: b428377e18789bfc0cd9a1a9e9dd3bb06e798a9f7d79e27ce36f926a3699bd5f
                • Instruction Fuzzy Hash: 16B14C7990064AEBDB10CFA8C5807EEB7B2FF08310F18856AED99DB355DB70A940DB54
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _memmove$__itow__swprintf
                • String ID:
                • API String ID: 3253778849-0
                • Opcode ID: c9e1620ce3bba5a047f8eccdd8e9848ec028c7919196af9f49fd1319a3b40909
                • Instruction ID: 021f3a83fcda1854beca9f113fdf23e7ed7353730697c4c0325bdf044d11d5a5
                • Opcode Fuzzy Hash: c9e1620ce3bba5a047f8eccdd8e9848ec028c7919196af9f49fd1319a3b40909
                • Instruction Fuzzy Hash: 5861063090424AABCF01FF64CC81EFE3BA9AF49308F484459FD955B2A2DB79D905EB50
                APIs
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                  • Part of subcall function 01050E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0104FDAD,?,?), ref: 01050E31
                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010502BD
                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 010502FD
                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 01050320
                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 01050349
                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0105038C
                • RegCloseKey.ADVAPI32(00000000), ref: 01050399
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                • String ID:
                • API String ID: 4046560759-0
                • Opcode ID: 5f8171767275425e1075ec4c537175b927ab60a07b1f0b58f1b323380e4f91ed
                • Instruction ID: eb80c3a3717e61336409ea83aa81a3651adbb3409002298ee4fda9542ce07c1b
                • Opcode Fuzzy Hash: 5f8171767275425e1075ec4c537175b927ab60a07b1f0b58f1b323380e4f91ed
                • Instruction Fuzzy Hash: 5E512631208305AFD750EF68C885EAFBBE9EF84314F04491DF9858B2A2DB75E905DB52
                APIs
                • GetMenu.USER32(?), ref: 010557FB
                • GetMenuItemCount.USER32(00000000), ref: 01055832
                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0105585A
                • GetMenuItemID.USER32(?,?), ref: 010558C9
                • GetSubMenu.USER32(?,?), ref: 010558D7
                • PostMessageW.USER32(?,00000111,?,00000000), ref: 01055928
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Menu$Item$CountMessagePostString
                • String ID:
                • API String ID: 650687236-0
                • Opcode ID: d2c055edc336309f88c705ff83dd5da1ce7ca57d5ad7067afc3d792b96454927
                • Instruction ID: 954bd4a348b650911d57c7e156534d667f705db43be94fb29e381de4f4ad8d8f
                • Opcode Fuzzy Hash: d2c055edc336309f88c705ff83dd5da1ce7ca57d5ad7067afc3d792b96454927
                • Instruction Fuzzy Hash: 3F516C31E00216AFCF51EFA4CC459AEBBB5EF48720F144099ED81BB351CB79AE419B90
                APIs
                • VariantInit.OLEAUT32(?), ref: 0102EF06
                • VariantClear.OLEAUT32(00000013), ref: 0102EF78
                • VariantClear.OLEAUT32(00000000), ref: 0102EFD3
                • _memmove.LIBCMT ref: 0102EFFD
                • VariantClear.OLEAUT32(?), ref: 0102F04A
                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0102F078
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Variant$Clear$ChangeInitType_memmove
                • String ID:
                • API String ID: 1101466143-0
                • Opcode ID: 258dc570bcb8bef85626c037a29aab94d66a518a7b23d8418bf203357d0d6a5c
                • Instruction ID: 9511ba63c1ed898f958e1c443bccfd0b80c1305325ab20a956ba7707fa365e90
                • Opcode Fuzzy Hash: 258dc570bcb8bef85626c037a29aab94d66a518a7b23d8418bf203357d0d6a5c
                • Instruction Fuzzy Hash: 15515C75A0021A9FDB10DF58C884AAABBF8FF4C350B158559FA89DB305E735E911CF90
                APIs
                • _memset.LIBCMT ref: 01032258
                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 010322A3
                • IsMenu.USER32(00000000), ref: 010322C3
                • CreatePopupMenu.USER32 ref: 010322F7
                • GetMenuItemCount.USER32(000000FF), ref: 01032355
                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 01032386
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                • String ID:
                • API String ID: 3311875123-0
                • Opcode ID: 55de95a3a0a0f294679f3f79a1a06c1de413f1a2315d258803570a908b0c38f8
                • Instruction ID: ee6aedba4539353d9e1966b4fcc5fdfd2f0671a4e15b001f05aa83a779feb817
                • Opcode Fuzzy Hash: 55de95a3a0a0f294679f3f79a1a06c1de413f1a2315d258803570a908b0c38f8
                • Instruction Fuzzy Hash: FD519F7060130AEBDF21CF68D888BAEBBF9BF85318F108199E99597290D7719944CB51
                APIs
                  • Part of subcall function 00FD2612: GetWindowLongW.USER32(?,000000EB), ref: 00FD2623
                • BeginPaint.USER32(?,?,?,?,?,?), ref: 00FD179A
                • GetWindowRect.USER32(?,?), ref: 00FD17FE
                • ScreenToClient.USER32(?,?), ref: 00FD181B
                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00FD182C
                • EndPaint.USER32(?,?), ref: 00FD1876
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: PaintWindow$BeginClientLongRectScreenViewport
                • String ID:
                • API String ID: 1827037458-0
                • Opcode ID: 50fc7b49a8501d1103f736f67bd9f559552a15af3e8a94c03896d78bda552012
                • Instruction ID: 863399f2bc95f2fe84656e866fd6a7cebe5417697129b9f3f5a8a52edbb053e1
                • Opcode Fuzzy Hash: 50fc7b49a8501d1103f736f67bd9f559552a15af3e8a94c03896d78bda552012
                • Instruction Fuzzy Hash: B241B131504301AFD722DF25CC84BAB7BE9FB4A724F18066AF5948B2A1C7359905EB61
                APIs
                • ShowWindow.USER32(010957B0,00000000,01265228,?,?,010957B0,?,0105B5A8,?,?), ref: 0105B712
                • EnableWindow.USER32(00000000,00000000), ref: 0105B736
                • ShowWindow.USER32(010957B0,00000000,01265228,?,?,010957B0,?,0105B5A8,?,?), ref: 0105B796
                • ShowWindow.USER32(00000000,00000004,?,0105B5A8,?,?), ref: 0105B7A8
                • EnableWindow.USER32(00000000,00000001), ref: 0105B7CC
                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0105B7EF
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$Show$Enable$MessageSend
                • String ID:
                • API String ID: 642888154-0
                • Opcode ID: 95319d3a8c2a123f2f8a99614031e3643f970da2fac528c0048bbe8a9b5b3b93
                • Instruction ID: 0ef0c6a6c479215e38076f4de151c356393065ccd895d74ded93176202dc8dad
                • Opcode Fuzzy Hash: 95319d3a8c2a123f2f8a99614031e3643f970da2fac528c0048bbe8a9b5b3b93
                • Instruction Fuzzy Hash: 48412134500249AFDBA6CF28C499B967FE2FF05310F1C41E5EE888F562C735A455DB51
                APIs
                • GetForegroundWindow.USER32(?,?,?,?,?,?,01044E41,?,?,00000000,00000001), ref: 010470AC
                  • Part of subcall function 010439A0: GetWindowRect.USER32(?,?), ref: 010439B3
                • GetDesktopWindow.USER32 ref: 010470D6
                • GetWindowRect.USER32(00000000), ref: 010470DD
                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0104710F
                  • Part of subcall function 01035244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 010352BC
                • GetCursorPos.USER32(?), ref: 0104713B
                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 01047199
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                • String ID:
                • API String ID: 4137160315-0
                • Opcode ID: 6aab1842f6860d021f7a6669a244a103a42c686ec404b5e98177e0ef21a4790f
                • Instruction ID: 4eab2b4616e2948ddf4989d858d2e7f6ef7eb3f2cf365759a7d766cbea88c929
                • Opcode Fuzzy Hash: 6aab1842f6860d021f7a6669a244a103a42c686ec404b5e98177e0ef21a4790f
                • Instruction Fuzzy Hash: 0C31A472505306ABD720DF18D848F9BBBEAFF89314F000929F5C5A7191D775EA09CB92
                APIs
                  • Part of subcall function 010280A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 010280C0
                  • Part of subcall function 010280A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 010280CA
                  • Part of subcall function 010280A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 010280D9
                  • Part of subcall function 010280A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 010280E0
                  • Part of subcall function 010280A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 010280F6
                • GetLengthSid.ADVAPI32(?,00000000,0102842F), ref: 010288CA
                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 010288D6
                • HeapAlloc.KERNEL32(00000000), ref: 010288DD
                • CopySid.ADVAPI32(00000000,00000000,?), ref: 010288F6
                • GetProcessHeap.KERNEL32(00000000,00000000,0102842F), ref: 0102890A
                • HeapFree.KERNEL32(00000000), ref: 01028911
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                • String ID:
                • API String ID: 3008561057-0
                • Opcode ID: 616d0a0256ba8ceeb59d8b3a6df092478997706a7169e1de0b52b850035bc335
                • Instruction ID: 7ca0b49190bded980b8d7d5c6ee24dea9729bc9aa07bae4f85e8c2fa902220f6
                • Opcode Fuzzy Hash: 616d0a0256ba8ceeb59d8b3a6df092478997706a7169e1de0b52b850035bc335
                • Instruction Fuzzy Hash: CC11AF3560121AFFEB649FA8DC09BBF7BE8EB45315F18805AE9C597100C73A9900CB60
                APIs
                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 010285E2
                • OpenProcessToken.ADVAPI32(00000000), ref: 010285E9
                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 010285F8
                • CloseHandle.KERNEL32(00000004), ref: 01028603
                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 01028632
                • DestroyEnvironmentBlock.USERENV(00000000), ref: 01028646
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                • String ID:
                • API String ID: 1413079979-0
                • Opcode ID: 3d4e13d605e2513b47842e443bc073bade5e82a928c9709fc2bc455de11f4b05
                • Instruction ID: 560523f4970b63cc20d351cfae10734b79fecb82bcb6c4fd956592ab19bb82c4
                • Opcode Fuzzy Hash: 3d4e13d605e2513b47842e443bc073bade5e82a928c9709fc2bc455de11f4b05
                • Instruction Fuzzy Hash: 971159B650121EABEF218EA8DD49BDF7BE9EF08344F048055FE44A2160C37A9D60DB60
                APIs
                • GetDC.USER32(00000000), ref: 0102B7B5
                • GetDeviceCaps.GDI32(00000000,00000058), ref: 0102B7C6
                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0102B7CD
                • ReleaseDC.USER32(00000000,00000000), ref: 0102B7D5
                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0102B7EC
                • MulDiv.KERNEL32(000009EC,?,?), ref: 0102B7FE
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CapsDevice$Release
                • String ID:
                • API String ID: 1035833867-0
                • Opcode ID: 59c08fa19266d13ab2d0cea980f9bcefc0ffc165ab67a2d921bf94fc74133618
                • Instruction ID: 9bf7313f247807a8f7304e571bd484b84e98af68862d1c75b33c178889d073ea
                • Opcode Fuzzy Hash: 59c08fa19266d13ab2d0cea980f9bcefc0ffc165ab67a2d921bf94fc74133618
                • Instruction Fuzzy Hash: 65018475E00319BBEB109BB69C45A5FBFB8EB48351F044065FA44A7281D6359800CFA0
                APIs
                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FF0193
                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00FF019B
                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FF01A6
                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FF01B1
                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00FF01B9
                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FF01C1
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Virtual
                • String ID:
                • API String ID: 4278518827-0
                • Opcode ID: ef5e38f8294645aefff51316107adff7ee263bb50e3d98407b44493b92ea11c1
                • Instruction ID: 9d2863c7842b2ffdd4a12c4b087c20dec97d51d9a8b70a8514c0030e70835d4e
                • Opcode Fuzzy Hash: ef5e38f8294645aefff51316107adff7ee263bb50e3d98407b44493b92ea11c1
                • Instruction Fuzzy Hash: 110148B090175A7DE3009F6A8C85A52FEA8FF19354F00411BA15847941C7B5A864CBE5
                APIs
                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 010353F9
                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0103540F
                • GetWindowThreadProcessId.USER32(?,?), ref: 0103541E
                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0103542D
                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 01035437
                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0103543E
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                • String ID:
                • API String ID: 839392675-0
                • Opcode ID: 6e7461cfb14f4b1a153350a1eadc2ecbc987d99258159fd3d3ef4a4646d1327a
                • Instruction ID: db8b0933b08d89c66498dfdb7d84217b0a15f458c271565aafc3ca110830b373
                • Opcode Fuzzy Hash: 6e7461cfb14f4b1a153350a1eadc2ecbc987d99258159fd3d3ef4a4646d1327a
                • Instruction Fuzzy Hash: 4BF01D32241259BBE7315AA29C0DEAB7B7CEBCAB15F000159FA44D20519AAA1A0187B5
                APIs
                • InterlockedExchange.KERNEL32(?,?), ref: 01037243
                • EnterCriticalSection.KERNEL32(?,?,00FE0EE4,?,?), ref: 01037254
                • TerminateThread.KERNEL32(00000000,000001F6,?,00FE0EE4,?,?), ref: 01037261
                • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00FE0EE4,?,?), ref: 0103726E
                  • Part of subcall function 01036C35: CloseHandle.KERNEL32(00000000,?,0103727B,?,00FE0EE4,?,?), ref: 01036C3F
