Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZeAX5i7cGB.exe

Overview

General Information

Sample name:ZeAX5i7cGB.exe
renamed because original name is a hash value
Original sample name:272138ac60ea58d4b95bb5fad2e9574d73847e063b7a22a7be32b59b2b347445.exe
Analysis ID:1588720
MD5:65ed14721b82072f5e937200cdf0778f
SHA1:d6fff1b262210ef4393f8631d7df528daf78723a
SHA256:272138ac60ea58d4b95bb5fad2e9574d73847e063b7a22a7be32b59b2b347445
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected PureLog Stealer
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ZeAX5i7cGB.exe (PID: 5308 cmdline: "C:\Users\user\Desktop\ZeAX5i7cGB.exe" MD5: 65ED14721B82072F5E937200CDF0778F)
    • RegSvcs.exe (PID: 1656 cmdline: "C:\Users\user\Desktop\ZeAX5i7cGB.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • Ycdwx.exe (PID: 3652 cmdline: "C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 4336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Ycdwx.exe (PID: 6696 cmdline: "C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 6976 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3365612518.0000000005340000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
    00000002.00000002.3365612518.0000000005340000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000002.00000002.3365885108.00000000053C0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000002.00000002.3365885108.00000000053C0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000002.00000002.3363975882.0000000002D46000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 12 entries
            SourceRuleDescriptionAuthorStrings
            2.2.RegSvcs.exe.3d04d90.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              2.2.RegSvcs.exe.3d04d90.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                2.2.RegSvcs.exe.53c0000.8.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  2.2.RegSvcs.exe.53c0000.8.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    2.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                    • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
                    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
                    • 0x700:$s3: 83 EC 38 53 B0 FD 88 44 24 2B 88 44 24 2F B0 FD 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
                    • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
                    • 0x1e9d0:$s5: delete[]
                    • 0x1de88:$s6: constructor or from DllMain.
                    Click to see the 30 entries

                    System Summary

                    barindex
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 1656, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ycdwx
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 50.87.139.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 1656, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49705
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://mail.elec-qatar.comAvira URL Cloud: Label: malware
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
                    Source: ZeAX5i7cGB.exeVirustotal: Detection: 72%Perma Link
                    Source: ZeAX5i7cGB.exeReversingLabs: Detection: 87%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: ZeAX5i7cGB.exeJoe Sandbox ML: detected
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: /log.tmp
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <br>[
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ]<br>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <br>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Time:
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <br>User Name:
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <br>Computer Name:
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <br>OSFullName:
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <br>CPU:
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <br>RAM:
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <br>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: IP Address:
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <br>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <hr>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: New
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: IP Address:
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: true
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: https://api.ipify.org
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: false
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: false
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: false
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: false
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: false
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: false
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: true
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: false
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: mail.elec-qatar.com
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: mohammed.abrar@elec-qatar.com
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: MHabrar2019@#
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: davidsurly1@gmail.com
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: true
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: false
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: appdata
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Ycdwx
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Ycdwx.exe
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Ycdwx
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Type
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\Microsoft\Windows\CurrentVersion\Run
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <br>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <hr>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <br>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <b>[
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ]</b> (
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: )<br>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {BACK}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {ALT+TAB}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {ALT+F4}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {TAB}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {ESC}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {Win}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {CAPSLOCK}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {KEYUP}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {KEYDOWN}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {KEYLEFT}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {KEYRIGHT}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {DEL}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {END}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {HOME}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {Insert}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {NumLock}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {PageDown}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {PageUp}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {ENTER}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {F1}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {F2}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {F3}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {F4}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {F5}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {F6}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {F7}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {F8}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {F9}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {F10}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {F11}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {F12}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: control
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {CTRL}
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: &amp;
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: &lt;
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: &gt;
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: &quot;
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <br><hr>Copied Text: <br>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <hr>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: logins
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: IE/Edge
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Windows Secure Note
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Windows Web Password Credential
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Windows Credential Picker Protector
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Web Credentials
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Windows Credentials
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Windows Domain Certificate Credential
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Windows Domain Password Credential
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Windows Extended Credential
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SchemaId
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: pResourceElement
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: pIdentityElement
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: pPackageSid
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: pAuthenticatorElement
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: IE/Edge
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: UC Browser
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: UCBrowser\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Login Data
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: journal
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: wow_logins
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Safari for Windows
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <array>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <dict>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <string>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: </string>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <string>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: </string>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <data>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: </data>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: -convert xml1 -s -o "
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \fixed_keychain.xml"
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Microsoft\Credentials\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Microsoft\Credentials\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Microsoft\Credentials\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Microsoft\Credentials\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Microsoft\Protect\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: credential
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: QQ Browser
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Tencent\QQBrowser\User Data
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Default\EncryptedStorage
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Profile
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \EncryptedStorage
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: entries
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: category
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: str3
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: str2
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: blob0
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: password_value
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: IncrediMail
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: PopPassword
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SmtpPassword
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\IncrediMail\Identities\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Accounts_New
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: PopPassword
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SmtpPassword
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SmtpServer
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: EmailAddress
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Eudora
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: current
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Settings
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SavePasswordText
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Settings
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ReturnAddress
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Falkon Browser
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \falkon\profiles\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: profiles.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: profiles.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \browsedata.db
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: autofill
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ClawsMail
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Claws-mail
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \clawsrc
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \clawsrc
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: passkey0
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: master_passphrase_salt=(.+)
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \accountrc
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: smtp_server
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: address
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: account
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \passwordstorerc
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: {(.*),(.*)}(.*)
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Flock Browser
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: APPDATA
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Flock\Browser\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: signons3.txt
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: DynDns
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ALLUSERSPROFILE
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Dyn\Updater\config.dyndns
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: username=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: password=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: https://account.dyn.com/
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: t6KzXhCh
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ALLUSERSPROFILE
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Dyn\Updater\daemon.cfg
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: global
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: accounts
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: account.
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: username
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: account.
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Psi/Psi+
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: name
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Psi/Psi+
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: APPDATA
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Psi\profiles
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: APPDATA
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Psi+\profiles
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \accounts.xml
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \accounts.xml
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: OpenVPN
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\OpenVPN-GUI\configs
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\OpenVPN-GUI\configs
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\OpenVPN-GUI\configs\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: username
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: auth-data
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: entropy
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: USERPROFILE
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \OpenVPN\config\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: remote
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: remote
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: NordVPN
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: NordVPN
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: NordVpn.exe*
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: user.config
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: //setting[@name='Username']/value
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: //setting[@name='Password']/value
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: NordVPN
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Private Internet Access
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: %ProgramW6432%
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Private Internet Access\data
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ProgramFiles(x86)
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Private Internet Access\data
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \account.json
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: .*"username":"(.*?)"
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: .*"password":"(.*?)"
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Private Internet Access
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: privateinternetaccess.com
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: FileZilla
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: APPDATA
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \FileZilla\recentservers.xml
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: APPDATA
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \FileZilla\recentservers.xml
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <Server>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <Host>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <Host>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: </Host>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <Port>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: </Port>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <User>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <User>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: </User>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <Pass encoding="base64">