                • InterlockedExchange.KERNEL32(?,000001F6), ref: 01037281
                • LeaveCriticalSection.KERNEL32(?,?,00FE0EE4,?,?), ref: 01037288
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                • String ID:
                • API String ID: 3495660284-0
                • Opcode ID: 5d61cac1c30909017ac1af881d620aa05a33713d9ad35bd076a0d6b2c7dc1b31
                • Instruction ID: 63e230f0997f42f2ad39bf5b4a9028c6664fa8b00912a2c434c25fae54a07049
                • Opcode Fuzzy Hash: 5d61cac1c30909017ac1af881d620aa05a33713d9ad35bd076a0d6b2c7dc1b31
                • Instruction Fuzzy Hash: D3F0BEBA441303EBEB622B24EC4C9EB3B29EF45342B100121F28390098CB7F1400CB50
                APIs
                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0102899D
                • UnloadUserProfile.USERENV(?,?), ref: 010289A9
                • CloseHandle.KERNEL32(?), ref: 010289B2
                • CloseHandle.KERNEL32(?), ref: 010289BA
                • GetProcessHeap.KERNEL32(00000000,?), ref: 010289C3
                • HeapFree.KERNEL32(00000000), ref: 010289CA
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                • String ID:
                • API String ID: 146765662-0
                • Opcode ID: 5db9dd7650ca3f730a794d2d9a3c548d5fab427116b71ac7eefa5dffdfbe9140
                • Instruction ID: 98544c014540e945cd451b851dfb580cc5fa18790a32b4aab01968378965ebd5
                • Opcode Fuzzy Hash: 5db9dd7650ca3f730a794d2d9a3c548d5fab427116b71ac7eefa5dffdfbe9140
                • Instruction Fuzzy Hash: 9BE0E536004206BBDB112FE1EC0C90BBF79FF8A322B108220F259C1468CB3FA420DB54
                APIs
                • VariantInit.OLEAUT32(?), ref: 01048613
                • CharUpperBuffW.USER32(?,?), ref: 01048722
                • VariantClear.OLEAUT32(?), ref: 0104889A
                  • Part of subcall function 01037562: VariantInit.OLEAUT32(00000000), ref: 010375A2
                  • Part of subcall function 01037562: VariantCopy.OLEAUT32(00000000,?), ref: 010375AB
                  • Part of subcall function 01037562: VariantClear.OLEAUT32(00000000), ref: 010375B7
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Variant$ClearInit$BuffCharCopyUpper
                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                • API String ID: 4237274167-1221869570
                • Opcode ID: f356da4682028429c8ce06fcb551f4e2790a01347d3f31fc6e6494df88271916
                • Instruction ID: c125cafec0ccabeed0a317757ed134fb1511c8cfc14c7ef80dca032c000b06f5
                • Opcode Fuzzy Hash: f356da4682028429c8ce06fcb551f4e2790a01347d3f31fc6e6494df88271916
                • Instruction Fuzzy Hash: D4919EB16083019FC750EF68C48495ABBE5FF89714F088D6EF98A8B361DB35E905CB52
                APIs
                  • Part of subcall function 00FEFC86: _wcscpy.LIBCMT ref: 00FEFCA9
                • _memset.LIBCMT ref: 01032B87
                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 01032BB6
                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 01032C69
                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 01032C97
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ItemMenu$Info$Default_memset_wcscpy
                • String ID: 0
                • API String ID: 4152858687-4108050209
                • Opcode ID: 3981916da191b796bf54438f26fea3f2b813e5ade2eebb0e2efbb131e84ba867
                • Instruction ID: 027c374588869be0143d9bd327b324d55a893b29247eabb86c70f1c79d002e90
                • Opcode Fuzzy Hash: 3981916da191b796bf54438f26fea3f2b813e5ade2eebb0e2efbb131e84ba867
                • Instruction Fuzzy Hash: 5E5100715183099BE765DE68C844A6BBBECEFC5310F040A6EFAC4D72A1DB74C904D752
                APIs
                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0102D5D4
                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0102D60A
                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0102D61B
                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0102D69D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ErrorMode$AddressCreateInstanceProc
                • String ID: DllGetClassObject
                • API String ID: 753597075-1075368562
                • Opcode ID: f08c9ee280b379143f08e044ff774c709464a9350c53b59c8bb2e16e433d6773
                • Instruction ID: 18006bafaa023195fc6a82ac04e39d8277290fb627bf0ba36f6167f4dd9afa52
                • Opcode Fuzzy Hash: f08c9ee280b379143f08e044ff774c709464a9350c53b59c8bb2e16e433d6773
                • Instruction Fuzzy Hash: 2441C3B1600215EFDB25DF94C888A9A7BBAEF48310F1180ADED49DF205D7B5DD44CBA0
                APIs
                • _memset.LIBCMT ref: 010327C0
                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 010327DC
                • DeleteMenu.USER32(?,00000007,00000000), ref: 01032822
                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,01095890,00000000), ref: 0103286B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Menu$Delete$InfoItem_memset
                • String ID: 0
                • API String ID: 1173514356-4108050209
                • Opcode ID: 2a7ad69602d81f97dd281d76ce29cff4e31fdfe81021f547f49ad276bcfa809e
                • Instruction ID: dc2d34d20a1ea4a6e56515f7f2d89621abfd5971d0bcc1f4c99e1bfd65f6004b
                • Opcode Fuzzy Hash: 2a7ad69602d81f97dd281d76ce29cff4e31fdfe81021f547f49ad276bcfa809e
                • Instruction Fuzzy Hash: 0341B0702053029FD720DF28C844B6ABBE9EFC5314F14496EFAE697291D734E905CB52
                APIs
                • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0104D7C5
                  • Part of subcall function 00FD784B: _memmove.LIBCMT ref: 00FD7899
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: BuffCharLower_memmove
                • String ID: cdecl$none$stdcall$winapi
                • API String ID: 3425801089-567219261
                • Opcode ID: 5405f0eea5df81b194e58c892de67b71c9267eaf48a29d12207048735b2b2be6
                • Instruction ID: 7b3a2d67ad2c287cdb5b3eec034e32faf4d96e21aa1f7a3be183adff3b769f30
                • Opcode Fuzzy Hash: 5405f0eea5df81b194e58c892de67b71c9267eaf48a29d12207048735b2b2be6
                • Instruction Fuzzy Hash: 8131C5705046199BDF00EF98CC919FEB3B5FF14320B10866AE8A9977D2DB35E905CB80
                APIs
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                  • Part of subcall function 0102AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0102AABC
                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 01028F14
                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 01028F27
                • SendMessageW.USER32(?,00000189,?,00000000), ref: 01028F57
                  • Part of subcall function 00FD7BCC: _memmove.LIBCMT ref: 00FD7C06
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$_memmove$ClassName
                • String ID: ComboBox$ListBox
                • API String ID: 365058703-1403004172
                • Opcode ID: bc891e0e9fcb9ce7936e010ab093a1f1ab469acd12c75bc02b1fe427ed58e048
                • Instruction ID: 3c00d37b282267b6ebce801be18b80aaf3de30b9d562d90f8acf993e07d9e452
                • Opcode Fuzzy Hash: bc891e0e9fcb9ce7936e010ab093a1f1ab469acd12c75bc02b1fe427ed58e048
                • Instruction Fuzzy Hash: 5F21F875A04205BEDB54ABB4CC45CFFB7AADF45360F04851BF591572E1DB3D48099620
                APIs
                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0104184C
                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 01041872
                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 010418A2
                • InternetCloseHandle.WININET(00000000), ref: 010418E9
                  • Part of subcall function 01042483: GetLastError.KERNEL32(?,?,01041817,00000000,00000000,00000001), ref: 01042498
                  • Part of subcall function 01042483: SetEvent.KERNEL32(?,?,01041817,00000000,00000000,00000001), ref: 010424AD
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                • String ID:
                • API String ID: 3113390036-3916222277
                • Opcode ID: 434dfe2a9b7bd064b7320b60f0ea0d54a83a3856585ce817b34492ea4d0c73a0
                • Instruction ID: 921475e60e517da7455000d619c7eeb3cb73d5642d7f8e8de2d3810cd2fed77b
                • Opcode Fuzzy Hash: 434dfe2a9b7bd064b7320b60f0ea0d54a83a3856585ce817b34492ea4d0c73a0
                • Instruction Fuzzy Hash: 9A217FB1600309BFFB119A64DCC4EBF7BEDEB88644F00413EF585D6140EA79AD4597A1
                APIs
                  • Part of subcall function 00FD1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00FD1D73
                  • Part of subcall function 00FD1D35: GetStockObject.GDI32(00000011), ref: 00FD1D87
                  • Part of subcall function 00FD1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00FD1D91
                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 01056461
                • LoadLibraryW.KERNEL32(?), ref: 01056468
                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0105647D
                • DestroyWindow.USER32(?), ref: 01056485
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                • String ID: SysAnimate32
                • API String ID: 4146253029-1011021900
                • Opcode ID: 825494e17fec1fbc25ac633d7dc6bb1b654b510b1af64a11e96ef04740effa25
                • Instruction ID: fd6915a31538fa90696e208d727eff65f3909f0961e5890a6ec05947c8965485
                • Opcode Fuzzy Hash: 825494e17fec1fbc25ac633d7dc6bb1b654b510b1af64a11e96ef04740effa25
                • Instruction Fuzzy Hash: 5C21C271100205BFEF914E68DC50EBB7BEEEB48364F904629FE9093192CB36DC419B20
                APIs
                • GetStdHandle.KERNEL32(0000000C), ref: 01036DBC
                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 01036DEF
                • GetStdHandle.KERNEL32(0000000C), ref: 01036E01
                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 01036E3B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CreateHandle$FilePipe
                • String ID: nul
                • API String ID: 4209266947-2873401336
                • Opcode ID: df339a17bb8f71bec549bfd39ee474a507310f1d99f76634d7aaf5b179a1ef6c
                • Instruction ID: a8cb35c91872d954cfba26f67b66ed3a060a6ce774e6fa823421562e3dec7dd0
                • Opcode Fuzzy Hash: df339a17bb8f71bec549bfd39ee474a507310f1d99f76634d7aaf5b179a1ef6c
                • Instruction Fuzzy Hash: E221657590030ABBDB20AF29D808A9A7BFCEF85720F104A59FDE1D72D0DB729654CB54
                APIs
                • GetStdHandle.KERNEL32(000000F6), ref: 01036E89
                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 01036EBB
                • GetStdHandle.KERNEL32(000000F6), ref: 01036ECC
                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 01036F06
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CreateHandle$FilePipe
                • String ID: nul
                • API String ID: 4209266947-2873401336
                • Opcode ID: 7c1e3c123b2b6046db3ef45f0d331f53cfd57ffa5afbcd3ddf565e9a7cb40468
                • Instruction ID: 869a1d8eb8d9c463f622f5a8c9f33326163f5fcae8c6f293cda8e9916bb2816d
                • Opcode Fuzzy Hash: 7c1e3c123b2b6046db3ef45f0d331f53cfd57ffa5afbcd3ddf565e9a7cb40468
                • Instruction Fuzzy Hash: 63219071500306ABEB209F6DC804AAA77ECEF85720F200A59F9E0D72C0DB76A6548B60
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0103AC54
                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0103ACA8
                • __swprintf.LIBCMT ref: 0103ACC1
                • SetErrorMode.KERNEL32(00000000,00000001,00000000,0105F910), ref: 0103ACFF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ErrorMode$InformationVolume__swprintf
                • String ID: %lu
                • API String ID: 3164766367-685833217
                • Opcode ID: f1937eababa80b27a14b1119e3e12e35e32b1617eadc393bf49b4d5a5db8b23c
                • Instruction ID: 96e44bcc0048dbc71ebf313e44e3955b3d38733e1f118b045f52056d96eec76f
                • Opcode Fuzzy Hash: f1937eababa80b27a14b1119e3e12e35e32b1617eadc393bf49b4d5a5db8b23c
                • Instruction Fuzzy Hash: 52216031A0020AAFCB10EF69C944DEF7BB8EF89714B044069F949DB351DA75EA41DB61
                APIs
                • CharUpperBuffW.USER32(?,?), ref: 01031B19
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: BuffCharUpper
                • String ID: APPEND$EXISTS$KEYS$REMOVE
                • API String ID: 3964851224-769500911
                • Opcode ID: 82c369661b978d5912cfb843f79d7fb1d2136a7b9a0f982145f2a879360ea82b
                • Instruction ID: 77893af6ad9103f6c716f5dea66f0f46e196ebbdf6ca7fada2068410e89d036d
                • Opcode Fuzzy Hash: 82c369661b978d5912cfb843f79d7fb1d2136a7b9a0f982145f2a879360ea82b
                • Instruction Fuzzy Hash: C511C4309002098FCF04FFA8DC618FEB3B4FF59304B548495D89467792EB365906DB50
                APIs
                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0104EC07
                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0104EC37
                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0104ED6A
                • CloseHandle.KERNEL32(?), ref: 0104EDEB
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                • String ID:
                • API String ID: 2364364464-0
                • Opcode ID: 1fdf9c198d368ae23ec55eb020f97bc67d5cb3589c823ce8ecd468e3d3fe8f1d
                • Instruction ID: 9f848717c961e3f893639ff3eca7b5f0793c3e83f10fcf11f2d29b13a19ec40a
                • Opcode Fuzzy Hash: 1fdf9c198d368ae23ec55eb020f97bc67d5cb3589c823ce8ecd468e3d3fe8f1d
                • Instruction Fuzzy Hash: 658160B16043019FD760EF28CC86F2AB7E6AF44710F44881EF995DB3D2D6B9AC418B91
                APIs
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                  • Part of subcall function 01050E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0104FDAD,?,?), ref: 01050E31
                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010500FD
                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0105013C