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <Pass encoding="base64">
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: </Pass>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <Pass>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <Pass encoding="base64">
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: </Pass>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: CoreFTP
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: User
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Host
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Port
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: hdfzpysvpzimorhk
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: WinSCP
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: HostName
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: UserName
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: PublicKeyFile
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: PortNumber
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: WinSCP
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ABCDEF
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Flash FXP
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: port
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: user
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: pass
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: quick.dat
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Sites.dat
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \FlashFXP\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \FlashFXP\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: FTP Navigator
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SystemDrive
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \FTP Navigator\Ftplist.txt
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Server
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: No Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: User
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SmartFTP
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: APPDATA
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: WS_FTP
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: appdata
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: HOST
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: PWD=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: PWD=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: FtpCommander
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SystemDrive
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SystemDrive
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SystemDrive
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \cftp\Ftplist.txt
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ;Password=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ;User=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ;Server=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ;Port=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ;Port=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ;Password=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ;User=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ;Anonymous=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: FTPGetter
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \FTPGetter\servers.xml
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <server>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <server_ip>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <server_ip>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: </server_ip>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <server_port>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: </server_port>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <server_user_name>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <server_user_name>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: </server_user_name>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <server_user_password>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: <server_user_password>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: </server_user_password>
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: FTPGetter
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: The Bat!
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: appdata
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \The Bat!
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Account.CFN
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Account.CFN
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Becky!
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: DataDir
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Folder.lst
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Mailbox.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Account
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: PassWd
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Account
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SMTPServer
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Account
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: MailAddress
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Becky!
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Outlook
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Email
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: IMAP Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: POP3 Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: HTTP Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SMTP Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Email
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Email
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Email
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: IMAP Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: POP3 Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: HTTP Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SMTP Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Server
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Windows Mail App
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Email
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Server
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SchemaId
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: pResourceElement
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: pIdentityElement
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: pPackageSid
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: pAuthenticatorElement
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: syncpassword
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: mailoutgoing
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: FoxMail
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Executable
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: FoxmailPath
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Storage\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Storage\
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \mail
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \mail
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Accounts\Account.rec0
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Accounts\Account.rec0
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Account.stg
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Account.stg
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: POP3Host
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SMTPHost
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: IncomingServer
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Account
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: MailAddress
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: POP3Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Opera Mail
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: opera:
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: PocoMail
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: appdata
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Pocomail\accounts.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Email
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: POPPass
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SMTPPass
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SMTP
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: eM Client
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: eM Client\accounts.dat
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: eM Client
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Accounts
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: "Username":"
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: "Secret":"
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: "ProviderName":"
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: o6806642kbM7c5
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Mailbird
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SenderIdentities
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Accounts
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \Mailbird\Store\Store.db
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Server_Host
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Accounts
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Email
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Username
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: EncryptedPassword
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Mailbird
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: RealVNC 4.x
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: RealVNC 3.x
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: RealVNC 4.x
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: RealVNC 3.x
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\ORL\WinVNC3
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: TightVNC
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\TightVNC\Server
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: TightVNC
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\TightVNC\Server
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: PasswordViewOnly
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: TightVNC ControlPassword
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\TightVNC\Server
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ControlPassword
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: TigerVNC
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Software\TigerVNC\Server
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: Password
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: UltraVNC
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ProgramFiles(x86)
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: passwd
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: UltraVNC
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ProgramFiles(x86)
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: passwd2
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: UltraVNC
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ProgramFiles
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: passwd
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: UltraVNC
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ProgramFiles
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: passwd2
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: UltraVNC
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ProgramFiles
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \UltraVNC\ultravnc.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: passwd
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: UltraVNC
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ProgramFiles
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \UltraVNC\ultravnc.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: passwd2
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: UltraVNC
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ProgramFiles(x86)
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \UltraVNC\ultravnc.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: passwd
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: UltraVNC
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: ProgramFiles(x86)
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: \UltraVNC\ultravnc.ini
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: passwd2
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: JDownloader 2.0
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: JDownloader 2.0\cfg
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: org.jdownloader.settings.AccountSettings.accounts.ejs
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: JDownloader 2.0\cfg
                    Source: 2.2.RegSvcs.exe.29ffb2e.2.unpackString decryptor: jd.controlling.authentication.AuthenticationControllerSettings.list.ejs
                    Source: ZeAX5i7cGB.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49704 version: TLS 1.2
                    Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.3365612518.0000000005340000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3365170902.0000000003CC1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3363655727.00000000029BE000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: RegSvcs.pdb, source: Ycdwx.exe, 00000003.00000000.2246241979.0000000000702000.00000002.00000001.01000000.00000007.sdmp, Ycdwx.exe.2.dr
                    Source: Binary string: wntdll.pdbUGP source: ZeAX5i7cGB.exe, 00000000.00000003.2126301769.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, ZeAX5i7cGB.exe, 00000000.00000003.2126589458.0000000003630000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: ZeAX5i7cGB.exe, 00000000.00000003.2126301769.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, ZeAX5i7cGB.exe, 00000000.00000003.2126589458.0000000003630000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.3366076080.0000000005633000.00000004.00000020.00020000.00000000.sdmp, Ycdwx.exe, 00000003.00000000.2246241979.0000000000702000.00000002.00000001.01000000.00000007.sdmp, Ycdwx.exe.2.dr
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FC445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00FC445A
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCC6D1 FindFirstFileW,FindClose,0_2_00FCC6D1
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00FCC75C
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FCEF95
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FCF0F2
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FCF3F3
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FC37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FC37EF
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FC3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FC3B12
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FCBCBC
                    Source: global trafficTCP traffic: 192.168.2.5:49705 -> 50.87.139.143:587
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewIP Address: 50.87.139.143 50.87.139.143
                    Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.5:49705 -> 50.87.139.143:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FD22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00FD22EE
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.elec-qatar.com
                    Source: RegSvcs.exe, 00000002.00000002.3366076080.0000000005633000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3363975882.0000000002D4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: RegSvcs.exe, 00000002.00000002.3366076080.00000000055E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: RegSvcs.exe, 00000002.00000002.3366076080.0000000005633000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3363975882.0000000002D4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: RegSvcs.exe, 00000002.00000002.3363975882.0000000002D46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.elec-qatar.com
                    Source: RegSvcs.exe, 00000002.00000002.3366076080.0000000005633000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3363975882.0000000002D4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: RegSvcs.exe, 00000002.00000002.3366076080.0000000005633000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3363975882.0000000002D4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                    Source: RegSvcs.exe, 00000002.00000002.3363975882.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegSvcs.exe, 00000002.00000002.3363975882.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: RegSvcs.exe, 00000002.00000002.3363975882.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: RegSvcs.exe, 00000002.00000002.3363975882.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: RegSvcs.exe, 00000002.00000002.3366076080.0000000005633000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3363975882.0000000002D4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49704 version: TLS 1.2
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FD4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00FD4164
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FD4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00FD4164
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FD3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00FD3F66
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FC001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00FC001C
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FECABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00FECABC

                    System Summary

                    barindex
                    Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 0.2.ZeAX5i7cGB.exe.3120000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 00000000.00000002.2128762297.0000000003120000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 00000002.00000002.3362305005.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: This is a third-party compiled AutoIt script.0_2_00F63B3A
                    Source: ZeAX5i7cGB.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: ZeAX5i7cGB.exe, 00000000.00000000.2116277198.0000000001014000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_aa04f8a9-1
                    Source: ZeAX5i7cGB.exe, 00000000.00000000.2116277198.0000000001014000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_64c61803-6
                    Source: ZeAX5i7cGB.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_31d72ad3-f
                    Source: ZeAX5i7cGB.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_a8124c4a-9
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00FCA1EF
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FB8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00FB8310
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FC51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00FC51BD
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F8D9750_2_00F8D975
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F6FCE00_2_00F6FCE0
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F821C50_2_00F821C5
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F962D20_2_00F962D2
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FE03DA0_2_00FE03DA
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F9242E0_2_00F9242E
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F825FA0_2_00F825FA
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F766E10_2_00F766E1
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F6E6A00_2_00F6E6A0
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FBE6160_2_00FBE616
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F9878F0_2_00F9878F
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FC88890_2_00FC8889
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FE08570_2_00FE0857
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F968440_2_00F96844
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F788080_2_00F78808
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F8CB210_2_00F8CB21
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F96DB60_2_00F96DB6
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F76F9E0_2_00F76F9E
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F730300_2_00F73030
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F8F1D90_2_00F8F1D9
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F831870_2_00F83187
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F612870_2_00F61287
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F814840_2_00F81484
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F755200_2_00F75520
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F876960_2_00F87696
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F757600_2_00F75760
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F819780_2_00F81978
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F99AB50_2_00F99AB5
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FE7DDB0_2_00FE7DDB
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F8BDA60_2_00F8BDA6
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F81D900_2_00F81D90
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F73FE00_2_00F73FE0
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F6DF000_2_00F6DF00
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00A558A80_2_00A558A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00408C602_2_00408C60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040DC112_2_0040DC11
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00407C3F2_2_00407C3F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00418CCC2_2_00418CCC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00406CA02_2_00406CA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004028B02_2_004028B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041A4BE2_2_0041A4BE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004182442_2_00418244
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004016502_2_00401650
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F202_2_00402F20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004193C42_2_004193C4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004187882_2_00418788
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F892_2_00402F89
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402B902_2_00402B90
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004073A02_2_004073A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02ADD3A02_2_02ADD3A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02ADDFB82_2_02ADDFB8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02AD12982_2_02AD1298
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02ADD6E82_2_02ADD6E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02AD0FC02_2_02AD0FC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02AD10302_2_02AD1030
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062B6E882_2_062B6E88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062BA2A02_2_062BA2A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062BC9202_2_062BC920
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062B001F2_2_062B001F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062B00402_2_062B0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067B14002_2_067B1400
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067BC2582_2_067BC258
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067B68B02_2_067B68B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067B9EC82_2_067B9EC8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: String function: 00F67DE1 appears 35 times
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: String function: 00F80AE3 appears 70 times
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: String function: 00F88900 appears 42 times
                    Source: ZeAX5i7cGB.exe, 00000000.00000003.2125291921.0000000003703000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZeAX5i7cGB.exe
                    Source: ZeAX5i7cGB.exe, 00000000.00000003.2125461365.00000000038AD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZeAX5i7cGB.exe
                    Source: ZeAX5i7cGB.exe, 00000000.00000002.2128762297.0000000003120000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename43d1e201-3b42-4ac8-8e2b-270e79cd58bc.exe4 vs ZeAX5i7cGB.exe
                    Source: ZeAX5i7cGB.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 0.2.ZeAX5i7cGB.exe.3120000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 00000000.00000002.2128762297.0000000003120000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 00000002.00000002.3362305005.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@2/2
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCA06A GetLastError,FormatMessageW,0_2_00FCA06A
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FB81CB AdjustTokenPrivileges,CloseHandle,0_2_00FB81CB
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FB87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00FB87E1
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCB3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00FCB3FB
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FDEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00FDEE0D
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FD83BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00FD83BB
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F64E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00F64E89
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\YcdwxJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6976:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4336:120:WilError_03
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeFile created: C:\Users\user\AppData\Local\Temp\aut961A.tmpJump to behavior
                    Source: ZeAX5i7cGB.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: ZeAX5i7cGB.exeVirustotal: Detection: 72%
                    Source: ZeAX5i7cGB.exeReversingLabs: Detection: 87%
                    Source: unknownProcess created: C:\Users\user\Desktop\ZeAX5i7cGB.exe "C:\Users\user\Desktop\ZeAX5i7cGB.exe"
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ZeAX5i7cGB.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe "C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe"
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe "C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe"
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ZeAX5i7cGB.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: ZeAX5i7cGB.exeStatic file information: File size 1191424 > 1048576
                    Source: ZeAX5i7cGB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: ZeAX5i7cGB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: ZeAX5i7cGB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: ZeAX5i7cGB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: ZeAX5i7cGB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: ZeAX5i7cGB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: ZeAX5i7cGB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.3365612518.0000000005340000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3365170902.0000000003CC1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3363655727.00000000029BE000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: RegSvcs.pdb, source: Ycdwx.exe, 00000003.00000000.2246241979.0000000000702000.00000002.00000001.01000000.00000007.sdmp, Ycdwx.exe.2.dr
                    Source: Binary string: wntdll.pdbUGP source: ZeAX5i7cGB.exe, 00000000.00000003.2126301769.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, ZeAX5i7cGB.exe, 00000000.00000003.2126589458.0000000003630000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: ZeAX5i7cGB.exe, 00000000.00000003.2126301769.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, ZeAX5i7cGB.exe, 00000000.00000003.2126589458.0000000003630000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.3366076080.0000000005633000.00000004.00000020.00020000.00000000.sdmp, Ycdwx.exe, 00000003.00000000.2246241979.0000000000702000.00000002.00000001.01000000.00000007.sdmp, Ycdwx.exe.2.dr
                    Source: ZeAX5i7cGB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: ZeAX5i7cGB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: ZeAX5i7cGB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: ZeAX5i7cGB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: ZeAX5i7cGB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F64B37 LoadLibraryA,GetProcAddress,0_2_00F64B37
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F88945 push ecx; ret 0_2_00F88958
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C40C push cs; iretd 2_2_0041C4E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00423149 push eax; ret 2_2_00423179
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C50E push cs; iretd 2_2_0041C4E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004231C8 push eax; ret 2_2_00423179
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E21D push ecx; ret 2_2_0040E230
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C6BE push ebx; ret 2_2_0041C6BF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02AD434F pushad ; iretd 2_2_02AD4355
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_062BEFE0 push eax; iretd 2_2_062BEFE9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run YcdwxJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run YcdwxJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F648D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F648D7
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FE5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00FE5376
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F83187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00F83187
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeAPI/Special instruction interceptor: Address: A554CC
                    Source: ZeAX5i7cGB.exe, 00000000.00000002.2127870763.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, ZeAX5i7cGB.exe, 00000000.00000003.2117101029.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, ZeAX5i7cGB.exe, 00000000.00000003.2116974758.0000000000B30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
                    Source: ZeAX5i7cGB.exe, 00000000.00000002.2127870763.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, ZeAX5i7cGB.exe, 00000000.00000003.2117101029.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, ZeAX5i7cGB.exe, 00000000.00000003.2116974758.0000000000B30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEF
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMemory allocated: 27E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMemory allocated: 29D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMemory allocated: 49D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMemory allocated: 1AB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMemory allocated: 3310000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMemory allocated: 3160000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2194Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 390Jump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-106073
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeAPI coverage: 5.7 %
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe TID: 768Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe TID: 1628Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FC445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00FC445A
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCC6D1 FindFirstFileW,FindClose,0_2_00FCC6D1
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00FCC75C
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FCEF95
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FCF0F2
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FCF3F3
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FC37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FC37EF
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FC3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FC3B12
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FCBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FCBCBC
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F649A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F649A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99641Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99531Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98721Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98594Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: RegSvcs.exe, 00000002.00000002.3366076080.00000000055E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllD
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeAPI call chain: ExitProcess graph end nodegraph_0-104428
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeAPI call chain: ExitProcess graph end nodegraph_0-104354
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FD3F09 BlockInput,0_2_00FD3F09
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F63B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F63B3A
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F95A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00F95A7C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F64B37 LoadLibraryA,GetProcAddress,0_2_00F64B37
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00A54138 mov eax, dword ptr fs:[00000030h]0_2_00A54138
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00A55798 mov eax, dword ptr fs:[00000030h]0_2_00A55798
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00A55738 mov eax, dword ptr fs:[00000030h]0_2_00A55738
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FB80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00FB80A9
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F8A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F8A155
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F8A124 SetUnhandledExceptionFilter,0_2_00F8A124
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040CE09
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040E61C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00416F6A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004123F1 SetUnhandledExceptionFilter,2_2_004123F1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: A0C008Jump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FB87B1 LogonUserW,0_2_00FB87B1
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F63B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F63B3A
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F648D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F648D7
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FC4C7F mouse_event,0_2_00FC4C7F
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ZeAX5i7cGB.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FB7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00FB7CAF
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FB874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00FB874B
                    Source: ZeAX5i7cGB.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: ZeAX5i7cGB.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F8862B cpuid 0_2_00F8862B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,2_2_00417A20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F94E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00F94E87
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FA1E06 GetUserNameW,0_2_00FA1E06
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F93F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00F93F3A
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00F649A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F649A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: ZeAX5i7cGB.exe, 00000000.00000002.2127870763.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, ZeAX5i7cGB.exe, 00000000.00000003.2117101029.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, ZeAX5i7cGB.exe, 00000000.00000003.2116974758.0000000000B30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procmon.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000002.00000002.3363975882.0000000002D46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3363975882.0000000002D14000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1656, type: MEMORYSTR