                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 01050183
                • RegCloseKey.ADVAPI32(?,?), ref: 010501AF
                • RegCloseKey.ADVAPI32(00000000), ref: 010501BC
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                • String ID:
                • API String ID: 3440857362-0
                • Opcode ID: aed50647d7b62bde7a692dcdf87f227bcb95f1877f42eeb53c9a82b45ba1e66c
                • Instruction ID: 3f780180c723a9d9ba9ce850ab3635ae1abc64dd71568dcddf438a288c1785f6
                • Opcode Fuzzy Hash: aed50647d7b62bde7a692dcdf87f227bcb95f1877f42eeb53c9a82b45ba1e66c
                • Instruction Fuzzy Hash: 4B516631208205AFD754EF68CC81EAFB7E9AF84304F44481EF9858B291EB35E904DB52
                APIs
                  • Part of subcall function 00FD9837: __itow.LIBCMT ref: 00FD9862
                  • Part of subcall function 00FD9837: __swprintf.LIBCMT ref: 00FD98AC
                • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0104D927
                • GetProcAddress.KERNEL32(00000000,?), ref: 0104D9AA
                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0104D9C6
                • GetProcAddress.KERNEL32(00000000,?), ref: 0104DA07
                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0104DA21
                  • Part of subcall function 00FD5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,01037896,?,?,00000000), ref: 00FD5A2C
                  • Part of subcall function 00FD5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,01037896,?,?,00000000,?,?), ref: 00FD5A50
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                • String ID:
                • API String ID: 327935632-0
                • Opcode ID: d540b1ae43455bd2589052d8b8cc33d177ab42273d2fb9149c67427329f52fbc
                • Instruction ID: 7a044ab9e2d1a87a748163808699719138162965cb427d46a383bbff7135dba3
                • Opcode Fuzzy Hash: d540b1ae43455bd2589052d8b8cc33d177ab42273d2fb9149c67427329f52fbc
                • Instruction Fuzzy Hash: 6A513D75A04205DFCB00EFA8C4949ADB7F6FF19310B0880AAE895AB312D739ED45CF91
                APIs
                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0103E61F
                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0103E648
                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0103E687
                  • Part of subcall function 00FD9837: __itow.LIBCMT ref: 00FD9862
                  • Part of subcall function 00FD9837: __swprintf.LIBCMT ref: 00FD98AC
                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0103E6AC
                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0103E6B4
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                • String ID:
                • API String ID: 1389676194-0
                • Opcode ID: c1b36bba4c8ee70668edeb6b38d32fe3c05d6e7fe3dd0d9f62fed8439d4d76b9
                • Instruction ID: bd7c5a92e9c2accc682e343f9be95b839a4ff9d811a4cfc04b2e3d729cf180c3
                • Opcode Fuzzy Hash: c1b36bba4c8ee70668edeb6b38d32fe3c05d6e7fe3dd0d9f62fed8439d4d76b9
                • Instruction Fuzzy Hash: 98513C35A00205DFCB01EFA4C9819AEBBF5EF49350F188099E949AB362CB75ED11EF50
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3eded7f61fb17eb214451d143f44bb0b47e0125d2f200dd60732baf26b4ea184
                • Instruction ID: 4cec05af12c93e30e2fdac58380f0c5511a9679b291c2ca56bd76bd8082688eb
                • Opcode Fuzzy Hash: 3eded7f61fb17eb214451d143f44bb0b47e0125d2f200dd60732baf26b4ea184
                • Instruction Fuzzy Hash: 73419335A04204EFD7A1DA68CC58FABBFE8FB09390F040295FE95A72D1CB349941DB64
                APIs
                • GetCursorPos.USER32(?), ref: 00FD2357
                • ScreenToClient.USER32(010957B0,?), ref: 00FD2374
                • GetAsyncKeyState.USER32(00000001), ref: 00FD2399
                • GetAsyncKeyState.USER32(00000002), ref: 00FD23A7
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AsyncState$ClientCursorScreen
                • String ID:
                • API String ID: 4210589936-0
                • Opcode ID: 848fe4a80551ddb1f3ff1ec9334ac71076633536522b53d4dde38e52b185bcb6
                • Instruction ID: 9d6f58db873de636c2a82c7386100586170c0d2066e80b135e5f4454ddc1081e
                • Opcode Fuzzy Hash: 848fe4a80551ddb1f3ff1ec9334ac71076633536522b53d4dde38e52b185bcb6
                • Instruction Fuzzy Hash: 4A41B235A04106FBEF669F68C844AEEBBB5FB15320F24435AF868922D0C7359950EF91
                APIs
                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 010263E7
                • TranslateAcceleratorW.USER32(?,?,?), ref: 01026433
                • TranslateMessage.USER32(?), ref: 0102645C
                • DispatchMessageW.USER32(?), ref: 01026466
                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 01026475
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Message$PeekTranslate$AcceleratorDispatch
                • String ID:
                • API String ID: 2108273632-0
                • Opcode ID: 0ab8d20ec3fd4643373f8b0c990a8414c61111ef596fc83e292b2c70be2bac34
                • Instruction ID: 471e39d6da7e2f512dde4abb614042e653b167763438b1a80f13bf06ce088954
                • Opcode Fuzzy Hash: 0ab8d20ec3fd4643373f8b0c990a8414c61111ef596fc83e292b2c70be2bac34
                • Instruction Fuzzy Hash: 4931C6319002669FDB75CE75DC54BB7BBEDBB05300F1441A6E9E1C3195EB2B9045C760
                APIs
                • GetWindowRect.USER32(?,?), ref: 01028A30
                • PostMessageW.USER32(?,00000201,00000001), ref: 01028ADA
                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 01028AE2
                • PostMessageW.USER32(?,00000202,00000000), ref: 01028AF0
                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 01028AF8
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessagePostSleep$RectWindow
                • String ID:
                • API String ID: 3382505437-0
                • Opcode ID: 245452b1ab352e931935665be3260e86f3c5ae0b53badf691d18d4c3c2571153
                • Instruction ID: 86f156e708676acdaa850d54ebc8feb0ca677ab068f57daa7f7b8c759d1c373e
                • Opcode Fuzzy Hash: 245452b1ab352e931935665be3260e86f3c5ae0b53badf691d18d4c3c2571153
                • Instruction Fuzzy Hash: AB31C07150022AEBEF14CFA8D94CA9E3BF5FB05315F10825AF965E71C1C7B49914CB90
                APIs
                • IsWindowVisible.USER32(?), ref: 0102B204
                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0102B221
                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0102B259
                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0102B27F
                • _wcsstr.LIBCMT ref: 0102B289
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                • String ID:
                • API String ID: 3902887630-0
                • Opcode ID: beaa933d1c8687eac245f96dfab6838cfe60cfada8ec58a6ca0eff4c0cb16c61
                • Instruction ID: 776d766a9b23a97c41d76a662578b1e10789853f8d1565ab3ee21ed81c258a29
                • Opcode Fuzzy Hash: beaa933d1c8687eac245f96dfab6838cfe60cfada8ec58a6ca0eff4c0cb16c61
                • Instruction Fuzzy Hash: DB2104326043157BEB259B799C09E7F7BDCDF4A760F004169F944DA1A2EE69D84093A0
                APIs
                  • Part of subcall function 00FD2612: GetWindowLongW.USER32(?,000000EB), ref: 00FD2623
                • GetWindowLongW.USER32(?,000000F0), ref: 0105B192
                • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0105B1B7
                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0105B1CF
                • GetSystemMetrics.USER32(00000004), ref: 0105B1F8
                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,01040E90,00000000), ref: 0105B216
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$Long$MetricsSystem
                • String ID:
                • API String ID: 2294984445-0
                • Opcode ID: 0b49c6aaa3afcbd3eae640b52c1ed93d28686a81f0e6c55e3696e398eb11f557
                • Instruction ID: ab2754dd36c495bfa51fb63f361a5cfd71b11ffb996def20c9c967bf45d056d9
                • Opcode Fuzzy Hash: 0b49c6aaa3afcbd3eae640b52c1ed93d28686a81f0e6c55e3696e398eb11f557
                • Instruction Fuzzy Hash: 9A21B171914216AFCBA09E39DC08A6F3BA5FB05361F104729FEB2D71D0D735A810CB90
                APIs
                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 01029320
                  • Part of subcall function 00FD7BCC: _memmove.LIBCMT ref: 00FD7C06
                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 01029352
                • __itow.LIBCMT ref: 0102936A
                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 01029392
                • __itow.LIBCMT ref: 010293A3
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$__itow$_memmove
                • String ID:
                • API String ID: 2983881199-0
                • Opcode ID: c24c93f5afe031157cd6e6154a6555f4298d04f8568a1046c0740baa418294dd
                • Instruction ID: 5081546d02a3726ab24e7e295500ab67b05bc5b103a0d551157dc95a944d2b9f
                • Opcode Fuzzy Hash: c24c93f5afe031157cd6e6154a6555f4298d04f8568a1046c0740baa418294dd
                • Instruction Fuzzy Hash: CC212C317003297BDB10AA648C85EEF7BEDEF88714F049026FE84DB2C1D674C94197A1
                APIs
                • IsWindow.USER32(00000000), ref: 01045A6E
                • GetForegroundWindow.USER32 ref: 01045A85
                • GetDC.USER32(00000000), ref: 01045AC1
                • GetPixel.GDI32(00000000,?,00000003), ref: 01045ACD
                • ReleaseDC.USER32(00000000,00000003), ref: 01045B08
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$ForegroundPixelRelease
                • String ID:
                • API String ID: 4156661090-0
                • Opcode ID: 140fe34af1b2f833e9b5954d360e63b986cc3bb82da05ec527c9f38c3f16faf3
                • Instruction ID: fd8b1eb5a336c056e7e950d60d6aea715d71f1e30890c521fe6602008e8c0d81
                • Opcode Fuzzy Hash: 140fe34af1b2f833e9b5954d360e63b986cc3bb82da05ec527c9f38c3f16faf3
                • Instruction Fuzzy Hash: 4C218475A00205AFD714EFA5DC88AAABBE9EF48310F048479F889D7351CB79ED00DB90
                APIs
                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00FD134D
                • SelectObject.GDI32(?,00000000), ref: 00FD135C
                • BeginPath.GDI32(?), ref: 00FD1373
                • SelectObject.GDI32(?,00000000), ref: 00FD139C
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ObjectSelect$BeginCreatePath
                • String ID:
                • API String ID: 3225163088-0
                • Opcode ID: 5b639d2f45b67f78b34ab7aa3dc4000ee7cd6a0d56f4539aa973362e7d0f2095
                • Instruction ID: 5163852bfb88c51d48714171d10ff0fa8fa24721cb01e0257d65f8b6dbe46f77
                • Opcode Fuzzy Hash: 5b639d2f45b67f78b34ab7aa3dc4000ee7cd6a0d56f4539aa973362e7d0f2095
                • Instruction Fuzzy Hash: F4217431801309EFDB229F16DC0476B7BE9FB04321F284217F490AA294D77A9891EF90
                APIs
                • GetCurrentThreadId.KERNEL32 ref: 01034ABA
                • __beginthreadex.LIBCMT ref: 01034AD8
                • MessageBoxW.USER32(?,?,?,?), ref: 01034AED
                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 01034B03
                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 01034B0A
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                • String ID:
                • API String ID: 3824534824-0
                • Opcode ID: 5e7902ce62e5a93c1f281ef799286009fdfc4b0c2843adcde42ef9ca7f796b9f
                • Instruction ID: f6f47a06013d93026f2dfa4b3a005726ae4033506910c7609e638e169e2ea751
                • Opcode Fuzzy Hash: 5e7902ce62e5a93c1f281ef799286009fdfc4b0c2843adcde42ef9ca7f796b9f
                • Instruction Fuzzy Hash: 92116B72904308BFD7219FBDDC08A9F7FACEB86320F04429AF994D7240D67A890087A0
                APIs
                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0102821E
                • GetLastError.KERNEL32(?,01027CE2,?,?,?), ref: 01028228
                • GetProcessHeap.KERNEL32(00000008,?,?,01027CE2,?,?,?), ref: 01028237
                • HeapAlloc.KERNEL32(00000000,?,01027CE2,?,?,?), ref: 0102823E
                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 01028255
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                • String ID:
                • API String ID: 842720411-0
                • Opcode ID: 93cadc16216151516f3780b61926a5d8b90573ec759c075b9cbc083cffd55d75
                • Instruction ID: 7551471a3832f0ce7333b9da6c7216f2207db310edd489f00ff15544a30fe064
                • Opcode Fuzzy Hash: 93cadc16216151516f3780b61926a5d8b90573ec759c075b9cbc083cffd55d75
                • Instruction Fuzzy Hash: 8A016D75201315BFEB205FA9DC48D6B7FECEF8A654B50446AF989C3210DA3A8C04CB70
                APIs
                • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01027044,80070057,?,?,?,01027455), ref: 01027127
                • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01027044,80070057,?,?), ref: 01027142
                • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01027044,80070057,?,?), ref: 01027150
                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01027044,80070057,?), ref: 01027160
                • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01027044,80070057,?,?), ref: 0102716C
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: From$Prog$FreeStringTasklstrcmpi
                • String ID:
                • API String ID: 3897988419-0
                • Opcode ID: 68a6dac7f5cafe24e47f9b39f343e934e4f26fcb57c7e1b228e3b44c728a90d5
                • Instruction ID: 84e9df0dcebaef203f6b88bc21edf270a50a44b62911152a2efec54fbb56d00a
                • Opcode Fuzzy Hash: 68a6dac7f5cafe24e47f9b39f343e934e4f26fcb57c7e1b228e3b44c728a90d5
                • Instruction Fuzzy Hash: 86018476601325BBDB214F68DC44BABBFEEEF44651F244054FE84D2214D73ADD408BA0
                APIs
                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 01035260