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3d04d90.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.53c0000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340000.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340000.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29fec46.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29fec46.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3d04d90.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29ffb2e.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc5570.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.53c0000.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340ee8.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340ee8.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc6458.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc5570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc6458.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29ffb2e.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.3365612518.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3365885108.00000000053C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3365170902.0000000003CC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3363655727.00000000029BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3d04d90.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.53c0000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340000.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340000.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29fec46.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29fec46.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3d04d90.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29ffb2e.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc5570.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.53c0000.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340ee8.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340ee8.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc6458.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc5570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc6458.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29ffb2e.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.3365612518.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3365885108.00000000053C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3365170902.0000000003CC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3363655727.00000000029BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: ZeAX5i7cGB.exeBinary or memory string: WIN_81
                    Source: ZeAX5i7cGB.exeBinary or memory string: WIN_XP
                    Source: ZeAX5i7cGB.exeBinary or memory string: WIN_XPe
                    Source: ZeAX5i7cGB.exeBinary or memory string: WIN_VISTA
                    Source: ZeAX5i7cGB.exeBinary or memory string: WIN_7
                    Source: ZeAX5i7cGB.exeBinary or memory string: WIN_8
                    Source: ZeAX5i7cGB.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 00000002.00000002.3363975882.0000000002D14000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1656, type: MEMORYSTR
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000002.00000002.3363975882.0000000002D46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3363975882.0000000002D14000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1656, type: MEMORYSTR
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3d04d90.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.53c0000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340000.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340000.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29fec46.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29fec46.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3d04d90.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29ffb2e.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc5570.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.53c0000.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340ee8.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340ee8.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc6458.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc5570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc6458.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29ffb2e.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.3365612518.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3365885108.00000000053C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3365170902.0000000003CC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3363655727.00000000029BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3d04d90.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.53c0000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340000.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340000.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29fec46.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29fec46.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3d04d90.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29ffb2e.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc5570.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.53c0000.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340ee8.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.5340ee8.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc6458.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc5570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.3cc6458.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.29ffb2e.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.3365612518.0000000005340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3365885108.00000000053C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3365170902.0000000003CC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3363655727.00000000029BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FD6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00FD6283
                    Source: C:\Users\user\Desktop\ZeAX5i7cGB.exeCode function: 0_2_00FD6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00FD6747
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    21
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt1
                    Registry Run Keys / Startup Folder
                    2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS148
                    System Information Discovery
                    Distributed Component Object Model21
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    1
                    Masquerading
                    LSA Secrets361
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                    Registry Run Keys / Startup Folder
                    2
                    Valid Accounts
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                    Virtualization/Sandbox Evasion
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                    Access Token Manipulation
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                    Process Injection
                    /etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                    Hidden Files and Directories
                    Network Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588720 Sample: ZeAX5i7cGB.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 25 mail.elec-qatar.com 2->25 27 api.ipify.org 2->27 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus detection for URL or domain 2->45 47 7 other signatures 2->47 7 ZeAX5i7cGB.exe 2 2->7         started        10 Ycdwx.exe 2 2->10         started        12 Ycdwx.exe 1 2->12         started        signatures3 process4 signatures5 49 Binary is likely a compiled AutoIt script file 7->49 51 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->51 53 Writes to foreign memory regions 7->53 55 2 other signatures 7->55 14 RegSvcs.exe 16 4 7->14         started        19 conhost.exe 10->19         started        21 conhost.exe 12->21         started        process6 dnsIp7 29 mail.elec-qatar.com 50.87.139.143, 49705, 587 UNIFIEDLAYER-AS-1US United States 14->29 31 api.ipify.org 104.26.13.205, 443, 49704 CLOUDFLARENETUS United States 14->31 23 C:\Users\user\AppData\Roaming\...\Ycdwx.exe, PE32 14->23 dropped 33 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->33 35 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->35 37 Tries to steal Mail credentials (via file / registry access) 14->37 39 3 other signatures 14->39 file8 signatures9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    ZeAX5i7cGB.exe72%VirustotalBrowse
                    ZeAX5i7cGB.exe88%ReversingLabsWin32.Trojan.AutoItinject
                    ZeAX5i7cGB.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe0%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://mail.elec-qatar.com100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    104.26.13.205
                    truefalse
                      high
                      mail.elec-qatar.com
                      50.87.139.143
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://mail.elec-qatar.comRegSvcs.exe, 00000002.00000002.3363975882.0000000002D46000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegSvcs.exe, 00000002.00000002.3366076080.0000000005633000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3363975882.0000000002D4E000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://api.ipify.orgRegSvcs.exe, 00000002.00000002.3363975882.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://sectigo.com/CPS0RegSvcs.exe, 00000002.00000002.3366076080.0000000005633000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3363975882.0000000002D4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://ocsp.sectigo.com0RegSvcs.exe, 00000002.00000002.3366076080.0000000005633000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3363975882.0000000002D4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.ipify.org/tRegSvcs.exe, 00000002.00000002.3363975882.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3363975882.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      104.26.13.205
                                      api.ipify.orgUnited States
                                      13335CLOUDFLARENETUSfalse
                                      50.87.139.143
                                      mail.elec-qatar.comUnited States
                                      46606UNIFIEDLAYER-AS-1UStrue
                                      Joe Sandbox version:42.0.0 Malachite
                                      Analysis ID:1588720
                                      Start date and time:2025-01-11 04:39:59 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 6m 44s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:9
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:ZeAX5i7cGB.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:272138ac60ea58d4b95bb5fad2e9574d73847e063b7a22a7be32b59b2b347445.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@7/6@2/2
                                      EGA Information:
                                      • Successful, ratio: 50%
                                      HCA Information:
                                      • Successful, ratio: 96%
                                      • Number of executed functions: 52
                                      • Number of non-executed functions: 272
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target Ycdwx.exe, PID 3652 because it is empty
                                      • Execution Graph export aborted for target Ycdwx.exe, PID 6696 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      04:41:03AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Ycdwx C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe
                                      04:41:12AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Ycdwx C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe
                                      22:41:02API Interceptor13x Sleep call for process: RegSvcs.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      104.26.13.205Yoranis Setup.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/
                                      BiXS3FRoLe.exeGet hashmaliciousTrojanRansomBrowse
                                      • api.ipify.org/
                                      lEUy79aLAW.exeGet hashmaliciousTrojanRansomBrowse
                                      • api.ipify.org/
                                      Simple1.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/
                                      2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/
                                      file.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/
                                      file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                      • api.ipify.org/
                                      file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                      • api.ipify.org/
                                      file.exeGet hashmaliciousRDPWrap ToolBrowse
                                      • api.ipify.org/
                                      Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                      • api.ipify.org/
                                      50.87.139.143RFQ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        231210-01-AgentTesla-2eba02.exeGet hashmaliciousAgentTeslaBrowse
                                          SecuriteInfo.com.Heur.18737.25106.exeGet hashmaliciousAgentTeslaBrowse
                                            SecuriteInfo.com.Win32.PWSX-gen.23449.29887.exeGet hashmaliciousAgentTeslaBrowse
                                              NEW ORDER 98540-0.exeGet hashmaliciousAgentTeslaBrowse
                                                Documents of shipment 3-2024.exeGet hashmaliciousAgentTeslaBrowse
                                                  SHIPPING DOC.exeGet hashmaliciousAgentTeslaBrowse
                                                    Order 19A20060.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      Proforma Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          api.ipify.orgjKqPSehspS.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.12.205
                                                          A6AHI7Uk18.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 172.67.74.152
                                                          Wru9ycO2MJ.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          iNFGd6bDZX.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.12.205
                                                          MyzWeEOlqb.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.12.205
                                                          5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 172.67.74.152
                                                          ukBQ4ch2nE.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          ru52XOQ1p7.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 172.67.74.152
                                                          xJZHVgxQul.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.12.205
                                                          jG8N6WDJOx.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          mail.elec-qatar.comRFQ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 50.87.139.143
                                                          231210-01-AgentTesla-2eba02.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 50.87.139.143
                                                          SecuriteInfo.com.Heur.18737.25106.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 50.87.139.143
                                                          SecuriteInfo.com.Win32.PWSX-gen.23449.29887.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 50.87.139.143
                                                          NEW ORDER 98540-0.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 50.87.139.143
                                                          Documents of shipment 3-2024.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 50.87.139.143
                                                          SHIPPING DOC.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 50.87.139.143
                                                          Order 19A20060.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 50.87.139.143
                                                          Proforma Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 50.87.139.143
                                                          SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 50.87.139.143
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          CLOUDFLARENETUSjKqPSehspS.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.12.205
                                                          BalphRTkPS.exeGet hashmaliciousFormBookBrowse
                                                          • 104.21.32.1
                                                          A6AHI7Uk18.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 172.67.74.152
                                                          Wru9ycO2MJ.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          iNFGd6bDZX.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.12.205
                                                          n2pGr8w21V.exeGet hashmaliciousFormBookBrowse
                                                          • 104.18.73.116
                                                          tNXl4XhgmV.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 104.21.48.1
                                                          MyzWeEOlqb.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.12.205
                                                          02Eh1ah35H.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 172.67.167.146
                                                          5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 172.67.74.152
                                                          UNIFIEDLAYER-AS-1USiNFGd6bDZX.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 192.254.225.136
                                                          RHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 162.241.62.63
                                                          ru52XOQ1p7.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 192.254.186.165
                                                          28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 162.241.62.63
                                                          https://atpscan.global.hornetsecurity.com/?d=W3rdHn1Og9hhUJnVJzqWF36wMmxswAZldvtx3E21ybg&f=v8m9AqGfgV2Ri7cjqmfsuyl2V2Mu_lVW0BRsqcFw4upagWAQ1C-MqANvN6gf4zNV&i=&k=xREg&m=b_ORYMkPffImCXbCPli-aiR7Ga6rGe55sar2xtigCL4MrowDPSzt7ABKETTGxzegakAfoZ57KD02aVix8V8TVmZ2VcxzjeybXYrPiS2SB73LCKYktj5jv2aw6VcPRslz&n=s4crRkyHC4bab6S3yrgn1E3n-VmdqgfSqNiaCJyPrf6hnyL_SE4PHEo5SUcwwsFGV6rnB35iQFM5FLsE91obvZ0HTAEiqHnB8ROLzY5JVgg&r=oMs_cp4DXIjeQhcPWsPLyR3_oxBVUN4Iok_tSVE4DNNtzqeot7ZzvdXkh4vatwpC&s=bd82eb507a358fd35f72f18b86e67f3bfc1ce64bbeab0c01d700897b1b678efb&u=https%3A%2F%2Fe.trustifi.com%2F%23%2Ffff2af%2F32054d%2F67960f%2Fee6fed%2F5d1d11%2F46c760%2Ff79190%2Fc5ec40%2Fe8666a%2Fef542d%2F85972d%2F627493%2F9a11d6%2F1f4096%2F1d247f%2F818e78%2Fc53383%2Fd59aa0%2Fedfa57%2F7914c7%2Fc38cf6%2Ff74f56%2Ff45915%2F39dbbd%2Ff48710%2F1ddf22%2F37d5f2%2F9de9f7%2F96109e%2F882355%2F854b66%2F9d606d%2F2d0447%2Fad3b01%2F637d1c%2F3c0f2b%2F606f48%2Fa6d904%2F8fefe3%2F00a4bb%2F6520c6%2F9b795c%2Fb7de1a%2Fb5dde6%2F3f5692%2F997c7d%2Fc00925%2F782cce%2F511459%2Fab5aa8%2F91722a%2Feec933%2F3f4f91%2F894088%2F43adfa%2Fb78195%2F0407d0%2F56f022%2Fddf20e%2F946567%2Faa271a%2F507b7a%2Faccd06%2F50d63c%2F485c4b%2F07ced8%2Fd0ec21%2F260ce6%2Fb5edbb%2F79a81e%2F1fd160%2Ff4da41%2F7073e0%2F8a5e9a%2Fdac829%2F521e52%2Fa1a847%2F13ea63%2Fabb5a3%2Fe1901e%2Fd876f6%2F7b0bf4%2Fbd19df%2F89bdcd%2F1874d8%2F0fb7f3%2F72f438%2Fa098c5%2F4e2214%2F4b6e54%2F0c4a8fGet hashmaliciousHTMLPhisherBrowse
                                                          • 162.241.149.91
                                                          https://atpscan.global.hornetsecurity.com/?d=W3rdHn1Og9hhUJnVJzqWF36wMmxswAZldvtx3E21ybg&f=v8m9AqGfgV2Ri7cjqmfsuyl2V2Mu_lVW0BRsqcFw4upagWAQ1C-MqANvN6gf4zNV&i=&k=xREg&m=b_ORYMkPffImCXbCPli-aiR7Ga6rGe55sar2xtigCL4MrowDPSzt7ABKETTGxzegakAfoZ57KD02aVix8V8TVmZ2VcxzjeybXYrPiS2SB73LCKYktj5jv2aw6VcPRslz&n=s4crRkyHC4bab6S3yrgn1E3n-VmdqgfSqNiaCJyPrf6hnyL_SE4PHEo5SUcwwsFGV6rnB35iQFM5FLsE91obvZ0HTAEiqHnB8ROLzY5JVgg&r=oMs_cp4DXIjeQhcPWsPLyR3_oxBVUN4Iok_tSVE4DNNtzqeot7ZzvdXkh4vatwpC&s=bd82eb507a358fd35f72f18b86e67f3bfc1ce64bbeab0c01d700897b1b678efb&u=https%3A%2F%2Fe.trustifi.com%2F%23%2Ffff2af%2F32054d%2F67960f%2Fee6fed%2F5d1d11%2F46c760%2Ff79190%2Fc5ec40%2Fe8666a%2Fef542d%2F85972d%2F627493%2F9a11d6%2F1f4096%2F1d247f%2F818e78%2Fc53383%2Fd59aa0%2Fedfa57%2F7914c7%2Fc38cf6%2Ff74f56%2Ff45915%2F39dbbd%2Ff48710%2F1ddf22%2F37d5f2%2F9de9f7%2F96109e%2F882355%2F854b66%2F9d606d%2F2d0447%2Fad3b01%2F637d1c%2F3c0f2b%2F606f48%2Fa6d904%2F8fefe3%2F00a4bb%2F6520c6%2F9b795c%2Fb7de1a%2Fb5dde6%2F3f5692%2F997c7d%2Fc00925%2F782cce%2F511459%2Fab5aa8%2F91722a%2Feec933%2F3f4f91%2F894088%2F43adfa%2Fb78195%2F0407d0%2F56f022%2Fddf20e%2F946567%2Faa271a%2F507b7a%2Faccd06%2F50d63c%2F485c4b%2F07ced8%2Fd0ec21%2F260ce6%2Fb5edbb%2F79a81e%2F1fd160%2Ff4da41%2F7073e0%2F8a5e9a%2Fdac829%2F521e52%2Fa1a847%2F13ea63%2Fabb5a3%2Fe1901e%2Fd876f6%2F7b0bf4%2Fbd19df%2F89bdcd%2F1874d8%2F0fb7f3%2F72f438%2Fa098c5%2F4e2214%2F4b6e54%2F0c4a8fGet hashmaliciousHTMLPhisherBrowse
                                                          • 162.241.149.91
                                                          Bontrageroutdoors_Project_Update_202557516.pdfGet hashmaliciousUnknownBrowse
                                                          • 108.179.241.236
                                                          e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 162.241.62.63
                                                          https://probashkontho.com/work/Organization/privacy/index_.htmlGet hashmaliciousUnknownBrowse
                                                          • 192.185.57.31
                                                          Y8Q1voljvb.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 192.254.186.165
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          3b5074b1b5d032e5620f69f9f700ff0ejKqPSehspS.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          A6AHI7Uk18.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          Wru9ycO2MJ.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          iNFGd6bDZX.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          MyzWeEOlqb.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          AJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
                                                          • 104.26.13.205
                                                          AJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
                                                          • 104.26.13.205
                                                          4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                          • 104.26.13.205
                                                          n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 104.26.13.205
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe2XnMqJW0u1.exeGet hashmaliciousXWormBrowse
                                                            B8FnDUj8hy.exeGet hashmaliciousAgentTeslaBrowse
                                                              yjOJ1YK5M3.exeGet hashmaliciousAsyncRATBrowse
                                                                PO.exeGet hashmaliciousDarkCloudBrowse
                                                                  Statement 2024-11-29 (K07234).exeGet hashmaliciousAgentTeslaBrowse
                                                                    PO54782322024.exeGet hashmaliciousAgentTeslaBrowse
                                                                      m30zZYga23.exeGet hashmaliciousAgentTeslaBrowse
                                                                        RFQ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                          AWB#150332.exeGet hashmaliciousAgentTeslaBrowse
                                                                            SOA_9828392091.exeGet hashmaliciousAgentTeslaBrowse
                                                                              Process:C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:modified
                                                                              Size (bytes):142
                                                                              Entropy (8bit):5.090621108356562
                                                                              Encrypted:false
                                                                              SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                              MD5:8C0458BB9EA02D50565175E38D577E35
                                                                              SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                              SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                              SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                              Malicious:false
                                                                              Reputation:high, very likely benign file
                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                              Process:C:\Users\user\Desktop\ZeAX5i7cGB.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):265028
                                                                              Entropy (8bit):7.976521046227301
                                                                              Encrypted:false
                                                                              SSDEEP:6144:zs0RoBfmpZsdm/EH+15zFzEfirPN7gczyqUrKl2ABheBeqgivKk9:zhR0mPA/H4UirdG3a2AriRv/
                                                                              MD5:AC74178DA42F21166D5322C06278A6A8
                                                                              SHA1:0DBC59D533C37D5D4A6FAC2AF1F5F3558FB50B63
                                                                              SHA-256:3CE4CDCD803C78E801CF7130176CD4F03670B56137D49061C629D5BD00B7706C
                                                                              SHA-512:1D02E1B12947A0A865C4151F9C92C12777B2CB050853519ABDD64466F1D3F63602BB972310F64894CB371A0DDDC7656BA4274DC98F7DC1C8EC2E97EB57399FE2
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:EA06.....Z4...Z.U..t-..e0.U..J-.....fS...nh@..N..4.........h.|}..Z...i..E4.K.u..zm;.Y...4.o-.....f+u.Je.{l..:..'fUS......$..,.=M.....3}.....bT>..'...3}.....S..]...f..|...2.{..-`..fW ..;)P.....t...."#V.Fh.*\..9..a.WB.N'3..R..Qh.....{...`...3.'".j.T.8..fSP.L...&..h.......V*.j7V.F..r.....i..r@.W.4..T.......3...}..MV.Z.l....M...5..e....}....[1..+z.....4wh.......L+.K..c$.J.T<m|.h.Q.Y@....'|......O.....4Y..Z5t.4.L..~..R.......i...j.i...K.P.3(.h.s..U..P....7..C.A......S.lq..5C.)..z....U..)Q-.e...3X..'...c....S1...(?hU....N...M..H.R.;Ok....@......._.].h"......i><-..g.Nf[..N=K..;H.3......\..uF..S.......b....L...y.....!T..7...V~.J='........S.?.Cit...r..j.]eRa..(......k...tR.T..4.O;...X.(./.g.RhW.\....\.......{3>.v....T....3?.H.Vn.....X.*.o...f....P.Kk..>..../w.^~S...4U.]....E)uY}.5....n.:.>..3..%..@..(.....3.s.V.......*5j%V........2.G.L.{.....nn.......8W(4...u.uZ%....d....S..F..h...>.W.a...N!p......n.(.?. .U..M..C....>.v...na.........z/..|._.?
                                                                              Process:C:\Users\user\Desktop\ZeAX5i7cGB.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):266752
                                                                              Entropy (8bit):7.882874452746509
                                                                              Encrypted:false
                                                                              SSDEEP:6144:IDtfYcKYZ6z+V6FoZRqk4axjJmCb/ATtOs0jzr2Z88FCW:WJ18z5FoZRKaVJt1jzrc8nW
                                                                              MD5:ABB56729299D1690A0D9A2E798A2779F
                                                                              SHA1:143ED040B7B7B4DE7964EFF6FA41ECB351239287
                                                                              SHA-256:3EFE9E79494E6CDE83562D2C463082504A23CA54BC4EF445B9329093B0D18266
                                                                              SHA-512:6584ECB54F141F6E7737E319CCFAA12A155E921392EFB76EF811AD52EE78031EDA9C83C1AB8A457066D9F7EFE5E1894505EBBC37A768E394DB27E0599CD024E3
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:th.XWVFUAFKB..20.TVFUEFK.C920XTVFUEFKBC920XTVFUEFKBC920XTVFU.FKBM&.>X._.t.G..bmZY+t&4:"4*/cZS^6;"f7 f97-.[^x...u()/'m4?:|TVFUEFK*S...).(j$.8g3.G..'*i7.;M..=.C.&x'.+.7.<q.\ND%.8gf/5.2.L.{/(k$.8.+ Q.A.*VFUEFKBC920XTVFU...&C920..VF.DBK6.9b0XTVFUEF.B`891QTV.TEF=@C920X{.FUEVKBC.30XT.FUUFKBA925XTVFUEFNBC920XTV&QEFOBC..2XVVF.EF[BC)20XTFFUUFKBC92 XTVFUEFKBC9.%ZT.FUEF+@C..1XTVFUEFKBC920XTVFUEFKBC92..UVZUEFKBC920XTVFUEFKBC920XTVFU.KIB.920XTVFUEFKB.82.YTVFUEFKBC920XTVFUEFKBC920Xz"#-1FKB[.30XDVFU.GKBG920XTVFUEFKBC9.0X4x41$2*BC._0XT.GUE(KBC.30XTVFUEFKBC92pXT.h1$2*BC9..XTVfWEF]BC982XTVFUEFKBC920.TV.{759!C92..UVF5GFK.B92.ZTVFUEFKBC920X.VF.EFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKBC920XTVFUEFKB
                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:modified
                                                                              Size (bytes):45984
                                                                              Entropy (8bit):6.16795797263964
                                                                              Encrypted:false
                                                                              SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                                                              MD5:9D352BC46709F0CB5EC974633A0C3C94
                                                                              SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                                                              SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                                                              SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Joe Sandbox View:
                                                                              • Filename: 2XnMqJW0u1.exe, Detection: malicious, Browse
                                                                              • Filename: B8FnDUj8hy.exe, Detection: malicious, Browse
                                                                              • Filename: yjOJ1YK5M3.exe, Detection: malicious, Browse
                                                                              • Filename: PO.exe, Detection: malicious, Browse
                                                                              • Filename: Statement 2024-11-29 (K07234).exe, Detection: malicious, Browse
                                                                              • Filename: PO54782322024.exe, Detection: malicious, Browse
                                                                              • Filename: m30zZYga23.exe, Detection: malicious, Browse
                                                                              • Filename: RFQ.exe, Detection: malicious, Browse
                                                                              • Filename: AWB#150332.exe, Detection: malicious, Browse
                                                                              • Filename: SOA_9828392091.exe, Detection: malicious, Browse
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                              Process:C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1141
                                                                              Entropy (8bit):4.442398121585593
                                                                              Encrypted:false
                                                                              SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                                                              MD5:6FB4D27A716A8851BC0505666E7C7A10
                                                                              SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                                                              SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                                                              SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                                                              Malicious:false
                                                                              Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                              Entropy (8bit):7.171154248149895
                                                                              TrID:
                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                              File name:ZeAX5i7cGB.exe
                                                                              File size:1'191'424 bytes
                                                                              MD5:65ed14721b82072f5e937200cdf0778f
                                                                              SHA1:d6fff1b262210ef4393f8631d7df528daf78723a
                                                                              SHA256:272138ac60ea58d4b95bb5fad2e9574d73847e063b7a22a7be32b59b2b347445
                                                                              SHA512:3ca5f9e3cc8bf355a29d1ff7398c395e96817fd030c02ad6056c169477e80c070868bee0c0f367a676a2ec432eb85fa292a437edf708f0153c006fe0118f0eb7
                                                                              SSDEEP:24576:Fu6J33O0c+JY5UZ+XC0kGso6Fa05cIDt0+iuzKQH+C4TuJtiWY:Hu0c++OCvkGs9Fa05cAt0ru+QH+C4TQE
                                                                              TLSH:D345CF2273DDC360CB669273BF69B7056EBB3C214630B95B2F980D7DA950172262C763
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                                              Icon Hash:aaf3e3e3938382a0
                                                                              Entrypoint:0x427dcd
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:false
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                              Time Stamp:0x674E46B9 [Mon Dec 2 23:46:01 2024 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:
                                                                              OS Version Major:5
                                                                              OS Version Minor:1
                                                                              File Version Major:5
                                                                              File Version Minor:1
                                                                              Subsystem Version Major:5
                                                                              Subsystem Version Minor:1
                                                                              Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                                              Instruction
                                                                              call 00007FD7B93B594Ah
                                                                              jmp 00007FD7B93A8714h
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              push edi
                                                                              push esi
                                                                              mov esi, dword ptr [esp+10h]
                                                                              mov ecx, dword ptr [esp+14h]
                                                                              mov edi, dword ptr [esp+0Ch]
                                                                              mov eax, ecx
                                                                              mov edx, ecx
                                                                              add eax, esi
                                                                              cmp edi, esi
                                                                              jbe 00007FD7B93A889Ah
                                                                              cmp edi, eax
                                                                              jc 00007FD7B93A8BFEh
                                                                              bt dword ptr [004C31FCh], 01h
                                                                              jnc 00007FD7B93A8899h
                                                                              rep movsb
                                                                              jmp 00007FD7B93A8BACh
                                                                              cmp ecx, 00000080h
                                                                              jc 00007FD7B93A8A64h
                                                                              mov eax, edi
                                                                              xor eax, esi
                                                                              test eax, 0000000Fh
                                                                              jne 00007FD7B93A88A0h
                                                                              bt dword ptr [004BE324h], 01h