                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0103526E
                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 01035276
                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 01035280
                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 010352BC
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: PerformanceQuery$CounterSleep$Frequency
                • String ID:
                • API String ID: 2833360925-0
                • Opcode ID: 7dcccba414e16e9ac9be0cb63ab2a4e062831420a760d87b32b591aa2e0b7b41
                • Instruction ID: 2ed5e882f1aabf1f8a0bf5a05fe1d1a75ab7b9bcd1c6918f782ee872059abc09
                • Opcode Fuzzy Hash: 7dcccba414e16e9ac9be0cb63ab2a4e062831420a760d87b32b591aa2e0b7b41
                • Instruction Fuzzy Hash: 2A015731D0161ADBCF10EFE4E8489EEBB78FB4A311F400446EA81B2194CB39555087A5
                APIs
                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 010280C0
                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 010280CA
                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 010280D9
                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 010280E0
                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 010280F6
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: HeapInformationToken$AllocErrorLastProcess
                • String ID:
                • API String ID: 44706859-0
                • Opcode ID: c7be52eed0893dd56925626d419155394db7cfe242ba133b96e5eb66590dc76d
                • Instruction ID: 58d6f391577b316411e4292daca5efde3acb303e9d71d1f4be60e4dcf6e88151
                • Opcode Fuzzy Hash: c7be52eed0893dd56925626d419155394db7cfe242ba133b96e5eb66590dc76d
                • Instruction Fuzzy Hash: 54F0C234205315AFEB211FA8EC8CE6B3FECEF4A754B144056F985C3180CB6A9840DB60
                APIs
                • GetDlgItem.USER32(?,000003E9), ref: 0102C1F7
                • GetWindowTextW.USER32(00000000,?,00000100), ref: 0102C20E
                • MessageBeep.USER32(00000000), ref: 0102C226
                • KillTimer.USER32(?,0000040A), ref: 0102C242
                • EndDialog.USER32(?,00000001), ref: 0102C25C
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: BeepDialogItemKillMessageTextTimerWindow
                • String ID:
                • API String ID: 3741023627-0
                • Opcode ID: 0ecb5a14d0dedbc5fe7c6f26c8a10beb915a0efa00bac4b880859ba2e3eeda1b
                • Instruction ID: c187b373c758b01c5cadd3ff0361f2100c26b97936fbc0ce42312d3ed6bd9a95
                • Opcode Fuzzy Hash: 0ecb5a14d0dedbc5fe7c6f26c8a10beb915a0efa00bac4b880859ba2e3eeda1b
                • Instruction Fuzzy Hash: 0801843040431597FB306B64DD4EF9B7BA8BB05705F000259E6C6914D19BA965488B50
                APIs
                • EndPath.GDI32(?), ref: 00FD13BF
                • StrokeAndFillPath.GDI32(?,?,0100B888,00000000,?), ref: 00FD13DB
                • SelectObject.GDI32(?,00000000), ref: 00FD13EE
                • DeleteObject.GDI32 ref: 00FD1401
                • StrokePath.GDI32(?), ref: 00FD141C
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Path$ObjectStroke$DeleteFillSelect
                • String ID:
                • API String ID: 2625713937-0
                • Opcode ID: 4f3cdb44ced7cbaceb894b7cdfcec44aafee675d3ddb3dd1c4caf9e5d5c1959e
                • Instruction ID: fcfb51b793a010f432a15937d82e8ff28e108b4522185b187d29b06d037c17aa
                • Opcode Fuzzy Hash: 4f3cdb44ced7cbaceb894b7cdfcec44aafee675d3ddb3dd1c4caf9e5d5c1959e
                • Instruction Fuzzy Hash: 73F0C931005309ABDB329F66EC5C75A3BA5B702326F1C8216F4A9991F8C73F4995EF50
                APIs
                  • Part of subcall function 00FF0DB6: std::exception::exception.LIBCMT ref: 00FF0DEC
                  • Part of subcall function 00FF0DB6: __CxxThrowException@8.LIBCMT ref: 00FF0E01
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                  • Part of subcall function 00FD7A51: _memmove.LIBCMT ref: 00FD7AAB
                • __swprintf.LIBCMT ref: 00FE2ECD
                Strings
                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00FE2D66
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                • API String ID: 1943609520-557222456
                • Opcode ID: 13cc58eac8706573c731b43349bfa1353650151e2e5975fe1357322b1cb8caab
                • Instruction ID: b4863e5cfda650b442068804bec9783a272e0ba9415f46b31b6b2c1cefb4bbcc
                • Opcode Fuzzy Hash: 13cc58eac8706573c731b43349bfa1353650151e2e5975fe1357322b1cb8caab
                • Instruction Fuzzy Hash: E9919A725083519FC714EF28CC85C6EB7A9EF85710F04091EF9829B2A1EA78ED44EB52
                APIs
                  • Part of subcall function 00FD4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FD4743,?,?,00FD37AE,?), ref: 00FD4770
                • CoInitialize.OLE32(00000000), ref: 0103B9BB
                • CoCreateInstance.OLE32(01062D6C,00000000,00000001,01062BDC,?), ref: 0103B9D4
                • CoUninitialize.OLE32 ref: 0103B9F1
                  • Part of subcall function 00FD9837: __itow.LIBCMT ref: 00FD9862
                  • Part of subcall function 00FD9837: __swprintf.LIBCMT ref: 00FD98AC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                • String ID: .lnk
                • API String ID: 2126378814-24824748
                • Opcode ID: c2c649161ae811f58229d2ec934dc843cef5b98c050846f0c9428239bfe87cf5
                • Instruction ID: 21f12f476eec421795d1c7e5b90057d34d1c3c985262ac0ef329aa30b90309ce
                • Opcode Fuzzy Hash: c2c649161ae811f58229d2ec934dc843cef5b98c050846f0c9428239bfe87cf5
                • Instruction Fuzzy Hash: 71A168756043059FC714EF14C884D2ABBEAFF89718F088989F8999B362CB75EC45CB91
                APIs
                • __startOneArgErrorHandling.LIBCMT ref: 00FF50AD
                  • Part of subcall function 010000F0: __87except.LIBCMT ref: 0100012B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ErrorHandling__87except__start
                • String ID: pow
                • API String ID: 2905807303-2276729525
                • Opcode ID: fce1586714ea808536ba15585c818c8b58b618aaab200636873d971532aa26d2
                • Instruction ID: e9903e35871a7c2f509409aa6207fb7e30fad0fd62ef9dcb732fd7fc987e8d7f
                • Opcode Fuzzy Hash: fce1586714ea808536ba15585c818c8b58b618aaab200636873d971532aa26d2
                • Instruction Fuzzy Hash: 5D513071D0890B96F7236618C9103BE3BD49F40BA0F208D99F7D5452FDDE3989C4AB86
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _memset$_memmove
                • String ID: ERCP
                • API String ID: 2532777613-1384759551
                • Opcode ID: f3754cf8a93f4a7373c65baa1d1a47e09561b7c83ba1a76e224cccdf44336ee3
                • Instruction ID: 3524e4bcb40fbb2b52e9e0058e3fb3f20cfafa5c55fca4d38473a8de96eb5ae6
                • Opcode Fuzzy Hash: f3754cf8a93f4a7373c65baa1d1a47e09561b7c83ba1a76e224cccdf44336ee3
                • Instruction Fuzzy Hash: 3951B071900709DFDB24EF66C8817AABBE4EF54354F20856EE98AD7251E734AA40DB40
                APIs
                  • Part of subcall function 010314BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,01029296,?,?,00000034,00000800,?,00000034), ref: 010314E6
                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0102983F
                  • Part of subcall function 01031487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,010292C5,?,?,00000800,?,00001073,00000000,?,?), ref: 010314B1
                  • Part of subcall function 010313DE: GetWindowThreadProcessId.USER32(?,?), ref: 01031409
                  • Part of subcall function 010313DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0102925A,00000034,?,?,00001004,00000000,00000000), ref: 01031419
                  • Part of subcall function 010313DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0102925A,00000034,?,?,00001004,00000000,00000000), ref: 0103142F
                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 010298AC
                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 010298F9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                • String ID: @
                • API String ID: 4150878124-2766056989
                • Opcode ID: 0d2fa37bda3a28d4db1a01f9d1359d5d77212147586b6148232c42caaf65b9c1
                • Instruction ID: adc1410d350102cac329800d02fdfe058ea939134a6a4af6e42239e27167e5ce
                • Opcode Fuzzy Hash: 0d2fa37bda3a28d4db1a01f9d1359d5d77212147586b6148232c42caaf65b9c1
                • Instruction Fuzzy Hash: FF41617690122DBFDB10DFA8CD81ADEBBB8EF59700F004095FA85B7180DA756E45CBA0
                APIs
                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0105F910,00000000,?,?,?,?), ref: 010579DF
                • GetWindowLongW.USER32 ref: 010579FC
                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 01057A0C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$Long
                • String ID: SysTreeView32
                • API String ID: 847901565-1698111956
                • Opcode ID: 7e7966d5e3a0538ee1bc7c71febd82b6ca29dc9a3c656ee4dbbaafee8daa73ad
                • Instruction ID: 9dbfa1fb0185f1013433ca85e3cf617e160b69fba403abf96f9946c9a9f4a13d
                • Opcode Fuzzy Hash: 7e7966d5e3a0538ee1bc7c71febd82b6ca29dc9a3c656ee4dbbaafee8daa73ad
                • Instruction Fuzzy Hash: 95310131200206ABDB918E38CC05BEB7BA9FF45324F644715FDB5932D0D735E950AB60
                APIs
                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 01057461
                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 01057475
                • SendMessageW.USER32(?,00001002,00000000,?), ref: 01057499
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$Window
                • String ID: SysMonthCal32
                • API String ID: 2326795674-1439706946
                • Opcode ID: f93e34ff16b593fdbf31acba51e99a8f02b83d610eefd7ad54ec2c0759dc4765
                • Instruction ID: 602cfa531fb149d37b2a81200ef306b00292af770c83bd869d6667485413d5b9
                • Opcode Fuzzy Hash: f93e34ff16b593fdbf31acba51e99a8f02b83d610eefd7ad54ec2c0759dc4765
                • Instruction Fuzzy Hash: E621B132500219ABDF228E64CC45FEB3FAAFB48724F110154FE956B190DB75A851DBA0
                APIs
                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 01057C4A
                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 01057C58
                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01057C5F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$DestroyWindow
                • String ID: msctls_updown32
                • API String ID: 4014797782-2298589950
                • Opcode ID: 4a6f5d9cfb8a0c0c0507243c12513ef6fcac6780f97d44bb57951b79bb189c27
                • Instruction ID: adeda2ac695ea028d8a942df262576c2bb0e6fddd6016c7a19d32674af04b59f
                • Opcode Fuzzy Hash: 4a6f5d9cfb8a0c0c0507243c12513ef6fcac6780f97d44bb57951b79bb189c27
                • Instruction Fuzzy Hash: A12171B5600209AFEB51DF28DCD1DA73BEDEF4A354B540059FA519B351CA36EC019B60
                APIs
                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 01056D3B
                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 01056D4B
                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 01056D70
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$MoveWindow
                • String ID: Listbox
                • API String ID: 3315199576-2633736733
                • Opcode ID: f04a5a7c987ced840dd6d17d7472b1494632de1df3ff85640afc311049406ca1
                • Instruction ID: 5d7d28e005c445745e9587fc172e475174e1d4ed042dab0837700dd598cd007a
                • Opcode Fuzzy Hash: f04a5a7c987ced840dd6d17d7472b1494632de1df3ff85640afc311049406ca1
                • Instruction Fuzzy Hash: 5421C532600118BFDF629F58CC44FBB3BBAFF89750F418164F9859B191C6769C5187A0
                APIs
                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 01057772
                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 01057787
                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 01057794
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend
                • String ID: msctls_trackbar32
                • API String ID: 3850602802-1010561917
                • Opcode ID: 14be9dc689ce0f30246bef28701f7cde05ff096aa1da1a4702e12b257c23d5d0
                • Instruction ID: 98d1e383885faa6be54d8c8981198e0d9ec88b7d8ded53d6cced037c30d5466b
                • Opcode Fuzzy Hash: 14be9dc689ce0f30246bef28701f7cde05ff096aa1da1a4702e12b257c23d5d0
                • Instruction Fuzzy Hash: D811E372240209BAEF655E65DC05FEB7BA9FF88B54F014119FA81A6090D672E411DB20
                APIs
                • LoadLibraryA.KERNEL32(kernel32.dll,?,00FD4B83,?), ref: 00FD4C44
                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00FD4C56
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                • API String ID: 2574300362-1355242751
                • Opcode ID: f50a7139c0eb3c6b488e0dbcf65d32ec720a53d994fce10f8538c402fec79357
                • Instruction ID: 03431def4457027663ff41f33a775008bc5094e4ffb0d12f1023067bcc14e31f
                • Opcode Fuzzy Hash: f50a7139c0eb3c6b488e0dbcf65d32ec720a53d994fce10f8538c402fec79357
                • Instruction Fuzzy Hash: 51D01270911713CFD7205F32D91860777D5AF05251B15882E94E5DA614E678D880C754
                APIs
                • LoadLibraryA.KERNEL32(advapi32.dll,?,01051039), ref: 01050DF5
                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 01050E07
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID: RegDeleteKeyExW$advapi32.dll
                • API String ID: 2574300362-4033151799
                • Opcode ID: beb25c94d655b79683f2fde2988061d6f3bae58c4b88ba4316944dacffe4a564
                • Instruction ID: a8b12a1aa8194a33a73b2c0907bf8b99cb220c6e099f5426bcd5883f7cda8759
                • Opcode Fuzzy Hash: beb25c94d655b79683f2fde2988061d6f3bae58c4b88ba4316944dacffe4a564
                • Instruction Fuzzy Hash: C2D0C730400323CFD320AF7AC80828B76E4AF01352F208C2EA8C2C6104E7B9D090CB64
                APIs
                • LoadLibraryA.KERNEL32(kernel32.dll,?,00FD4BD0,?,00FD4DEF,?,010952F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00FD4C11
                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00FD4C23
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                • API String ID: 2574300362-3689287502
                • Opcode ID: a2a9a57c4872d9df309bd5f0c0ec1ae0623836490ec6e1057449d75fddbcb196
                • Instruction ID: 8e8beba90252b50a7e949639fda30149a5f4676c639f6a9f248ecccbea8ef78b
                • Opcode Fuzzy Hash: a2a9a57c4872d9df309bd5f0c0ec1ae0623836490ec6e1057449d75fddbcb196
                • Instruction Fuzzy Hash: D1D01230911713CFD7206F71D958607B6D6EF09251F158C2E94C5D6610E7B8D880CB51
                APIs
                • LoadLibraryA.KERNEL32(kernel32.dll,00000001,01048CF4,?,0105F910), ref: 010490EE
                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 01049100
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID: GetModuleHandleExW$kernel32.dll
                • API String ID: 2574300362-199464113
                • Opcode ID: db61ed2719db1138da3980566bb7511984e2ac9f2bc0eaf56dc2acf08d7606b3
                • Instruction ID: b50fe62b68b70411283afb46eade65b4250ef3de0d25fe4e44c5ea285688042d
                • Opcode Fuzzy Hash: db61ed2719db1138da3980566bb7511984e2ac9f2bc0eaf56dc2acf08d7606b3
                • Instruction Fuzzy Hash: 41D01774510713CFEB30AF36D86860776E4AF0A255B12C87E9AC6DA950E6B9C4C0CB90
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: LocalTime__swprintf
                • String ID: %.3d$WIN_XPe
                • API String ID: 2070861257-2409531811
                • Opcode ID: b73eb98e0d81e71e48318c2df3d551e57e00af45e7de83aef81db04959e734e3
                • Instruction ID: 36dabb3a8b86b1368145be736fe4a6917e30703db695cb7f8237b9092f018ac5
                • Opcode Fuzzy Hash: b73eb98e0d81e71e48318c2df3d551e57e00af45e7de83aef81db04959e734e3
                • Instruction Fuzzy Hash: ECD05B7180910DFACB18AAA09C8CCFE737CBB08201F040452F786D2244E23DC794D721
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ca6618c45b98a17a860198018b6e612672167263d1bb4fda9d7480728d426565
                • Instruction ID: 7686dd5431c721fce9b2904f4ae8b4ba42e86d296dd1b89176280cb7221b202b
                • Opcode Fuzzy Hash: ca6618c45b98a17a860198018b6e612672167263d1bb4fda9d7480728d426565
                • Instruction Fuzzy Hash: 08C17074A00226EFDB14CF98C884EAEBBF5FF48714B148599E945EB251DB31ED81CB90
                APIs
                • CharLowerBuffW.USER32(?,?), ref: 0104E0BE
                • CharLowerBuffW.USER32(?,?), ref: 0104E101
                  • Part of subcall function 0104D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0104D7C5
                • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0104E301
                • _memmove.LIBCMT ref: 0104E314
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: BuffCharLower$AllocVirtual_memmove
                • String ID:
                • API String ID: 3659485706-0
                • Opcode ID: 695cac575a4f36729e1e9bd682465b4e3705d048f8cbdc55044333265fec7db1
                • Instruction ID: 5183cbbfa81da16440bfdf5841f0f0642f6fdc6da9bbde410505761304974ea4
                • Opcode Fuzzy Hash: 695cac575a4f36729e1e9bd682465b4e3705d048f8cbdc55044333265fec7db1
                • Instruction Fuzzy Hash: A0C18AB1A08301DFC744DF28C48096ABBE5FF89714F04896EF9999B362D734E945CB82
                APIs
                • CoInitialize.OLE32(00000000), ref: 010480C3
                • CoUninitialize.OLE32 ref: 010480CE
                  • Part of subcall function 0102D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0102D5D4
                • VariantInit.OLEAUT32(?), ref: 010480D9
                • VariantClear.OLEAUT32(?), ref: 010483AA
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                • String ID:
                • API String ID: 780911581-0
                • Opcode ID: f89b19decfe0397312703cfea60909ab8e632b499ab2c7b33b81340d6988df8f
                • Instruction ID: 6a53beeebf1d5b83e01be05fc9f98ba69ff811efaae44fd40522032a5d1a9f0a
                • Opcode Fuzzy Hash: f89b19decfe0397312703cfea60909ab8e632b499ab2c7b33b81340d6988df8f
                • Instruction Fuzzy Hash: 19A15BB56047019FDB50EF94C880A2EB7E5BF89714F48885EFA959B3A1CB74ED00DB42
                APIs
                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,01062C7C,?), ref: 010276EA
                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,01062C7C,?), ref: 01027702
                • CLSIDFromProgID.OLE32(?,?,00000000,0105FB80,000000FF,?,00000000,00000800,00000000,?,01062C7C,?), ref: 01027727
                • _memcmp.LIBCMT ref: 01027748
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: FromProg$FreeTask_memcmp
                • String ID:
                • API String ID: 314563124-0
                • Opcode ID: 65102b38eb1c2d1dc76ec47064a7d9da85bbf7dc55ce40775a965af14aad9b28
                • Instruction ID: cf77bfcaf2a5fc520d989a0c4c23cdec14c5993423bbedd46a3e5362a4434de3
                • Opcode Fuzzy Hash: 65102b38eb1c2d1dc76ec47064a7d9da85bbf7dc55ce40775a965af14aad9b28
                • Instruction Fuzzy Hash: 95814E71A00119EFCB04DFA8C988DEEB7B9FF89315F204598F545AB250DB71AE06CB60
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Variant$AllocClearCopyInitString
                • String ID:
                • API String ID: 2808897238-0
                • Opcode ID: 4d8111815c328f6b048825af09c4c4faa45896956697b32b34cac8909ed58a70
                • Instruction ID: f2312bd8bce420c4903e2ef8439e2f640a694de947b79506ed75c25874154817
                • Opcode Fuzzy Hash: 4d8111815c328f6b048825af09c4c4faa45896956697b32b34cac8909ed58a70
                • Instruction Fuzzy Hash: AF51A6747043129ADB64AFAAD8A167EB7E9AF44310F14C81FE9C6C7291DF76D840CB01
                APIs
                • GetWindowRect.USER32(0126E960,?), ref: 01059863
                • ScreenToClient.USER32(00000002,00000002), ref: 01059896
                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 01059903
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$ClientMoveRectScreen
                • String ID:
                • API String ID: 3880355969-0
                • Opcode ID: e32d7893ab4f775df11353f3d447cdf30cc84f7dd57b5beee217e819259da9b2
                • Instruction ID: 228a651ee62c3dc7fa7b2bd857028b1eef799c1323c7a96bbaec58757d174e82
                • Opcode Fuzzy Hash: e32d7893ab4f775df11353f3d447cdf30cc84f7dd57b5beee217e819259da9b2
                • Instruction Fuzzy Hash: 37514F34A00209EFCF61CF68C884AAF7BF6FF45364F148199F9A59B291D731A941CB90
                APIs
                • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 01029AD2
                • __itow.LIBCMT ref: 01029B03
                  • Part of subcall function 01029D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 01029DBE
                • SendMessageW.USER32(?,0000110A,00000001,?), ref: 01029B6C
                • __itow.LIBCMT ref: 01029BC3
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend$__itow
                • String ID:
                • API String ID: 3379773720-0
                • Opcode ID: 5ece0cf8d83dbb2a0784ccca24588b26f7fd8546eb86f82c890aae9a023c44c8
                • Instruction ID: 83b6473e04fbb3d6e4f2163fd0ebd751f22fa45a082f9646ca8d18fc93a6ed00
                • Opcode Fuzzy Hash: 5ece0cf8d83dbb2a0784ccca24588b26f7fd8546eb86f82c890aae9a023c44c8
                • Instruction Fuzzy Hash: 1941B170A00328ABDF11EF54CC45BEE7BFAEF44714F44005AF945A7291DB749944CBA1
                APIs
                • socket.WSOCK32(00000002,00000002,00000011), ref: 010469D1
                • WSAGetLastError.WSOCK32(00000000), ref: 010469E1
                  • Part of subcall function 00FD9837: __itow.LIBCMT ref: 00FD9862
                  • Part of subcall function 00FD9837: __swprintf.LIBCMT ref: 00FD98AC
                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 01046A45
                • WSAGetLastError.WSOCK32(00000000), ref: 01046A51
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ErrorLast$__itow__swprintfsocket
                • String ID:
                • API String ID: 2214342067-0
                • Opcode ID: e8730dbbb1a8c8e3f35b801eed4c2992367ea35577d5e6c49c6b6fa25cdf543d
                • Instruction ID: a67dc588cb1a84d453baa34bc6348d40b69e27d96f697de95e18212aea9a093a
                • Opcode Fuzzy Hash: e8730dbbb1a8c8e3f35b801eed4c2992367ea35577d5e6c49c6b6fa25cdf543d
                • Instruction Fuzzy Hash: B741B2757002006FEB60BF68CC86F7E77E69B05B10F488059FA599B3C2DAB99D019B51
                APIs
                • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0105F910), ref: 010464A7
                • _strlen.LIBCMT ref: 010464D9
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _strlen
                • String ID:
                • API String ID: 4218353326-0
                • Opcode ID: 2c6c3e274a73217b06e734a9f68679a37438a0b1d34a57caa4c1bad4f213b2f9
                • Instruction ID: 0904b08a099badb213b49b57f8560af5666e578afbb2cd20688c3e56b643f4af
                • Opcode Fuzzy Hash: 2c6c3e274a73217b06e734a9f68679a37438a0b1d34a57caa4c1bad4f213b2f9
                • Instruction Fuzzy Hash: 2841F671500105ABCB10FBA8DCD5FFEB7A9AF45310F04816AF95697392EB35AD04D790
                APIs
                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0103B89E
                • GetLastError.KERNEL32(?,00000000), ref: 0103B8C4
                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0103B8E9
                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0103B915
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CreateHardLink$DeleteErrorFileLast
                • String ID:
                • API String ID: 3321077145-0
                • Opcode ID: e93cc317e80b0af44b9b1d1f9a9a0c1a3c6ad98c61026cda8564e578550680dd
                • Instruction ID: 8706bd85f555fd41b08c7063b0d28ec896ee2603139d0f317dcdc92c921a9ec2
                • Opcode Fuzzy Hash: e93cc317e80b0af44b9b1d1f9a9a0c1a3c6ad98c61026cda8564e578550680dd
                • Instruction Fuzzy Hash: 37414F39A00611DFCB11EF54C444A5DBBE6EF89714F498089EC8A9B362CB78FD01EB91
                APIs
                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 010588DE
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: InvalidateRect
                • String ID:
                • API String ID: 634782764-0
                • Opcode ID: 75c16dc7a370d05d732192848e516e14dacb0c461f04fc50542c749c53601653
                • Instruction ID: 62cdbc4c0023fc2f1946e63a7370310b3e0fbe512d9b831e5370bce46db5a397
                • Opcode Fuzzy Hash: 75c16dc7a370d05d732192848e516e14dacb0c461f04fc50542c749c53601653
                • Instruction Fuzzy Hash: 7031C534600109FEEBE19A6ADC45BAF7BB5FB06350F588143FED1E6291C63595408B52
                APIs
                • ClientToScreen.USER32(?,?), ref: 0105AB60
                • GetWindowRect.USER32(?,?), ref: 0105ABD6
                • PtInRect.USER32(?,?,0105C014), ref: 0105ABE6
                • MessageBeep.USER32(00000000), ref: 0105AC57
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Rect$BeepClientMessageScreenWindow
                • String ID:
                • API String ID: 1352109105-0
                • Opcode ID: efb43e83c6493c5af6c5991d173c34118f3eec44eda928ad65495473e78d3864
                • Instruction ID: 1795a8ba71c474fdcb0d693e5a1c17ede5b3ec45c6533a1f39bd345c42e261ca
                • Opcode Fuzzy Hash: efb43e83c6493c5af6c5991d173c34118f3eec44eda928ad65495473e78d3864
                • Instruction Fuzzy Hash: 6141AB34B00209DFDBA2CF58C884BAA7FF5FF48300F1882A9E9959F255D731A841CB90
                APIs
                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 01030B27
                • SetKeyboardState.USER32(00000080,?,00000001), ref: 01030B43
                • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 01030BA9
                • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 01030BFB
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: KeyboardState$InputMessagePostSend
                • String ID:
                • API String ID: 432972143-0
                • Opcode ID: f3d6fd23587dab2ce0bcba8a0d7526177488ed82416d06b09cfae3622ce7b879
                • Instruction ID: c2e501eacf4aeeaf3b2ecc26b074df9d1281bac63d90beabd76580de8318ded4
                • Opcode Fuzzy Hash: f3d6fd23587dab2ce0bcba8a0d7526177488ed82416d06b09cfae3622ce7b879
                • Instruction Fuzzy Hash: B5312870A41319AEFB798E2D8805BFEBBEDABC5318F04429AF6D1521D9C3B985408761
                APIs
                • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 01030C66
                • SetKeyboardState.USER32(00000080,?,00008000), ref: 01030C82
                • PostMessageW.USER32(00000000,00000101,00000000), ref: 01030CE1
                • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 01030D33
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: KeyboardState$InputMessagePostSend
                • String ID:
                • API String ID: 432972143-0
                • Opcode ID: 2122cd64ae6a62c36d4443172b19cff9ea63caf442598207b1e6e2f22374f437
                • Instruction ID: 71c022fb01c07929da3d898b0461f335e35f984d19a47627a8110e3e0bd5c293
                • Opcode Fuzzy Hash: 2122cd64ae6a62c36d4443172b19cff9ea63caf442598207b1e6e2f22374f437
                • Instruction Fuzzy Hash: FF31247091131CAEFF319B288808BFEBBEEAB85310F04429AF5C5521D9C379954587A2
                APIs
                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 010061FB
                • __isleadbyte_l.LIBCMT ref: 01006229
                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 01006257
                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0100628D
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                • String ID:
                • API String ID: 3058430110-0
                • Opcode ID: 0432306c90cea796c7e9a51430250f73c835e692d76f17d439b1c42729a2152b
                • Instruction ID: 859efdf1c6df6fa849859b09917167d3fea7abecd5a6d0f76f973b484337062b