                                                                              jc 00007FD7B93A8D70h
                                                                              bt dword ptr [004C31FCh], 00000000h
                                                                              jnc 00007FD7B93A8A3Dh
                                                                              test edi, 00000003h
                                                                              jne 00007FD7B93A8A4Eh
                                                                              test esi, 00000003h
                                                                              jne 00007FD7B93A8A2Dh
                                                                              bt edi, 02h
                                                                              jnc 00007FD7B93A889Fh
                                                                              mov eax, dword ptr [esi]
                                                                              sub ecx, 04h
                                                                              lea esi, dword ptr [esi+04h]
                                                                              mov dword ptr [edi], eax
                                                                              lea edi, dword ptr [edi+04h]
                                                                              bt edi, 03h
                                                                              jnc 00007FD7B93A88A3h
                                                                              movq xmm1, qword ptr [esi]
                                                                              sub ecx, 08h
                                                                              lea esi, dword ptr [esi+08h]
                                                                              movq qword ptr [edi], xmm1
                                                                              lea edi, dword ptr [edi+08h]
                                                                              test esi, 00000007h
                                                                              je 00007FD7B93A88F5h
                                                                              bt esi, 03h
                                                                              jnc 00007FD7B93A8948h
                                                                              Programming Language:
                                                                              • [ASM] VS2013 build 21005
                                                                              • [ C ] VS2013 build 21005
                                                                              • [C++] VS2013 build 21005
                                                                              • [ C ] VS2008 SP1 build 30729
                                                                              • [IMP] VS2008 SP1 build 30729
                                                                              • [ASM] VS2013 UPD4 build 31101
                                                                              • [RES] VS2013 build 21005
                                                                              • [LNK] VS2013 UPD4 build 31101
                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x5a4ac.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1220000x711c.reloc
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .rsrc0xc70000x5a4ac0x5a60029794f1bf5ee6455868e5f5d8c5d9357False0.9270644234094052data7.892805365588579IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .reloc0x1220000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                              RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                              RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                              RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                              RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                              RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                              RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                              RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                              RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                              RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                              RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                              RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                              RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                                              RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                              RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                                              RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                                              RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                              RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                              RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                              RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                              RT_RCDATA0xcf7b80x51771data1.0003326530428762
                                                                              RT_GROUP_ICON0x120f2c0x76dataEnglishGreat Britain0.6610169491525424
                                                                              RT_GROUP_ICON0x120fa40x14dataEnglishGreat Britain1.25
                                                                              RT_GROUP_ICON0x120fb80x14dataEnglishGreat Britain1.15
                                                                              RT_GROUP_ICON0x120fcc0x14dataEnglishGreat Britain1.25
                                                                              RT_VERSION0x120fe00xdcdataEnglishGreat Britain0.6181818181818182
                                                                              RT_MANIFEST0x1210bc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                              DLLImport
                                                                              WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                                              VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                              WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                                              PSAPI.DLLGetProcessMemoryInfo
                                                                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                              USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                                              UxTheme.dllIsThemeActive
                                                                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                                              USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                                              GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                                              COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                                              OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                                              Language of compilation systemCountry where language is spokenMap
                                                                              EnglishGreat Britain
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Jan 11, 2025 04:41:01.436131001 CET49704443192.168.2.5104.26.13.205
                                                                              Jan 11, 2025 04:41:01.436181068 CET44349704104.26.13.205192.168.2.5
                                                                              Jan 11, 2025 04:41:01.436259985 CET49704443192.168.2.5104.26.13.205
                                                                              Jan 11, 2025 04:41:01.444504023 CET49704443192.168.2.5104.26.13.205
                                                                              Jan 11, 2025 04:41:01.444528103 CET44349704104.26.13.205192.168.2.5
                                                                              Jan 11, 2025 04:41:01.920619965 CET44349704104.26.13.205192.168.2.5
                                                                              Jan 11, 2025 04:41:01.920742035 CET49704443192.168.2.5104.26.13.205
                                                                              Jan 11, 2025 04:41:01.994530916 CET49704443192.168.2.5104.26.13.205
                                                                              Jan 11, 2025 04:41:01.994558096 CET44349704104.26.13.205192.168.2.5
                                                                              Jan 11, 2025 04:41:01.995007038 CET44349704104.26.13.205192.168.2.5
                                                                              Jan 11, 2025 04:41:02.040565968 CET49704443192.168.2.5104.26.13.205
                                                                              Jan 11, 2025 04:41:02.263829947 CET49704443192.168.2.5104.26.13.205
                                                                              Jan 11, 2025 04:41:02.307336092 CET44349704104.26.13.205192.168.2.5
                                                                              Jan 11, 2025 04:41:02.377796888 CET44349704104.26.13.205192.168.2.5
                                                                              Jan 11, 2025 04:41:02.377897978 CET44349704104.26.13.205192.168.2.5
                                                                              Jan 11, 2025 04:41:02.377954006 CET49704443192.168.2.5104.26.13.205
                                                                              Jan 11, 2025 04:41:02.383796930 CET49704443192.168.2.5104.26.13.205
                                                                              Jan 11, 2025 04:41:03.058828115 CET49705587192.168.2.550.87.139.143
                                                                              Jan 11, 2025 04:41:03.063751936 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:03.063827038 CET49705587192.168.2.550.87.139.143
                                                                              Jan 11, 2025 04:41:03.673557043 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:03.677273989 CET49705587192.168.2.550.87.139.143
                                                                              Jan 11, 2025 04:41:03.682101965 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:03.825246096 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:03.825417995 CET49705587192.168.2.550.87.139.143
                                                                              Jan 11, 2025 04:41:03.830303907 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:03.974929094 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:03.975514889 CET49705587192.168.2.550.87.139.143
                                                                              Jan 11, 2025 04:41:03.980433941 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:04.131824970 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:04.131854057 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:04.131866932 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:04.131880999 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:04.132044077 CET49705587192.168.2.550.87.139.143
                                                                              Jan 11, 2025 04:41:04.220688105 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:04.267016888 CET49705587192.168.2.550.87.139.143
                                                                              Jan 11, 2025 04:41:04.271995068 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:04.415226936 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:04.428324938 CET49705587192.168.2.550.87.139.143
                                                                              Jan 11, 2025 04:41:04.433444977 CET5874970550.87.139.143192.168.2.5
                                                                              Jan 11, 2025 04:41:04.433522940 CET49705587192.168.2.550.87.139.143
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Jan 11, 2025 04:41:01.404560089 CET5586353192.168.2.51.1.1.1
                                                                              Jan 11, 2025 04:41:01.411473989 CET53558631.1.1.1192.168.2.5
                                                                              Jan 11, 2025 04:41:03.022514105 CET6363153192.168.2.51.1.1.1
                                                                              Jan 11, 2025 04:41:03.058108091 CET53636311.1.1.1192.168.2.5
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Jan 11, 2025 04:41:01.404560089 CET192.168.2.51.1.1.10x9b7dStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                              Jan 11, 2025 04:41:03.022514105 CET192.168.2.51.1.1.10x7332Standard query (0)mail.elec-qatar.comA (IP address)IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Jan 11, 2025 04:41:01.411473989 CET1.1.1.1192.168.2.50x9b7dNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                              Jan 11, 2025 04:41:01.411473989 CET1.1.1.1192.168.2.50x9b7dNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                              Jan 11, 2025 04:41:01.411473989 CET1.1.1.1192.168.2.50x9b7dNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                              Jan 11, 2025 04:41:03.058108091 CET1.1.1.1192.168.2.50x7332No error (0)mail.elec-qatar.com50.87.139.143A (IP address)IN (0x0001)false
                                                                              • api.ipify.org
                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.549704104.26.13.2054431656C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-01-11 03:41:02 UTC155OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                              Host: api.ipify.org
                                                                              Connection: Keep-Alive
                                                                              2025-01-11 03:41:02 UTC424INHTTP/1.1 200 OK
                                                                              Date: Sat, 11 Jan 2025 03:41:02 GMT
                                                                              Content-Type: text/plain
                                                                              Content-Length: 12
                                                                              Connection: close
                                                                              Vary: Origin
                                                                              CF-Cache-Status: DYNAMIC
                                                                              Server: cloudflare
                                                                              CF-RAY: 9001e3897a1f426b-EWR
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1580&min_rtt=1570&rtt_var=609&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1765417&cwnd=232&unsent_bytes=0&cid=410bc464656fb120&ts=473&x=0"
                                                                              2025-01-11 03:41:02 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                                              Data Ascii: 8.46.123.189


                                                                              TimestampSource PortDest PortSource IPDest IPCommands
                                                                              Jan 11, 2025 04:41:03.673557043 CET5874970550.87.139.143192.168.2.5220-box2248.bluehost.com ESMTP Exim 4.96.2 #2 Fri, 10 Jan 2025 20:41:03 -0700
                                                                              220-We do not authorize the use of this system to transport unsolicited,
                                                                              220 and/or bulk e-mail.
                                                                              Jan 11, 2025 04:41:03.677273989 CET49705587192.168.2.550.87.139.143EHLO 888683
                                                                              Jan 11, 2025 04:41:03.825246096 CET5874970550.87.139.143192.168.2.5250-box2248.bluehost.com Hello 888683 [8.46.123.189]
                                                                              250-SIZE 52428800
                                                                              250-8BITMIME
                                                                              250-PIPELINING
                                                                              250-PIPECONNECT
                                                                              250-AUTH PLAIN LOGIN
                                                                              250-STARTTLS
                                                                              250 HELP
                                                                              Jan 11, 2025 04:41:03.825417995 CET49705587192.168.2.550.87.139.143STARTTLS
                                                                              Jan 11, 2025 04:41:03.974929094 CET5874970550.87.139.143192.168.2.5220 TLS go ahead

                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to dive into process behavior distribution

                                                                              Click to jump to process

                                                                              Target ID:0
                                                                              Start time:22:40:59
                                                                              Start date:10/01/2025
                                                                              Path:C:\Users\user\Desktop\ZeAX5i7cGB.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\ZeAX5i7cGB.exe"
                                                                              Imagebase:0xf60000