                • Opcode Fuzzy Hash: 0432306c90cea796c7e9a51430250f73c835e692d76f17d439b1c42729a2152b
                • Instruction Fuzzy Hash: F431C030604646AFFB228E68CC44BBA7FEABF42310F154068E9A4871E1D732D960D790
                APIs
                • GetForegroundWindow.USER32 ref: 01054F02
                  • Part of subcall function 01033641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0103365B
                  • Part of subcall function 01033641: GetCurrentThreadId.KERNEL32 ref: 01033662
                  • Part of subcall function 01033641: AttachThreadInput.USER32(00000000,?,01035005), ref: 01033669
                • GetCaretPos.USER32(?), ref: 01054F13
                • ClientToScreen.USER32(00000000,?), ref: 01054F4E
                • GetForegroundWindow.USER32 ref: 01054F54
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                • String ID:
                • API String ID: 2759813231-0
                • Opcode ID: 6de6cb8dbb9dc95a90e2ae9f16825993777d5afb9737aea7501f7561ebb87387
                • Instruction ID: f64cbc15592cdeaf218540a4cfa734061bc2c192e5332b525742d404f6ec95bd
                • Opcode Fuzzy Hash: 6de6cb8dbb9dc95a90e2ae9f16825993777d5afb9737aea7501f7561ebb87387
                • Instruction Fuzzy Hash: 7A312D71D00209AFCB10EFA9CC859EFB7FDEF98300F04406AE855E7241EA759E459BA0
                APIs
                • CreateToolhelp32Snapshot.KERNEL32 ref: 01033C7A
                • Process32FirstW.KERNEL32(00000000,?), ref: 01033C88
                • Process32NextW.KERNEL32(00000000,?), ref: 01033CA8
                • CloseHandle.KERNEL32(00000000), ref: 01033D52
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                • String ID:
                • API String ID: 420147892-0
                • Opcode ID: 74724b7b2669f06ade5bd90b8521cb1a6e51714d450c7cc8be01346419a1227c
                • Instruction ID: 452d22facf27739daf4c20bb6eb99542e1c02cadcc0ef5236c55b0847e95f2b1
                • Opcode Fuzzy Hash: 74724b7b2669f06ade5bd90b8521cb1a6e51714d450c7cc8be01346419a1227c
                • Instruction Fuzzy Hash: 5B319F311083059FD311EF64D885AAFBBE8BFC5354F44082EF5C18A2A1EB75D949DB92
                APIs
                  • Part of subcall function 00FD2612: GetWindowLongW.USER32(?,000000EB), ref: 00FD2623
                • GetCursorPos.USER32(?), ref: 0105C4D2
                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0100B9AB,?,?,?,?,?), ref: 0105C4E7
                • GetCursorPos.USER32(?), ref: 0105C534
                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0100B9AB,?,?,?), ref: 0105C56E
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Cursor$LongMenuPopupProcTrackWindow
                • String ID:
                • API String ID: 2864067406-0
                • Opcode ID: d2d7aa585010b9872da41cff7250efd273641b23548ddb8fc5889889502108d9
                • Instruction ID: 963e9399efa9d3c719df4751368daf419e942e240172d3710afff1ca22adc1a1
                • Opcode Fuzzy Hash: d2d7aa585010b9872da41cff7250efd273641b23548ddb8fc5889889502108d9
                • Instruction Fuzzy Hash: 8231C335500118AFEFA68F99C858EAB7FF9FB09314F044099FE858B251C7359990DFA4
                APIs
                  • Part of subcall function 0102810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 01028121
                  • Part of subcall function 0102810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0102812B
                  • Part of subcall function 0102810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0102813A
                  • Part of subcall function 0102810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 01028141
                  • Part of subcall function 0102810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 01028157
                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 010286A3
                • _memcmp.LIBCMT ref: 010286C6
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 010286FC
                • HeapFree.KERNEL32(00000000), ref: 01028703
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                • String ID:
                • API String ID: 1592001646-0
                • Opcode ID: d078e9bf74c2a90231482fe75fbf54e975a6b77db88c0821c0842737cb1c8ca5
                • Instruction ID: 3efe1a40b84f556ffc97a70b0c1e722c8572d9ec2a1ce23f25292535f76e62f2
                • Opcode Fuzzy Hash: d078e9bf74c2a90231482fe75fbf54e975a6b77db88c0821c0842737cb1c8ca5
                • Instruction Fuzzy Hash: F921B031E00219EFDB20DFA8C948BEEBBF8FF55314F14809AE585A7240D735AA05CB50
                APIs
                • __setmode.LIBCMT ref: 00FF09AE
                  • Part of subcall function 00FD5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,01037896,?,?,00000000), ref: 00FD5A2C
                  • Part of subcall function 00FD5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,01037896,?,?,00000000,?,?), ref: 00FD5A50
                • _fprintf.LIBCMT ref: 00FF09E5
                • OutputDebugStringW.KERNEL32(?), ref: 01025DBB
                  • Part of subcall function 00FF4AAA: _flsall.LIBCMT ref: 00FF4AC3
                • __setmode.LIBCMT ref: 00FF0A1A
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                • String ID:
                • API String ID: 521402451-0
                • Opcode ID: 68a5522ebf68cda0b55356b8aac5db311c718261d760e77c45c7e36804ac45f8
                • Instruction ID: 1a0a0994faf08e663ac2b126a45742171d91d88ab35ca32f585498ca0f98145d
                • Opcode Fuzzy Hash: 68a5522ebf68cda0b55356b8aac5db311c718261d760e77c45c7e36804ac45f8
                • Instruction Fuzzy Hash: EE113A3290420D6FDB04B6B49C469FFB7ADAF81320F18015AF30497293EE7C5846B7A5
                APIs
                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 010417A3
                  • Part of subcall function 0104182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0104184C
                  • Part of subcall function 0104182D: InternetCloseHandle.WININET(00000000), ref: 010418E9
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Internet$CloseConnectHandleOpen
                • String ID:
                • API String ID: 1463438336-0
                • Opcode ID: 91168e2b1d40d4732be7325b28cb99f323179d3b73e013cd3e141d37e5004395
                • Instruction ID: c7c0fd9061690fca2cc8b40b71d29a629276bdae7bd753f232de58cea0933057
                • Opcode Fuzzy Hash: 91168e2b1d40d4732be7325b28cb99f323179d3b73e013cd3e141d37e5004395
                • Instruction Fuzzy Hash: 272162B5200606BFEB129F64DC80FBBBBE9FF48710F10402EFA9596550DB75A45197A0
                APIs
                • GetFileAttributesW.KERNEL32(?,0105FAC0), ref: 01033A64
                • GetLastError.KERNEL32 ref: 01033A73
                • CreateDirectoryW.KERNEL32(?,00000000), ref: 01033A82
                • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0105FAC0), ref: 01033ADF
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CreateDirectory$AttributesErrorFileLast
                • String ID:
                • API String ID: 2267087916-0
                • Opcode ID: 0e27cba276b936d8c6b6cfb30547bce7ace3c01b14be6335f22825b474db8f0a
                • Instruction ID: 222cec878a6c720e698986d09e0f3c573432478cace1f263002a9afdd814df4e
                • Opcode Fuzzy Hash: 0e27cba276b936d8c6b6cfb30547bce7ace3c01b14be6335f22825b474db8f0a
                • Instruction Fuzzy Hash: 9221A3745087029F8310EF28C88586B7BE8BF85264F144A5EF4D9CB292EB35D94ACB43
                APIs
                • GetWindowLongW.USER32(?,000000EC), ref: 01055D80
                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 01055D9A
                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 01055DA8
                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 01055DB6
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$Long$AttributesLayered
                • String ID:
                • API String ID: 2169480361-0
                • Opcode ID: e8405bad225d852c2fc70b8182af0e88f18fcee3af64e111766c37463e2064f4
                • Instruction ID: 02c40e1831c54031d8c7b9da91b7d578b84e39ae4a3967da8838227ae8a60667
                • Opcode Fuzzy Hash: e8405bad225d852c2fc70b8182af0e88f18fcee3af64e111766c37463e2064f4
                • Instruction Fuzzy Hash: 2A11A232205111AFDB54AB55DC18FBB7799EF85320F084119F956C73D1C769AD01C7A4
                APIs
                • _free.LIBCMT ref: 01005101
                  • Part of subcall function 00FF571C: __FF_MSGBANNER.LIBCMT ref: 00FF5733
                  • Part of subcall function 00FF571C: __NMSG_WRITE.LIBCMT ref: 00FF573A
                  • Part of subcall function 00FF571C: RtlAllocateHeap.NTDLL(01250000,00000000,00000001,00000000,?,?,?,00FF0DD3,?), ref: 00FF575F
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: AllocateHeap_free
                • String ID:
                • API String ID: 614378929-0
                • Opcode ID: a96ea423564cff0f5c4cb26de576b995e650bc2f67a1286bea77264050c6aeb8
                • Instruction ID: 1e92b8dcce56a5df34fba5c51bde5678f32994fa1e5ad844fbc1d56e40230ab0
                • Opcode Fuzzy Hash: a96ea423564cff0f5c4cb26de576b995e650bc2f67a1286bea77264050c6aeb8
                • Instruction Fuzzy Hash: 1F110A72504619AEEF332F74AC056BE37D8AF443A1F104569FBC49A1E1DE3D84419F90
                APIs
                  • Part of subcall function 00FD5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,01037896,?,?,00000000), ref: 00FD5A2C
                  • Part of subcall function 00FD5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,01037896,?,?,00000000,?,?), ref: 00FD5A50
                • gethostbyname.WSOCK32(?), ref: 01046399
                • WSAGetLastError.WSOCK32(00000000), ref: 010463A4
                • _memmove.LIBCMT ref: 010463D1
                • inet_ntoa.WSOCK32(?), ref: 010463DC
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                • String ID:
                • API String ID: 1504782959-0
                • Opcode ID: e792b5efca116c58b3d533fda110363802d2011a4f677ddfe4cc91c609a728e7
                • Instruction ID: a672375f1c9581c24411165e8ad9c26bc855e35bcd5f103f67b0665d651b4f7e
                • Opcode Fuzzy Hash: e792b5efca116c58b3d533fda110363802d2011a4f677ddfe4cc91c609a728e7
                • Instruction Fuzzy Hash: 7E11607650010AAFCB00FBA4DD96CEEB7B9AF04310B084066F545A7261DF39AE04EB61
                APIs
                • SendMessageW.USER32(?,000000B0,?,?), ref: 01028B61
                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 01028B73
                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 01028B89
                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 01028BA4
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend
                • String ID:
                • API String ID: 3850602802-0
                • Opcode ID: 36365a6ab55e68a143d4c4f0d49e30d320ec3932e5442d5298394cb03768c5f2
                • Instruction ID: 3527764936a8f1f909a5907d170eabeda850fab01383817928b34c214a39f522
                • Opcode Fuzzy Hash: 36365a6ab55e68a143d4c4f0d49e30d320ec3932e5442d5298394cb03768c5f2
                • Instruction Fuzzy Hash: 85112E79901219FFEB11DFA5CC85F9EBBB4FB48710F204096EA40B7250D6716E11DB94
                APIs
                  • Part of subcall function 00FD2612: GetWindowLongW.USER32(?,000000EB), ref: 00FD2623
                • DefDlgProcW.USER32(?,00000020,?), ref: 00FD12D8
                • GetClientRect.USER32(?,?), ref: 0100B5FB
                • GetCursorPos.USER32(?), ref: 0100B605
                • ScreenToClient.USER32(?,?), ref: 0100B610
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Client$CursorLongProcRectScreenWindow
                • String ID:
                • API String ID: 4127811313-0
                • Opcode ID: 99e980452e0327c16f0f583bcb448990c418bf3464d0ab9b34eb1468ab6fe35c
                • Instruction ID: 8280e26b00e24b97e83a2968ba857c7df364986ee6c7c820e1aa001646f62a42
                • Opcode Fuzzy Hash: 99e980452e0327c16f0f583bcb448990c418bf3464d0ab9b34eb1468ab6fe35c
                • Instruction Fuzzy Hash: 9A112B3550011AFBCB11EFA8D8859EF77BAFB05301F540456EA41E7240C73AAA519BA5
                APIs
                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0102FCED,?,01030D40,?,00008000), ref: 0103115F
                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0102FCED,?,01030D40,?,00008000), ref: 01031184
                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0102FCED,?,01030D40,?,00008000), ref: 0103118E
                • Sleep.KERNEL32(?,?,?,?,?,?,?,0102FCED,?,01030D40,?,00008000), ref: 010311C1
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CounterPerformanceQuerySleep
                • String ID:
                • API String ID: 2875609808-0
                • Opcode ID: 9e82d7ef020d4bfb2c0d7394460411eac9ff1ddd6f969f0014f7e1993c402245
                • Instruction ID: 578ff058107801af968531b796cff0464a582794d091bc6be8f3a9142e5d3884
                • Opcode Fuzzy Hash: 9e82d7ef020d4bfb2c0d7394460411eac9ff1ddd6f969f0014f7e1993c402245
                • Instruction Fuzzy Hash: DE111831D4161DD7CF10AFA5D848AEEBBB8FF4A711F044045EA81B2245CB7595508BD5
                APIs
                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0102D84D
                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0102D864
                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0102D879
                • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0102D897
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Type$Register$FileLoadModuleNameUser
                • String ID:
                • API String ID: 1352324309-0
                • Opcode ID: fc303ac1e0fe00a8242cf115b6ab566186df7522417ec4adb66a8b6397d6bc49
                • Instruction ID: b32116e4f4bb975e3db2784229beee9c2070f75159f43ad651a944f8bbf25f31
                • Opcode Fuzzy Hash: fc303ac1e0fe00a8242cf115b6ab566186df7522417ec4adb66a8b6397d6bc49
                • Instruction Fuzzy Hash: 7B115E75605315DBE3208F90D808F97BBBCEB00B00F00856AE6DAD6040DBF5E9499FA1
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                • String ID:
                • API String ID: 3016257755-0
                • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                • Instruction ID: 2905b226278cd9e2e9f3127549766783849234290b2adebc4edb445b27a47b27
                • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                • Instruction Fuzzy Hash: B5017E3604014EFBEF139E88CC05CED3F66BB28250F488555FA98580B0C23BE5B1AB81
                APIs
                • GetWindowRect.USER32(?,?), ref: 0105B2E4
                • ScreenToClient.USER32(?,?), ref: 0105B2FC
                • ScreenToClient.USER32(?,?), ref: 0105B320
                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0105B33B
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ClientRectScreen$InvalidateWindow
                • String ID:
                • API String ID: 357397906-0
                • Opcode ID: 87b43ae2680569cee3aeaf3cb90912b351cceb10614ba4ed1fcf3f4dd2b8cd35
                • Instruction ID: 8261d0b2325986b9a98b5a0ae69aafd064608d22dd1c93b9f986bcdc34f72656
                • Opcode Fuzzy Hash: 87b43ae2680569cee3aeaf3cb90912b351cceb10614ba4ed1fcf3f4dd2b8cd35
                • Instruction Fuzzy Hash: 491144B9D0020AEFDB51DFA9C4849EEBBF9FF08210F108156E954E3214D735AA558F60
                APIs
                • _memset.LIBCMT ref: 0105B644
                • _memset.LIBCMT ref: 0105B653
                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,01096F20,01096F64), ref: 0105B682
                • CloseHandle.KERNEL32 ref: 0105B694
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _memset$CloseCreateHandleProcess
                • String ID:
                • API String ID: 3277943733-0
                • Opcode ID: 9182c21723925d79c2525706431feaad014d06a1d47c3e15c2d2fbec9a2fb220
                • Instruction ID: 2dc6468220e9b1827839338a8bc29ee63f0f69194308ac484492d128392bd077
                • Opcode Fuzzy Hash: 9182c21723925d79c2525706431feaad014d06a1d47c3e15c2d2fbec9a2fb220
                • Instruction Fuzzy Hash: 76F05EB25403047AF7202765AC36FBB3A9CFB09395F404020BB88E5196D77F580097A8
                APIs
                • EnterCriticalSection.KERNEL32(?), ref: 01036BE6
                  • Part of subcall function 010376C4: _memset.LIBCMT ref: 010376F9
                • _memmove.LIBCMT ref: 01036C09
                • _memset.LIBCMT ref: 01036C16
                • LeaveCriticalSection.KERNEL32(?), ref: 01036C26
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CriticalSection_memset$EnterLeave_memmove
                • String ID:
                • API String ID: 48991266-0
                • Opcode ID: 2bd287d405562da43b0ff6b27cf61ef700679d3430a9a2510ef583a9fe879b44
                • Instruction ID: b6aec92f8d32ce27fa58234310bd78398a8923f713942b6b1f2338738ca8995b
                • Opcode Fuzzy Hash: 2bd287d405562da43b0ff6b27cf61ef700679d3430a9a2510ef583a9fe879b44
                • Instruction Fuzzy Hash: 89F0547A100205ABCF016F55DC84A8ABB29EF45360F04C051FE099E226CB35E811DBB4
                APIs
                  • Part of subcall function 00FD12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00FD134D
                  • Part of subcall function 00FD12F3: SelectObject.GDI32(?,00000000), ref: 00FD135C
                  • Part of subcall function 00FD12F3: BeginPath.GDI32(?), ref: 00FD1373
                  • Part of subcall function 00FD12F3: SelectObject.GDI32(?,00000000), ref: 00FD139C
                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0105BD40
                • LineTo.GDI32(00000000,?,?), ref: 0105BD4D
                • EndPath.GDI32(00000000), ref: 0105BD5D
                • StrokePath.GDI32(00000000), ref: 0105BD6B
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                • String ID:
                • API String ID: 1539411459-0
                • Opcode ID: 7ba896fd013eb2ad5d7d7353131c597df3869dbd70a8481326e3a3777f613bc5
                • Instruction ID: e5a744284678cd7b771aed224b4dae13f291e3fe532934d90e3658030ac23cab
                • Opcode Fuzzy Hash: 7ba896fd013eb2ad5d7d7353131c597df3869dbd70a8481326e3a3777f613bc5
                • Instruction Fuzzy Hash: F7F0BE3100125ABBDB222F55AC0DFCF3F99BF06311F084041FA90650D1877E1650CBA5
                APIs
                • GetSysColor.USER32(00000008), ref: 00FD2231
                • SetTextColor.GDI32(?,000000FF), ref: 00FD223B
                • SetBkMode.GDI32(?,00000001), ref: 00FD2250
                • GetStockObject.GDI32(00000005), ref: 00FD2258
                • GetWindowDC.USER32(?,00000000), ref: 0100BE83
                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0100BE90
                • GetPixel.GDI32(00000000,?,00000000), ref: 0100BEA9
                • GetPixel.GDI32(00000000,00000000,?), ref: 0100BEC2
                • GetPixel.GDI32(00000000,?,?), ref: 0100BEE2
                • ReleaseDC.USER32(?,00000000), ref: 0100BEED
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                • String ID:
                • API String ID: 1946975507-0
                • Opcode ID: 13d5ce910927cd83229577e02de1f230bcc7c61d8cc34c6b06925b5dacb463f4
                • Instruction ID: 48d28528748cc687d6a73b5f638d8fb6c84152e832fc8808b40eed0aa917152c
                • Opcode Fuzzy Hash: 13d5ce910927cd83229577e02de1f230bcc7c61d8cc34c6b06925b5dacb463f4
                • Instruction Fuzzy Hash: F9E03932504245AAEB625F68E80DBDA3F11EB16336F0483A6FBA9580E5C77A4580DB12
                APIs
                • GetCurrentThread.KERNEL32 ref: 0102871B
                • OpenThreadToken.ADVAPI32(00000000,?,?,?,010282E6), ref: 01028722
                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,010282E6), ref: 0102872F
                • OpenProcessToken.ADVAPI32(00000000,?,?,?,010282E6), ref: 01028736
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CurrentOpenProcessThreadToken
                • String ID:
                • API String ID: 3974789173-0
                • Opcode ID: d45c60f7df67df7a28cf49653162ea179a76d613c7099fee8b4c374e98e8c3b2
                • Instruction ID: f2fb0aa587e2e2f9376d1fca6c8b6441049fe13b0a0101d7eb3ee6f434a003b5
                • Opcode Fuzzy Hash: d45c60f7df67df7a28cf49653162ea179a76d613c7099fee8b4c374e98e8c3b2
                • Instruction Fuzzy Hash: 4BE04F766113229BD7705EB45D0CB573BE8EF50791F048858F2C5CA084D62D80518750
                APIs
                • GetDesktopWindow.USER32 ref: 01011D5D
                • GetDC.USER32(00000000), ref: 01011D67
                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 01011D87
                • ReleaseDC.USER32(?), ref: 01011DA8
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CapsDesktopDeviceReleaseWindow
                • String ID:
                • API String ID: 2889604237-0
                • Opcode ID: a7719d11cde8fdc8975a591918a68f8bebe3fde636e4a031c7d0c1780ebeeda9
                • Instruction ID: 92526254c79afbe1fc3d5e127434ea6ebbea9fab1e3bb54cff8880befdcfaa87
                • Opcode Fuzzy Hash: a7719d11cde8fdc8975a591918a68f8bebe3fde636e4a031c7d0c1780ebeeda9
                • Instruction Fuzzy Hash: 66E0E575800206EFCF116FB0D80865E7BB2AB4C351F148016F99A97214DB7D8141AF50
                APIs
                • GetDesktopWindow.USER32 ref: 01011D71
                • GetDC.USER32(00000000), ref: 01011D7B
                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 01011D87
                • ReleaseDC.USER32(?), ref: 01011DA8
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CapsDesktopDeviceReleaseWindow
                • String ID:
                • API String ID: 2889604237-0
                • Opcode ID: 7cde9147826a2a35f3d76422bd81d4af5fa87da9aec8d7b17c79bbac11a21559
                • Instruction ID: 27868876b6aa06627e1608a6e1dd2ca672cf0c6053258b64535ac4f66fcca5f9
                • Opcode Fuzzy Hash: 7cde9147826a2a35f3d76422bd81d4af5fa87da9aec8d7b17c79bbac11a21559
                • Instruction Fuzzy Hash: 55E0E575800206AFCF215FB0C80865E7BB2AB4C351F148015F99997210DB7D9141AF50
                APIs
                • __getptd_noexit.LIBCMT ref: 00FF5DAD
                  • Part of subcall function 00FF99C4: GetLastError.KERNEL32(00000000,00FF0DD3,00FF8B2D,00FF57A3,?,?,00FF0DD3,?), ref: 00FF99C6
                  • Part of subcall function 00FF99C4: __calloc_crt.LIBCMT ref: 00FF99E7
                  • Part of subcall function 00FF99C4: __initptd.LIBCMT ref: 00FF9A09
                  • Part of subcall function 00FF99C4: GetCurrentThreadId.KERNEL32 ref: 00FF9A10
                  • Part of subcall function 00FF99C4: SetLastError.KERNEL32(00000000,00FF0DD3,?), ref: 00FF9A28
                • CloseHandle.KERNEL32(?,?,00FF5D8C), ref: 00FF5DC1
                • __freeptd.LIBCMT ref: 00FF5DC8
                • ExitThread.KERNEL32 ref: 00FF5DD0
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ErrorLastThread$CloseCurrentExitHandle__calloc_crt__freeptd__getptd_noexit__initptd
                • String ID:
                • API String ID: 4169687693-0
                • Opcode ID: 5194156afffdaafc650862d223cd723caf4dce85e19bfe6eb5b81945941dbc40
                • Instruction ID: c01bfff4c3da636c3b22607fb5f6852b1ee6eaa48df4e370fb8337dab90dde1c
                • Opcode Fuzzy Hash: 5194156afffdaafc650862d223cd723caf4dce85e19bfe6eb5b81945941dbc40
                • Instruction Fuzzy Hash: 39D0A771807F1647D73237308C0D73E33509F00B71B058208F3A5554F58BAC58039742
                APIs
                • OleSetContainedObject.OLE32(?,00000001), ref: 0102B4BE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ContainedObject
                • String ID: AutoIt3GUI$Container
                • API String ID: 3565006973-3941886329
                • Opcode ID: 976d2434ba03a168536d711383aa1aa3ea3cb469a9c81f438ae4870612048b10
                • Instruction ID: 1500c06b7ad025ed92ac81360c37c5ad3f0b156adacd3e520531ab80d944b38f
                • Opcode Fuzzy Hash: 976d2434ba03a168536d711383aa1aa3ea3cb469a9c81f438ae4870612048b10
                • Instruction Fuzzy Hash: 6E915970600611AFDB54DF68C884B6ABBE9FF49710F20856DE98ACF6A1DB71E841CB50
                APIs
                  • Part of subcall function 00FEFC86: _wcscpy.LIBCMT ref: 00FEFCA9
                  • Part of subcall function 00FD9837: __itow.LIBCMT ref: 00FD9862
                  • Part of subcall function 00FD9837: __swprintf.LIBCMT ref: 00FD98AC
                • __wcsnicmp.LIBCMT ref: 0103B02D
                • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0103B0F6
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                • String ID: LPT
                • API String ID: 3222508074-1350329615
                • Opcode ID: f04279f71de653e25f5a339ca3e6b8b0942d457c73106e660b3650c0410b1374
                • Instruction ID: b3c5b00f08ab8f6b92416826cbdda3d4a6918ec1fbf23213e72e564cf8442470
                • Opcode Fuzzy Hash: f04279f71de653e25f5a339ca3e6b8b0942d457c73106e660b3650c0410b1374
                • Instruction Fuzzy Hash: DD61B271E00219AFCB14EF98C891EAEB7F9EF48714F44409AF996AB351D774AE40CB50
                APIs
                • Sleep.KERNEL32(00000000), ref: 00FE2968
                • GlobalMemoryStatusEx.KERNEL32(?), ref: 00FE2981
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: GlobalMemorySleepStatus
                • String ID: @
                • API String ID: 2783356886-2766056989
                • Opcode ID: a814185717c1d819b000da3ec4b0fa4f0ade0ba7f52399d9eafc10abc06ec80e
                • Instruction ID: 28d5bf32084756cdbc1946fe3f9f5e9eac86869f0c97d1566ecebe1905e448ac
                • Opcode Fuzzy Hash: a814185717c1d819b000da3ec4b0fa4f0ade0ba7f52399d9eafc10abc06ec80e
                • Instruction Fuzzy Hash: 685166724087489BD320EF50DC86BAFBBF8FB85340F85884EF2D881195DB758529DB66
                APIs
                  • Part of subcall function 00FD4F0B: __fread_nolock.LIBCMT ref: 00FD4F29
                • _wcscmp.LIBCMT ref: 01039824
                • _wcscmp.LIBCMT ref: 01039837
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: _wcscmp$__fread_nolock
                • String ID: FILE
                • API String ID: 4029003684-3121273764
                • Opcode ID: f55e06e08dc296587a336f80678be59339d89b4ec74b29a6a6094aeb456f621d
                • Instruction ID: 4b5e4e7643b719b8a33fe781c63a10fb33261be6c3f1717ecc9d8a07e647ff8c
                • Opcode Fuzzy Hash: f55e06e08dc296587a336f80678be59339d89b4ec74b29a6a6094aeb456f621d
                • Instruction Fuzzy Hash: DE41C571A0020ABBDF219BA4CC45FEFBBBDEFC5714F00006AF944A7290D6B5A9049B61
                APIs
                • _memset.LIBCMT ref: 0104259E
                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 010425D4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CrackInternet_memset
                • String ID: |
                • API String ID: 1413715105-2343686810
                • Opcode ID: 883e48a927f8a978699aedb6072ef15ff8eebf760638ffd210d1b4607abe7fd9
                • Instruction ID: 3a692b65a2e415633c06a3a5eb49cd756b3344bf421f6c1b27436418e9389915
                • Opcode Fuzzy Hash: 883e48a927f8a978699aedb6072ef15ff8eebf760638ffd210d1b4607abe7fd9
                • Instruction Fuzzy Hash: 16315DB1900219EBCF01EFA5DC85EEEBFB9FF08340F04006AF954AA261EB355955DB50
                APIs
                • SendMessageW.USER32(?,00001132,00000000,?), ref: 01057B61
                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 01057B76
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend
                • String ID: '
                • API String ID: 3850602802-1997036262
                • Opcode ID: 7ed050a88dee7a39b964c4d09496f2fecebb02adcdb66b7f1b0c0c95acd401c1
                • Instruction ID: 5cb2b737feffa5e3f3d0db2810c55fa47c7bb96803df1239d6e5437eb34abb6a
                • Opcode Fuzzy Hash: 7ed050a88dee7a39b964c4d09496f2fecebb02adcdb66b7f1b0c0c95acd401c1
                • Instruction Fuzzy Hash: A8410A74A0130A9FDB54CFA9C981BDABBF9FB48300F50016AEE44AB346D771A951DF90
                APIs
                • DestroyWindow.USER32(?,?,?,?), ref: 01056B17
                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 01056B53
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$DestroyMove
                • String ID: static