                                                                              File size:1'191'424 bytes
                                                                              MD5 hash:65ED14721B82072F5E937200CDF0778F
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.2128762297.0000000003120000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:2
                                                                              Start time:22:40:59
                                                                              Start date:10/01/2025
                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\ZeAX5i7cGB.exe"
                                                                              Imagebase:0x8f0000
                                                                              File size:45'984 bytes
                                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.3365612518.0000000005340000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3365612518.0000000005340000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.3365885108.00000000053C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3365885108.00000000053C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3363975882.0000000002D46000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.3365170902.0000000003CC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3365170902.0000000003CC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3363975882.0000000002D14000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3363975882.0000000002D14000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.3362305005.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.3363655727.00000000029BE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3363655727.00000000029BE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:high
                                                                              Has exited:false

                                                                              Target ID:3
                                                                              Start time:22:41:12
                                                                              Start date:10/01/2025
                                                                              Path:C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe"
                                                                              Imagebase:0x700000
                                                                              File size:45'984 bytes
                                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Antivirus matches:
                                                                              • Detection: 0%, ReversingLabs
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:4
                                                                              Start time:22:41:12
                                                                              Start date:10/01/2025
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6d64d0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:6
                                                                              Start time:22:41:20
                                                                              Start date:10/01/2025
                                                                              Path:C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe"
                                                                              Imagebase:0xfb0000
                                                                              File size:45'984 bytes
                                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:7
                                                                              Start time:22:41:20
                                                                              Start date:10/01/2025
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6d64d0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Reset < >

                                                                                Execution Graph

                                                                                Execution Coverage:3.6%
                                                                                Dynamic/Decrypted Code Coverage:0.4%
                                                                                Signature Coverage:7.9%
                                                                                Total number of Nodes:2000
                                                                                Total number of Limit Nodes:29
                                                                                execution_graph 104205 f61066 104210 f6f76f 104205->104210 104207 f6106c 104243 f82d40 104207->104243 104211 f6f790 104210->104211 104246 f7ff03 104211->104246 104215 f6f7d7 104256 f67667 104215->104256 104218 f67667 59 API calls 104219 f6f7eb 104218->104219 104220 f67667 59 API calls 104219->104220 104221 f6f7f5 104220->104221 104222 f67667 59 API calls 104221->104222 104223 f6f833 104222->104223 104224 f67667 59 API calls 104223->104224 104225 f6f8fe 104224->104225 104261 f75f87 104225->104261 104229 f6f930 104230 f67667 59 API calls 104229->104230 104231 f6f93a 104230->104231 104289 f7fd9e 104231->104289 104233 f6f981 104234 f6f991 GetStdHandle 104233->104234 104235 fa45ab 104234->104235 104236 f6f9dd 104234->104236 104235->104236 104238 fa45b4 104235->104238 104237 f6f9e5 OleInitialize 104236->104237 104237->104207 104296 fc6b38 64 API calls Mailbox 104238->104296 104240 fa45bb 104297 fc7207 CreateThread 104240->104297 104242 fa45c7 CloseHandle 104242->104237 104369 f82c44 104243->104369 104245 f61076 104298 f7ffdc 104246->104298 104249 f7ffdc 59 API calls 104250 f7ff45 104249->104250 104251 f67667 59 API calls 104250->104251 104252 f7ff51 104251->104252 104305 f67bcc 104252->104305 104254 f6f796 104255 f80162 6 API calls 104254->104255 104255->104215 104257 f80db6 Mailbox 59 API calls 104256->104257 104258 f67688 104257->104258 104259 f80db6 Mailbox 59 API calls 104258->104259 104260 f67696 104259->104260 104260->104218 104262 f67667 59 API calls 104261->104262 104263 f75f97 104262->104263 104264 f67667 59 API calls 104263->104264 104265 f75f9f 104264->104265 104364 f75a9d 104265->104364 104268 f75a9d 59 API calls 104269 f75faf 104268->104269 104270 f67667 59 API calls 104269->104270 104271 f75fba 104270->104271 104272 f80db6 Mailbox 59 API calls 104271->104272 104273 f6f908 104272->104273 104274 f760f9 104273->104274 104275 f76107 104274->104275 104276 f67667 59 API calls 104275->104276 104277 f76112 104276->104277 104278 f67667 59 API calls 104277->104278 104279 f7611d 104278->104279 104280 f67667 59 API calls 104279->104280 104281 f76128 104280->104281 104282 f67667 59 API calls 104281->104282 104283 f76133 104282->104283 104284 f75a9d 59 API calls 104283->104284 104285 f7613e 104284->104285 104286 f80db6 Mailbox 59 API calls 104285->104286 104287 f76145 RegisterWindowMessageW 104286->104287 104287->104229 104290 fb576f 104289->104290 104291 f7fdae 104289->104291 104367 fc9ae7 60 API calls 104290->104367 104292 f80db6 Mailbox 59 API calls 104291->104292 104294 f7fdb6 104292->104294 104294->104233 104295 fb577a 104296->104240 104297->104242 104368 fc71ed 65 API calls 104297->104368 104299 f67667 59 API calls 104298->104299 104300 f7ffe7 104299->104300 104301 f67667 59 API calls 104300->104301 104302 f7ffef 104301->104302 104303 f67667 59 API calls 104302->104303 104304 f7ff3b 104303->104304 104304->104249 104306 f67c45 104305->104306 104307 f67bd8 __wsetenvp 104305->104307 104318 f67d2c 104306->104318 104310 f67c13 104307->104310 104311 f67bee 104307->104311 104309 f67bf6 _memmove 104309->104254 104315 f68029 104310->104315 104314 f67f27 59 API calls Mailbox 104311->104314 104314->104309 104322 f80db6 104315->104322 104317 f68033 104317->104309 104319 f67d3a 104318->104319 104321 f67d43 _memmove 104318->104321 104319->104321 104360 f67e4f 104319->104360 104321->104309 104325 f80dbe 104322->104325 104324 f80dd8 104324->104317 104325->104324 104327 f80ddc std::exception::exception 104325->104327 104332 f8571c 104325->104332 104349 f833a1 DecodePointer 104325->104349 104350 f8859b RaiseException 104327->104350 104329 f80e06 104351 f884d1 58 API calls _free 104329->104351 104331 f80e18 104331->104317 104333 f85797 104332->104333 104337 f85728 104332->104337 104358 f833a1 DecodePointer 104333->104358 104335 f8579d 104359 f88b28 58 API calls __getptd_noexit 104335->104359 104339 f8575b RtlAllocateHeap 104337->104339 104342 f85733 104337->104342 104343 f85783 104337->104343 104347 f85781 104337->104347 104355 f833a1 DecodePointer 104337->104355 104339->104337 104340 f8578f 104339->104340 104340->104325 104342->104337 104352 f8a16b 58 API calls 2 library calls 104342->104352 104353 f8a1c8 58 API calls 7 library calls 104342->104353 104354 f8309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104342->104354 104356 f88b28 58 API calls __getptd_noexit 104343->104356 104357 f88b28 58 API calls __getptd_noexit 104347->104357 104349->104325 104350->104329 104351->104331 104352->104342 104353->104342 104355->104337 104356->104347 104357->104340 104358->104335 104359->104340 104361 f67e62 104360->104361 104363 f67e5f _memmove 104360->104363 104362 f80db6 Mailbox 59 API calls 104361->104362 104362->104363 104363->104321 104365 f67667 59 API calls 104364->104365 104366 f75aa5 104365->104366 104366->104268 104367->104295 104370 f82c50 _flsall 104369->104370 104377 f83217 104370->104377 104376 f82c77 _flsall 104376->104245 104394 f89c0b 104377->104394 104379 f82c59 104380 f82c88 DecodePointer DecodePointer 104379->104380 104381 f82cb5 104380->104381 104382 f82c65 104380->104382 104381->104382 104440 f887a4 59 API calls 2 library calls 104381->104440 104391 f82c82 104382->104391 104384 f82d18 EncodePointer EncodePointer 104384->104382 104385 f82cec 104385->104382 104389 f82d06 EncodePointer 104385->104389 104442 f88864 61 API calls 2 library calls 104385->104442 104386 f82cc7 104386->104384 104386->104385 104441 f88864 61 API calls 2 library calls 104386->104441 104389->104384 104390 f82d00 104390->104382 104390->104389 104443 f83220 104391->104443 104395 f89c1c 104394->104395 104396 f89c2f EnterCriticalSection 104394->104396 104401 f89c93 104395->104401 104396->104379 104398 f89c22 104398->104396 104425 f830b5 58 API calls 3 library calls 104398->104425 104402 f89c9f _flsall 104401->104402 104403 f89ca8 104402->104403 104404 f89cc0 104402->104404 104426 f8a16b 58 API calls 2 library calls 104403->104426 104407 f89ce1 _flsall 104404->104407 104429 f8881d 58 API calls 2 library calls 104404->104429 104407->104398 104408 f89cad 104427 f8a1c8 58 API calls 7 library calls 104408->104427 104409 f89cd5 104411 f89ceb 104409->104411 104412 f89cdc 104409->104412 104416 f89c0b __lock 58 API calls 104411->104416 104430 f88b28 58 API calls __getptd_noexit 104412->104430 104413 f89cb4 104428 f8309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104413->104428 104418 f89cf2 104416->104418 104419 f89cff 104418->104419 104420 f89d17 104418->104420 104431 f89e2b InitializeCriticalSectionAndSpinCount 104419->104431 104432 f82d55 104420->104432 104423 f89d0b 104438 f89d33 LeaveCriticalSection _doexit 104423->104438 104426->104408 104427->104413 104429->104409 104430->104407 104431->104423 104433 f82d5e RtlFreeHeap 104432->104433 104437 f82d87 __dosmaperr 104432->104437 104434 f82d73 104433->104434 104433->104437 104439 f88b28 58 API calls __getptd_noexit 104434->104439 104436 f82d79 GetLastError 104436->104437 104437->104423 104438->104407 104439->104436 104440->104386 104441->104385 104442->104390 104446 f89d75 LeaveCriticalSection 104443->104446 104445 f82c87 104445->104376 104446->104445 104447 f61016 104452 f64974 104447->104452 104450 f82d40 __cinit 67 API calls 104451 f61025 104450->104451 104453 f80db6 Mailbox 59 API calls 104452->104453 104454 f6497c 104453->104454 104455 f6101b 104454->104455 104459 f64936 104454->104459 104455->104450 104460 f64951 104459->104460 104461 f6493f 104459->104461 104463 f649a0 104460->104463 104462 f82d40 __cinit 67 API calls 104461->104462 104462->104460 104464 f67667 59 API calls 104463->104464 104465 f649b8 GetVersionExW 104464->104465 104466 f67bcc 59 API calls 104465->104466 104467 f649fb 104466->104467 104468 f67d2c 59 API calls 104467->104468 104477 f64a28 104467->104477 104469 f64a1c 104468->104469 104491 f67726 104469->104491 104471 f64a93 GetCurrentProcess IsWow64Process 104472 f64aac 104471->104472 104474 f64ac2 104472->104474 104475 f64b2b GetSystemInfo 104472->104475 104473 f9d864 104487 f64b37 104474->104487 104476 f64af8 104475->104476 104476->104455 104477->104471 104477->104473 104480 f64ad4 104483 f64b37 2 API calls 104480->104483 104481 f64b1f GetSystemInfo 104482 f64ae9 104481->104482 104482->104476 104485 f64aef FreeLibrary 104482->104485 104484 f64adc GetNativeSystemInfo 104483->104484 104484->104482 104485->104476 104488 f64ad0 104487->104488 104489 f64b40 LoadLibraryA 104487->104489 104488->104480 104488->104481 104489->104488 104490 f64b51 GetProcAddress 104489->104490 104490->104488 104492 f67734 104491->104492 104493 f67d2c 59 API calls 104492->104493 104494 f67744 104493->104494 104494->104477 104495 f61055 104500 f62649 104495->104500 104498 f82d40 __cinit 67 API calls 104499 f61064 104498->104499 104501 f67667 59 API calls 104500->104501 104502 f626b7 104501->104502 104507 f63582 104502->104507 104505 f62754 104506 f6105a 104505->104506 104510 f63416 59 API calls 2 library calls 104505->104510 104506->104498 104511 f635b0 104507->104511 104510->104505 104512 f635a1 104511->104512 104513 f635bd 104511->104513 104512->104505 104513->104512 104514 f635c4 RegOpenKeyExW 104513->104514 104514->104512 104515 f635de RegQueryValueExW 104514->104515 104516 f63614 RegCloseKey 104515->104516 104517 f635ff 104515->104517 104516->104512 104517->104516 104518 f63633 104519 f6366a 104518->104519 104520 f636e7 104519->104520 104521 f63688 104519->104521 104558 f636e5 104519->104558 104525 f9d0cc 104520->104525 104526 f636ed 104520->104526 104522 f63695 104521->104522 104523 f6374b PostQuitMessage 104521->104523 104528 f636a0 104522->104528 104529 f9d154 104522->104529 104530 f636d8 104523->104530 104524 f636ca DefWindowProcW 104524->104530 104567 f71070 10 API calls Mailbox 104525->104567 104531 f63715 SetTimer RegisterWindowMessageW 104526->104531 104532 f636f2 104526->104532 104534 f63755 104528->104534 104535 f636a8 104528->104535 104583 fc2527 71 API calls _memset 104529->104583 104531->104530 104536 f6373e CreatePopupMenu 104531->104536 104538 f9d06f 104532->104538 104539 f636f9 KillTimer 104532->104539 104533 f9d0f3 104568 f71093 331 API calls Mailbox 104533->104568 104565 f644a0 64 API calls _memset 104534->104565 104541 f9d139 104535->104541 104542 f636b3 104535->104542 104536->104530 104545 f9d0a8 MoveWindow 104538->104545 104546 f9d074 104538->104546 104563 f6443a Shell_NotifyIconW _memset 104539->104563 104541->104524 104582 fb7c36 59 API calls Mailbox 104541->104582 104548 f636be 104542->104548 104549 f9d124 104542->104549 104543 f9d166 104543->104524 104543->104530 104545->104530 104551 f9d078 104546->104551 104552 f9d097 SetFocus 104546->104552 104548->104524 104569 f6443a Shell_NotifyIconW _memset 104548->104569 104581 fc2d36 81 API calls _memset 104549->104581 104550 f63764 104550->104530 104551->104548 104555 f9d081 104551->104555 104552->104530 104553 f6370c 104564 f63114 DeleteObject DestroyWindow Mailbox 104553->104564 104566 f71070 10 API calls Mailbox 104555->104566 104558->104524 104561 f9d118 104570 f6434a 104561->104570 104563->104553 104564->104530 104565->104550 104566->104530 104567->104533 104568->104548 104569->104561 104571 f64375 _memset 104570->104571 104584 f64182 104571->104584 104575 f64414 Shell_NotifyIconW 104577 f64422 104575->104577 104576 f64430 Shell_NotifyIconW 104576->104577 104588 f6407c 104577->104588 104578 f643fa 104578->104575 104578->104576 104580 f64429 104580->104558 104581->104550 104582->104558 104583->104543 104585 f64196 104584->104585 104586 f9d423 104584->104586 104585->104578 104610 fc2f94 62 API calls _W_store_winword 104585->104610 104586->104585 104587 f9d42c DestroyIcon 104586->104587 104587->104585 104589 f64098 104588->104589 104609 f6416f Mailbox 104588->104609 104611 f67a16 104589->104611 104592 f9d3c8 LoadStringW 104596 f9d3e2 104592->104596 104593 f640b3 104594 f67bcc 59 API calls 104593->104594 104595 f640c8 104594->104595 104595->104596 104597 f640d9 104595->104597 104598 f67b2e 59 API calls 104596->104598 104599 f64174 104597->104599 104600 f640e3 104597->104600 104603 f9d3ec 104598->104603 104625 f68047 104599->104625 104616 f67b2e 104600->104616 104605 f640ed _memset _wcscpy 104603->104605 104629 f67cab 104603->104629 104607 f64155 Shell_NotifyIconW 104605->104607 104606 f9d40e 104608 f67cab 59 API calls 104606->104608 104607->104609 104608->104605 104609->104580 104610->104578 104612 f80db6 Mailbox 59 API calls 104611->104612 104613 f67a3b 104612->104613 104614 f68029 59 API calls 104613->104614 104615 f640a6 104614->104615 104615->104592 104615->104593 104617 f9ec6b 104616->104617 104618 f67b40 104616->104618 104642 fb7bdb 59 API calls _memmove 104617->104642 104636 f67a51 104618->104636 104621 f67b4c 104621->104605 104622 f9ec75 104623 f68047 59 API calls 104622->104623 104624 f9ec7d Mailbox 104623->104624 104626 f68052 104625->104626 104627 f6805a 104625->104627 104643 f67f77 59 API calls 2 library calls 104626->104643 104627->104605 104630 f9ed4a 104629->104630 104631 f67cbf 104629->104631 104633 f68029 59 API calls 104630->104633 104644 f67c50 104631->104644 104635 f9ed55 __wsetenvp _memmove 104633->104635 104634 f67cca 104634->104606 104637 f67a5f 104636->104637 104641 f67a85 _memmove 104636->104641 104638 f80db6 Mailbox 59 API calls 104637->104638 104637->104641 104639 f67ad4 104638->104639 104640 f80db6 Mailbox 59 API calls 104639->104640 104640->104641 104641->104621 104642->104622 104643->104627 104645 f67c5f __wsetenvp 104644->104645 104646 f68029 59 API calls 104645->104646 104647 f67c70 _memmove 104645->104647 104648 f9ed07 _memmove 104646->104648 104647->104634 104649 f9fdfc 104682 f6ab30 Mailbox _memmove 104649->104682 104651 fa085c 104671 f6a057 104651->104671 104745 fb617e 59 API calls Mailbox 104651->104745 104655 f6b525 104744 fc9e4a 89 API calls 4 library calls 104655->104744 104657 f80db6 59 API calls Mailbox 104673 f69f37 Mailbox 104657->104673 104658 fa0055 104743 fc9e4a 89 API calls 4 library calls 104658->104743 104661 f6b475 104665 f68047 59 API calls 104661->104665 104663 fa0064 104664 f68047 59 API calls 104664->104673 104665->104671 