                • API String ID: 2139405536-2160076837
                • Opcode ID: e84408ac4bdacf981605322d4348089470d978ccf33756f7ce00b25fccc4edd0
                • Instruction ID: 92d820556a7694cb3d8e8b50023602b456eb12d6c3fcc4d43abc5737c2d0b3be
                • Opcode Fuzzy Hash: e84408ac4bdacf981605322d4348089470d978ccf33756f7ce00b25fccc4edd0
                • Instruction Fuzzy Hash: 6331BE71200604AEEB519F69CC90BFB77F9FF48720F50861AFDE587190DA36A881DB60
                APIs
                • _memset.LIBCMT ref: 01032911
                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0103294C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: InfoItemMenu_memset
                • String ID: 0
                • API String ID: 2223754486-4108050209
                • Opcode ID: 98fa514efd0d2fcdb402dc564aa440391dfd766cedb97f2cd918d68f257b4fc9
                • Instruction ID: 1f52971f2866b05bd12b1b26b90779ba8590e7648a9bea48690971eff7160572
                • Opcode Fuzzy Hash: 98fa514efd0d2fcdb402dc564aa440391dfd766cedb97f2cd918d68f257b4fc9
                • Instruction Fuzzy Hash: A631BD31A00309ABEB65CE5CCC85BAEBFECEF85390F14009AEAC5A61A1DB749540CB51
                APIs
                • __snwprintf.LIBCMT ref: 01043A66
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: __snwprintf_memmove
                • String ID: , $$AUTOITCALLVARIABLE%d
                • API String ID: 3506404897-2584243854
                • Opcode ID: 12fc83994ea0485d4810b8b59168ccd79d302fee905c4a7df545c92d55b31c14
                • Instruction ID: c53ce1e6430cdeab2498b87260f7a135d962f91e34774760115db71d9af8a1d8
                • Opcode Fuzzy Hash: 12fc83994ea0485d4810b8b59168ccd79d302fee905c4a7df545c92d55b31c14
                • Instruction Fuzzy Hash: 9D21F570A40229AFCF10FF64CC81EAE7BBABF44300F44446AE984AF241DB34E911DB61
                APIs
                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 01056761
                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0105676C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: MessageSend
                • String ID: Combobox
                • API String ID: 3850602802-2096851135
                • Opcode ID: 253fefd9b4c5aae1cc4daa1bede2b97a6b98a58e16c7129917dd0264e22dfcad
                • Instruction ID: d5b3312e26ca621424cd4236e6f86c798d79ab7487396fe438662fcc3d437911
                • Opcode Fuzzy Hash: 253fefd9b4c5aae1cc4daa1bede2b97a6b98a58e16c7129917dd0264e22dfcad
                • Instruction Fuzzy Hash: 5A11B6752002096FEFA29E58CC84EBB77AAFB48364F500129FD9497291E6369C5187A0
                APIs
                  • Part of subcall function 00FD1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00FD1D73
                  • Part of subcall function 00FD1D35: GetStockObject.GDI32(00000011), ref: 00FD1D87
                  • Part of subcall function 00FD1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00FD1D91
                • GetWindowRect.USER32(00000000,?), ref: 01056C71
                • GetSysColor.USER32(00000012), ref: 01056C8B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Window$ColorCreateMessageObjectRectSendStock
                • String ID: static
                • API String ID: 1983116058-2160076837
                • Opcode ID: d5b3d8cd397ea8d0e30f86b68bc25e1dc4dd1f985c673380ac15d6dd43f181a6
                • Instruction ID: 02ba8245a34ad65a38f358c39bb50ce5fe979b07f0d30299eadb77a915384c94
                • Opcode Fuzzy Hash: d5b3d8cd397ea8d0e30f86b68bc25e1dc4dd1f985c673380ac15d6dd43f181a6
                • Instruction Fuzzy Hash: 1421177291020AAFDB55DFA8C845AFA7BA9FB08314F004619FD95D3240D63AE850DB60
                APIs
                • GetWindowTextLengthW.USER32(00000000), ref: 010569A2
                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 010569B1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: LengthMessageSendTextWindow
                • String ID: edit
                • API String ID: 2978978980-2167791130
                • Opcode ID: e69d319d69e7ce3cec9ac6a5f9e22dc3510e5fe35e1b2be8e981d1f464f9b04c
                • Instruction ID: 30e214d0f304926f006e0321028472136342819c5479483759bfa23fe5fa2873
                • Opcode Fuzzy Hash: e69d319d69e7ce3cec9ac6a5f9e22dc3510e5fe35e1b2be8e981d1f464f9b04c
                • Instruction Fuzzy Hash: 97116D71100205ABEF919E68DC40AEB37BEEB053B8F904714FDE1971D0C636DC519760
                APIs
                • _memset.LIBCMT ref: 01032A22
                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 01032A41
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: InfoItemMenu_memset
                • String ID: 0
                • API String ID: 2223754486-4108050209
                • Opcode ID: 1771b0fbf49e5ff808082453a02041e60fdabf5d2186e503c2602c35636d6cb3
                • Instruction ID: 1aea94964e54bb527d40103413a70d03625c6bb463c4b2c3d33cf29e9ca6716b
                • Opcode Fuzzy Hash: 1771b0fbf49e5ff808082453a02041e60fdabf5d2186e503c2602c35636d6cb3
                • Instruction Fuzzy Hash: FE110832901614ABEF71DE5CDC44BAE7BFCABC6200F144062EAD5E7290D774A907C791
                APIs
                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0104222C
                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 01042255
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Internet$OpenOption
                • String ID: <local>
                • API String ID: 942729171-4266983199
                • Opcode ID: 805df1931087ccb65408bdb13773fcabba68fc70664b90934c12f1947b9c89c2
                • Instruction ID: 2aed56a9d8b99cb1bfa0deec81847c3216840a6a0ad17f92b1068e2521529617
                • Opcode Fuzzy Hash: 805df1931087ccb65408bdb13773fcabba68fc70664b90934c12f1947b9c89c2
                • Instruction Fuzzy Hash: 0211C2B0641225FBDB258F55ADC8FBBFFA8FF06651F00827AFA9596000D2705990C6F0
                APIs
                  • Part of subcall function 01047FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,01047DB3,?,00000000,?,?), ref: 0104800D
                • inet_addr.WSOCK32(00000000), ref: 01047DB6
                • htons.WSOCK32(00000000), ref: 01047DF3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ByteCharMultiWidehtonsinet_addr
                • String ID: 255.255.255.255
                • API String ID: 2496851823-2422070025
                • Opcode ID: d0484822aefebe9f5503a8ed90d0fb602a71f1733df698138d57d96c3a7031f3
                • Instruction ID: 1a0072147f30b1f6b17c84ea4ecc587061aa12bcbe770deb7da6fde06605c5e3
                • Opcode Fuzzy Hash: d0484822aefebe9f5503a8ed90d0fb602a71f1733df698138d57d96c3a7031f3
                • Instruction Fuzzy Hash: 6211C87550021AABDB20AF68CC85FFEB775FF14320F10466BEA919B2D1DB72A810C791
                APIs
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                  • Part of subcall function 0102AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0102AABC
                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 01028E73
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ClassMessageNameSend_memmove
                • String ID: ComboBox$ListBox
                • API String ID: 372448540-1403004172
                • Opcode ID: d6a68f8139c936472cf1dbf358702eb677be55a06586095822609473fcea969e
                • Instruction ID: 516e49ba30b9c514c764518cf87c8fce809a683a6c41f1aad3d8925e8c9ae13a
                • Opcode Fuzzy Hash: d6a68f8139c936472cf1dbf358702eb677be55a06586095822609473fcea969e
                • Instruction Fuzzy Hash: 0301F575641229EB9F14FBA4CC518FE77AAAF15320B04460AF8B15B3E1EE355808D650
                APIs
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                  • Part of subcall function 0102AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0102AABC
                • SendMessageW.USER32(?,00000180,00000000,?), ref: 01028D6B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ClassMessageNameSend_memmove
                • String ID: ComboBox$ListBox
                • API String ID: 372448540-1403004172
                • Opcode ID: 6e8557d004c0067d86c23f6b4fb174cbcc9b4cdff917a407ee396f6bfc6105fb
                • Instruction ID: b3c4035d9125729275639c7d58c3ce42ab4c24e03fce3335736d5b13dfd251f5
                • Opcode Fuzzy Hash: 6e8557d004c0067d86c23f6b4fb174cbcc9b4cdff917a407ee396f6bfc6105fb
                • Instruction Fuzzy Hash: 14014275B4021AABDB14FBA0CD52EFF77E9DF15300F14001AF88267291EE298A0CA271
                APIs
                  • Part of subcall function 00FD7DE1: _memmove.LIBCMT ref: 00FD7E22
                  • Part of subcall function 0102AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0102AABC
                • SendMessageW.USER32(?,00000182,?,00000000), ref: 01028DEE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ClassMessageNameSend_memmove
                • String ID: ComboBox$ListBox
                • API String ID: 372448540-1403004172
                • Opcode ID: e2fd502c9bcda61162147a9e8aef6b1e45b07804d735b0a4a4811282fa1dc3bb
                • Instruction ID: 8096bca8ade02f33cee2c02e7aba2ed59f07be1ba5d3e00f05139f5ff0a24315
                • Opcode Fuzzy Hash: e2fd502c9bcda61162147a9e8aef6b1e45b07804d735b0a4a4811282fa1dc3bb
                • Instruction Fuzzy Hash: 3D01F275B4121AA7DB10FAA8CD51EFF77E99F21300F14401AF88267292DA298A0CA271
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: ClassName_wcscmp
                • String ID: #32770
                • API String ID: 2292705959-463685578
                • Opcode ID: 53b12c57494b8c3bb233d28da58c95770dc9708f5ab8e7c0d5f9fec54029e661
                • Instruction ID: 2d2a6f17cf4ff2cbbc25b3b04c4bef222bf7d605e884d8b3de06496bd0c31148
                • Opcode Fuzzy Hash: 53b12c57494b8c3bb233d28da58c95770dc9708f5ab8e7c0d5f9fec54029e661
                • Instruction Fuzzy Hash: 48E0D83260432D2BD720AA99EC49FA7F7ECEB85B70F05006BFD84D7041D5659A4587E0
                APIs
                  • Part of subcall function 0100B314: _memset.LIBCMT ref: 0100B321
                  • Part of subcall function 00FF0940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0100B2F0,?,?,?,00FD100A), ref: 00FF0945
                • IsDebuggerPresent.KERNEL32(?,?,?,00FD100A), ref: 0100B2F4
                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00FD100A), ref: 0100B303
                Strings
                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0100B2FE
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                • API String ID: 3158253471-631824599
                • Opcode ID: 6378845503e3954a0dfcec5d2070738be1762d80869149c3a3afd7702818b7b1
                • Instruction ID: c9a64aec96950ef821cb951909b3eb29a8cfa7f1c3ea66ce1472629a9721d966
                • Opcode Fuzzy Hash: 6378845503e3954a0dfcec5d2070738be1762d80869149c3a3afd7702818b7b1
                • Instruction Fuzzy Hash: ABE039746007018AE7329F29D4083467BE8AF00304F10CD6DE8C6C7786EBB99444CBA1
                APIs
                • GetSystemDirectoryW.KERNEL32(?), ref: 01011775
                  • Part of subcall function 0104BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0101195E,?), ref: 0104BFFE
                  • Part of subcall function 0104BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0104C010
                • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0101196D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: Library$AddressDirectoryFreeLoadProcSystem
                • String ID: WIN_XPe
                • API String ID: 582185067-3257408948
                • Opcode ID: 7957b019982f5a472a6af958edb1e504bb95caad195261198f99685c5b9afe13
                • Instruction ID: 606009f0ca9eb3532cbb055020fc2987593a82f48b916aa13199970ec3624398
                • Opcode Fuzzy Hash: 7957b019982f5a472a6af958edb1e504bb95caad195261198f99685c5b9afe13
                • Instruction Fuzzy Hash: 78F0C071800109DFDB29DBA5C598AED7BF8BB18301F540095E385A2194DB7A8F44CF61
                APIs
                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0105596E
                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 01055981
                  • Part of subcall function 01035244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 010352BC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: FindMessagePostSleepWindow
                • String ID: Shell_TrayWnd
                • API String ID: 529655941-2988720461
                • Opcode ID: f820722df6f04f0cf38263d46eb8bddeca374bf86da77b88ea41ada58032c5de
                • Instruction ID: de1a725593e6c9fa4311ae87df147d40b3127e5677a15bb6c7991cc8f308a2cd
                • Opcode Fuzzy Hash: f820722df6f04f0cf38263d46eb8bddeca374bf86da77b88ea41ada58032c5de
                • Instruction Fuzzy Hash: ABD0C935384312B7E774BA719C0EFD77A18AB54B50F000829B3C9AB1D4C9E99800C764
                APIs
                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 010559AE
                • PostMessageW.USER32(00000000), ref: 010559B5
                  • Part of subcall function 01035244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 010352BC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2155115595.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
                • Associated: 00000000.00000002.2155094737.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.000000000105F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155182870.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155247326.000000000108E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2155276209.0000000001097000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_fd0000_QwMcsmYcxv.jbxd
                Similarity
                • API ID: FindMessagePostSleepWindow
                • String ID: Shell_TrayWnd
                • API String ID: 529655941-2988720461
                • Opcode ID: d9554b42812539c8719aabed7016aee103e0c5e9701331fb60cb3b0e53f42eea
                • Instruction ID: 4edf58efe1816e2c65a7dd4d11ba38b903af7166d049ad6fdd9a3b778a22b55f
                • Opcode Fuzzy Hash: d9554b42812539c8719aabed7016aee103e0c5e9701331fb60cb3b0e53f42eea
                • Instruction Fuzzy Hash: 40D0C9313C4312BBE774BA719C0EFD77618AB55B50F000829B3C5AB1D4C9E9A800C764