104666 f6b47a 104666->104658 104678 fa09e5 104666->104678 104670 f67667 59 API calls 104670->104673 104672 fb6e8f 59 API calls 104672->104673 104673->104657 104673->104658 104673->104661 104673->104664 104673->104666 104673->104670 104673->104671 104673->104672 104675 fa09d6 104673->104675 104677 f82d40 67 API calls __cinit 104673->104677 104679 f6a55a 104673->104679 104704 f6c8c0 331 API calls 2 library calls 104673->104704 104705 f6b900 60 API calls Mailbox 104673->104705 104749 fc9e4a 89 API calls 4 library calls 104675->104749 104677->104673 104750 fc9e4a 89 API calls 4 library calls 104678->104750 104748 fc9e4a 89 API calls 4 library calls 104679->104748 104682->104651 104682->104655 104682->104671 104682->104673 104685 fa086a 104682->104685 104687 fa0878 104682->104687 104689 f6b21c 104682->104689 104691 f80db6 59 API calls Mailbox 104682->104691 104694 f6b2b6 104682->104694 104695 fb6e8f 59 API calls 104682->104695 104698 fddf23 104682->104698 104701 fddf37 104682->104701 104706 f69ea0 104682->104706 104730 f69c90 59 API calls Mailbox 104682->104730 104734 fdc193 85 API calls 2 library calls 104682->104734 104735 fdc2e0 96 API calls Mailbox 104682->104735 104736 fc7956 59 API calls Mailbox 104682->104736 104737 f67de1 104682->104737 104741 fdbc6b 331 API calls Mailbox 104682->104741 104742 fb617e 59 API calls Mailbox 104682->104742 104746 f69c90 59 API calls Mailbox 104685->104746 104747 fc9e4a 89 API calls 4 library calls 104687->104747 104731 f69d3c 60 API calls Mailbox 104689->104731 104691->104682 104692 f6b22d 104732 f69d3c 60 API calls Mailbox 104692->104732 104733 f6f6a3 331 API calls 104694->104733 104695->104682 104751 fdcadd 104698->104751 104700 fddf33 104700->104682 104702 fdcadd 130 API calls 104701->104702 104703 fddf47 104702->104703 104703->104682 104704->104673 104705->104673 104707 f69ebf 104706->104707 104727 f69eed Mailbox 104706->104727 104708 f80db6 Mailbox 59 API calls 104707->104708 104708->104727 104709 f6b475 104710 f68047 59 API calls 104709->104710 104722 f6a057 104710->104722 104711 fb6e8f 59 API calls 104711->104727 104712 f6b47a 104714 fa09e5 104712->104714 104715 fa0055 104712->104715 104713 f80db6 59 API calls Mailbox 104713->104727 104901 fc9e4a 89 API calls 4 library calls 104714->104901 104898 fc9e4a 89 API calls 4 library calls 104715->104898 104717 f6a55a 104899 fc9e4a 89 API calls 4 library calls 104717->104899 104720 f82d40 67 API calls __cinit 104720->104727 104721 fa0064 104721->104682 104722->104682 104725 f68047 59 API calls 104725->104727 104726 f67667 59 API calls 104726->104727 104727->104709 104727->104711 104727->104712 104727->104713 104727->104715 104727->104717 104727->104720 104727->104722 104727->104725 104727->104726 104728 fa09d6 104727->104728 104896 f6c8c0 331 API calls 2 library calls 104727->104896 104897 f6b900 60 API calls Mailbox 104727->104897 104900 fc9e4a 89 API calls 4 library calls 104728->104900 104730->104682 104731->104692 104732->104694 104733->104655 104734->104682 104735->104682 104736->104682 104738 f67df0 __wsetenvp _memmove 104737->104738 104739 f80db6 Mailbox 59 API calls 104738->104739 104740 f67e2e 104739->104740 104740->104682 104741->104682 104742->104682 104743->104663 104744->104651 104745->104671 104746->104651 104747->104651 104748->104671 104749->104678 104750->104671 104789 f69837 104751->104789 104755 fdcdb9 104756 fdcf2e 104755->104756 104760 fdcdc7 104755->104760 104857 fdd8c8 92 API calls Mailbox 104756->104857 104759 fdcf3d 104759->104760 104762 fdcf49 104759->104762 104820 fdc96e 104760->104820 104761 f69837 84 API calls 104780 fdcbb2 Mailbox 104761->104780 104772 fdcb61 Mailbox 104762->104772 104767 fdce00 104835 f80c08 104767->104835 104770 fdce1a 104841 fc9e4a 89 API calls 4 library calls 104770->104841 104771 fdce33 104842 f692ce 104771->104842 104772->104700 104776 fdce25 GetCurrentProcess TerminateProcess 104776->104771 104780->104755 104780->104761 104780->104772 104839 fdfbce 59 API calls 2 library calls 104780->104839 104840 fdcfdf 61 API calls 2 library calls 104780->104840 104781 fdcfa4 104781->104772 104785 fdcfb8 FreeLibrary 104781->104785 104782 fdce6b 104854 fdd649 107 API calls _free 104782->104854 104785->104772 104786 fdce7c 104786->104781 104855 f68d40 59 API calls Mailbox 104786->104855 104856 f69d3c 60 API calls Mailbox 104786->104856 104858 fdd649 107 API calls _free 104786->104858 104790 f69851 104789->104790 104791 f6984b 104789->104791 104792 f9f5d3 __i64tow 104790->104792 104793 f69899 104790->104793 104795 f69857 __itow 104790->104795 104798 f9f4da 104790->104798 104791->104772 104807 fdd7a5 104791->104807 104859 f83698 83 API calls 4 library calls 104793->104859 104797 f80db6 Mailbox 59 API calls 104795->104797 104799 f69871 104797->104799 104801 f80db6 Mailbox 59 API calls 104798->104801 104805 f9f552 Mailbox _wcscpy 104798->104805 104799->104791 104800 f67de1 59 API calls 104799->104800 104800->104791 104802 f9f51f 104801->104802 104803 f80db6 Mailbox 59 API calls 104802->104803 104804 f9f545 104803->104804 104804->104805 104806 f67de1 59 API calls 104804->104806 104860 f83698 83 API calls 4 library calls 104805->104860 104806->104805 104808 f67e4f 59 API calls 104807->104808 104809 fdd7c0 CharLowerBuffW 104808->104809 104861 fbf167 104809->104861 104813 f67667 59 API calls 104814 fdd7f9 104813->104814 104868 f6784b 104814->104868 104816 fdd810 104817 f67d2c 59 API calls 104816->104817 104818 fdd81c Mailbox 104817->104818 104819 fdd858 Mailbox 104818->104819 104881 fdcfdf 61 API calls 2 library calls 104818->104881 104819->104780 104821 fdc989 104820->104821 104825 fdc9de 104820->104825 104822 f80db6 Mailbox 59 API calls 104821->104822 104824 fdc9ab 104822->104824 104823 f80db6 Mailbox 59 API calls 104823->104824 104824->104823 104824->104825 104826 fdda50 104825->104826 104827 fddc79 Mailbox 104826->104827 104834 fdda73 _strcat _wcscpy __wsetenvp 104826->104834 104827->104767 104828 f69b98 59 API calls 104828->104834 104829 f69be6 59 API calls 104829->104834 104830 f69b3c 59 API calls 104830->104834 104831 f8571c 58 API calls _W_store_winword 104831->104834 104832 f69837 84 API calls 104832->104834 104834->104827 104834->104828 104834->104829 104834->104830 104834->104831 104834->104832 104885 fc5887 61 API calls 2 library calls 104834->104885 104836 f80c1d 104835->104836 104837 f80cb5 VirtualProtect 104836->104837 104838 f80c83 104836->104838 104837->104838 104838->104770 104838->104771 104839->104780 104840->104780 104841->104776 104843 f692d6 104842->104843 104844 f80db6 Mailbox 59 API calls 104843->104844 104845 f692e4 104844->104845 104846 f692f0 104845->104846 104886 f691fc 59 API calls Mailbox 104845->104886 104848 f69050 104846->104848 104887 f69160 104848->104887 104850 f80db6 Mailbox 59 API calls 104851 f690fb 104850->104851 104851->104786 104853 f68d40 59 API calls Mailbox 104851->104853 104852 f6905f 104852->104850 104852->104851 104853->104782 104854->104786 104855->104786 104856->104786 104857->104759 104858->104786 104859->104795 104860->104792 104862 fbf192 __wsetenvp 104861->104862 104863 fbf1d1 104862->104863 104866 fbf1c7 104862->104866 104867 fbf278 104862->104867 104863->104813 104863->104818 104866->104863 104882 f678c4 61 API calls 104866->104882 104867->104863 104883 f678c4 61 API calls 104867->104883 104869 f678b7 104868->104869 104870 f6785a 104868->104870 104872 f67d2c 59 API calls 104869->104872 104870->104869 104871 f67865 104870->104871 104873 f9eb09 104871->104873 104874 f67880 104871->104874 104878 f67888 _memmove 104872->104878 104876 f68029 59 API calls 104873->104876 104884 f67f27 59 API calls Mailbox 104874->104884 104877 f9eb13 104876->104877 104879 f80db6 Mailbox 59 API calls 104877->104879 104878->104816 104880 f9eb33 104879->104880 104881->104819 104882->104866 104883->104867 104884->104878 104885->104834 104886->104846 104888 f69169 Mailbox 104887->104888 104889 f9f19f 104888->104889 104894 f69173 104888->104894 104890 f80db6 Mailbox 59 API calls 104889->104890 104892 f9f1ab 104890->104892 104891 f6917a 104891->104852 104894->104891 104895 f69c90 59 API calls Mailbox 104894->104895 104895->104894 104896->104727 104897->104727 104898->104721 104899->104722 104900->104714 104901->104722 104902 fa416f 104906 fb5fe6 104902->104906 104904 fa417a 104905 fb5fe6 85 API calls 104904->104905 104905->104904 104907 fb6020 104906->104907 104913 fb5ff3 104906->104913 104907->104904 104908 fb6022 104918 f69328 84 API calls Mailbox 104908->104918 104910 fb6027 104911 f69837 84 API calls 104910->104911 104912 fb602e 104911->104912 104914 f67b2e 59 API calls 104912->104914 104913->104907 104913->104908 104913->104910 104915 fb601a 104913->104915 104914->104907 104917 f695a0 59 API calls _wcsstr 104915->104917 104917->104907 104918->104910 104919 f6107d 104924 f6708b 104919->104924 104921 f6108c 104922 f82d40 __cinit 67 API calls 104921->104922 104923 f61096 104922->104923 104925 f6709b __write_nolock 104924->104925 104926 f67667 59 API calls 104925->104926 104927 f67151 104926->104927 104955 f64706 104927->104955 104929 f6715a 104962 f8050b 104929->104962 104932 f67cab 59 API calls 104933 f67173 104932->104933 104968 f63f74 104933->104968 104936 f67667 59 API calls 104937 f6718b 104936->104937 104974 f67d8c 104937->104974 104939 f67194 RegOpenKeyExW 104940 f9e8b1 RegQueryValueExW 104939->104940 104944 f671b6 Mailbox 104939->104944 104941 f9e8ce 104940->104941 104942 f9e943 RegCloseKey 104940->104942 104943 f80db6 Mailbox 59 API calls 104941->104943 104942->104944 104954 f9e955 _wcscat Mailbox __wsetenvp 104942->104954 104945 f9e8e7 104943->104945 104944->104921 104978 f6522e 104945->104978 104948 f9e90f 104949 f67bcc 59 API calls 104948->104949 104951 f9e929 104949->104951 104950 f679f2 59 API calls 104950->104954 104951->104942 104952 f67de1 59 API calls 104952->104954 104953 f63f74 59 API calls 104953->104954 104954->104944 104954->104950 104954->104952 104954->104953 104981 f91940 104955->104981 104958 f67de1 59 API calls 104959 f64739 104958->104959 104983 f64750 104959->104983 104961 f64743 Mailbox 104961->104929 104963 f91940 __write_nolock 104962->104963 104964 f80518 GetFullPathNameW 104963->104964 104965 f8053a 104964->104965 104966 f67bcc 59 API calls 104965->104966 104967 f67165 104966->104967 104967->104932 104969 f63f82 104968->104969 104973 f63fa4 _memmove 104968->104973 104971 f80db6 Mailbox 59 API calls 104969->104971 104970 f80db6 Mailbox 59 API calls 104972 f63fb8 104970->104972 104971->104973 104972->104936 104973->104970 104975 f67da6 104974->104975 104976 f67d99 104974->104976 104977 f80db6 Mailbox 59 API calls 104975->104977 104976->104939 104977->104976 104979 f80db6 Mailbox 59 API calls 104978->104979 104980 f65240 RegQueryValueExW 104979->104980 104980->104948 104980->104951 104982 f64713 GetModuleFileNameW 104981->104982 104982->104958 104984 f91940 __write_nolock 104983->104984 104985 f6475d GetFullPathNameW 104984->104985 104986 f6477c 104985->104986 104987 f64799 104985->104987 104989 f67bcc 59 API calls 104986->104989 104988 f67d8c 59 API calls 104987->104988 104990 f64788 104988->104990 104989->104990 104991 f67726 59 API calls 104990->104991 104992 f64794 104991->104992 104992->104961 104993 a54678 105007 a522c8 104993->105007 104995 a54706 105010 a54568 104995->105010 105013 a55738 GetPEB 105007->105013 105009 a52953 105009->104995 105011 a54571 Sleep 105010->105011 105012 a5457f 105011->105012 105014 a55762 105013->105014 105014->105009 105015 f87c56 105016 f87c62 _flsall 105015->105016 105052 f89e08 GetStartupInfoW 105016->105052 105019 f87c67 105054 f88b7c GetProcessHeap 105019->105054 105020 f87cbf 105021 f87cca 105020->105021 105137 f87da6 58 API calls 3 library calls 105020->105137 105055 f89ae6 105021->105055 105024 f87cdb __RTC_Initialize 105076 f8d5d2 105024->105076 105025 f87cd0 105025->105024 105138 f87da6 58 API calls 3 library calls 105025->105138 105028 f87cea 105029 f87cf6 GetCommandLineW 105028->105029 105139 f87da6 58 API calls 3 library calls 105028->105139 105095 f94f23 GetEnvironmentStringsW 105029->105095 105032 f87cf5 105032->105029 105035 f87d10 105036 f87d1b 105035->105036 105140 f830b5 58 API calls 3 library calls 105035->105140 105105 f94d58 105036->105105 105039 f87d21 105040 f87d2c 105039->105040 105141 f830b5 58 API calls 3 library calls 105039->105141 105119 f830ef 105040->105119 105043 f87d34 105044 f87d3f __wwincmdln 105043->105044 105142 f830b5 58 API calls 3 library calls 105043->105142 105125 f647d0 105044->105125 105047 f87d53 105048 f87d62 105047->105048 105143 f83358 58 API calls _doexit 105047->105143 105144 f830e0 58 API calls _doexit 105048->105144 105051 f87d67 _flsall 105053 f89e1e 105052->105053 105053->105019 105054->105020 105145 f83187 EncodePointer 105055->105145 105057 f89aeb 105150 f89d3c 105057->105150 105060 f89af4 105163 f89b5c 61 API calls 2 library calls 105060->105163 105063 f89af9 105063->105025 105065 f89b11 105157 f887d5 105065->105157 105068 f89b53 105166 f89b5c 61 API calls 2 library calls 105068->105166 105071 f89b58 105071->105025 105072 f89b32 105072->105068 105073 f89b38 105072->105073 105165 f89a33 58 API calls 4 library calls 105073->105165 105075 f89b40 GetCurrentThreadId 105075->105025 105077 f8d5de _flsall 105076->105077 105078 f89c0b __lock 58 API calls 105077->105078 105079 f8d5e5 105078->105079 105080 f887d5 __calloc_crt 58 API calls 105079->105080 105081 f8d5f6 105080->105081 105082 f8d661 GetStartupInfoW 105081->105082 105085 f8d601 _flsall @_EH4_CallFilterFunc@8 105081->105085 105083 f8d7a5 105082->105083 105084 f8d676 105082->105084 105086 f8d86d 105083->105086 105089 f8d7f2 GetStdHandle 105083->105089 105090 f8d805 GetFileType 105083->105090 105181 f89e2b InitializeCriticalSectionAndSpinCount 105083->105181 105084->105083 105088 f887d5 __calloc_crt 58 API calls 105084->105088 105092 f8d6c4 105084->105092 105085->105028 105182 f8d87d LeaveCriticalSection _doexit 105086->105182 105088->105084 105089->105083 105090->105083 105091 f8d6f8 GetFileType 105091->105092 105092->105083 105092->105091 105180 f89e2b InitializeCriticalSectionAndSpinCount 105092->105180 105096 f87d06 105095->105096 105097 f94f34 105095->105097 105101 f94b1b GetModuleFileNameW 105096->105101 105183 f8881d 58 API calls 2 library calls 105097->105183 105099 f94f5a _memmove 105100 f94f70 FreeEnvironmentStringsW 105099->105100 105100->105096 105102 f94b4f _wparse_cmdline 105101->105102 105104 f94b8f _wparse_cmdline 105102->105104 105184 f8881d 58 API calls 2 library calls 105102->105184 105104->105035 105106 f94d69 105105->105106 105107 f94d71 __wsetenvp 105105->105107 105106->105039 105108 f887d5 __calloc_crt 58 API calls 105107->105108 105115 f94d9a __wsetenvp 105108->105115 105109 f94df1 105110 f82d55 _free 58 API calls 105109->105110 105110->105106 105111 f887d5 __calloc_crt 58 API calls 105111->105115 105112 f94e16 105113 f82d55 _free 58 API calls 105112->105113 105113->105106 105115->105106 105115->105109 105115->105111 105115->105112 105116 f94e2d 105115->105116 105185 f94607 58 API calls 2 library calls 105115->105185 105186 f88dc6 IsProcessorFeaturePresent 105116->105186 105121 f830fb __IsNonwritableInCurrentImage 105119->105121 105209 f8a4d1 105121->105209 105122 f83119 __initterm_e 105123 f82d40 __cinit 67 API calls 105122->105123 105124 f83138 _doexit __IsNonwritableInCurrentImage 105122->105124 105123->105124 105124->105043 105126 f647ea 105125->105126 105136 f64889 105125->105136 105127 f64824 IsThemeActive 105126->105127 105212 f8336c 105127->105212 105131 f64850 105224 f648fd SystemParametersInfoW SystemParametersInfoW 105131->105224 105133 f6485c 105225 f63b3a 105133->105225 105135 f64864 SystemParametersInfoW 105135->105136 105136->105047 105137->105021 105138->105024 105139->105032 105143->105048 105144->105051 105146 f83198 __init_pointers __initp_misc_winsig 105145->105146 105167 f8a524 EncodePointer 105146->105167 105148 f831b0 __init_pointers 105149 f89e99 34 API calls 105148->105149 105149->105057 105151 f89d48 105150->105151 105153 f89af0 105151->105153 105168 f89e2b InitializeCriticalSectionAndSpinCount 105151->105168 105153->105060 105154 f89d8a 105153->105154 105155 f89b06 105154->105155 105156 f89da1 TlsAlloc 105154->105156 105155->105060 105155->105065 105159 f887dc 105157->105159 105160 f88817 105159->105160 105162 f887fa 105159->105162 105169 f951f6 105159->105169 105160->105068 105164 f89de6 TlsSetValue 105160->105164 105162->105159 105162->105160 105177 f8a132 Sleep 105162->105177 105163->105063 105164->105072 105165->105075 105166->105071 105167->105148 105168->105151 105170 f95201 105169->105170 105174 f9521c 105169->105174 105171 f9520d 105170->105171 105170->105174 105178 f88b28 58 API calls __getptd_noexit 105171->105178 105173 f9522c RtlAllocateHeap 105173->105174 105175 f95212 105173->105175 105174->105173 105174->105175 105179 f833a1 DecodePointer 105174->105179 105175->105159 105177->105162 105178->105175 105179->105174 105180->105092 105181->105083 105182->105085 105183->105099 105184->105104 105185->105115 105187 f88dd1 105186->105187 105192 f88c59 105187->105192 105191 f88dec 105191->105039 105193 f88c73 _memset __call_reportfault 105192->105193 105194 f88c93 IsDebuggerPresent 105193->105194 105200 f8a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 105194->105200 105197 f88d7a 105199 f8a140 GetCurrentProcess TerminateProcess 105197->105199 105198 f88d57 __call_reportfault 105201 f8c5f6 105198->105201 105199->105191 105200->105198 105202 f8c5fe 105201->105202 105203 f8c600 IsProcessorFeaturePresent 105201->105203 105202->105197 105205 f9590a 105203->105205 105208 f958b9 5 API calls 2 library calls 105205->105208 105207 f959ed 105207->105197 105208->105207 105210 f8a4d4 EncodePointer 105209->105210 105210->105210 105211 f8a4ee 105210->105211 105211->105122 105213 f89c0b __lock 58 API calls 105212->105213 105214 f83377 DecodePointer EncodePointer 105213->105214 105277 f89d75 LeaveCriticalSection 105214->105277 105216 f64849 105217 f833d4 105216->105217 105218 f833f8 105217->105218 105219 f833de 105217->105219 105218->105131 105219->105218 105278 f88b28 58 API calls __getptd_noexit 105219->105278 105221 f833e8 105279 f88db6 9 API calls __snwprintf 105221->105279 105223 f833f3 105223->105131 105224->105133 105226 f63b47 __write_nolock 105225->105226 105227 f67667 59 API calls 105226->105227 105228 f63b51 GetCurrentDirectoryW 105227->105228 105280 f63766 105228->105280 105230 f63b7a IsDebuggerPresent 105231 f9d272 MessageBoxA 105230->105231 105232 f63b88 105230->105232 105235 f9d28c 105231->105235 105233 f63c61 105232->105233 105232->105235 105236 f63ba5 105232->105236 105234 f63c68 SetCurrentDirectoryW 105233->105234 105237 f63c75 Mailbox 105234->105237 105479 f67213 59 API calls Mailbox 105235->105479 105361 f67285 105236->105361 105237->105135 105240 f9d29c 105246 f9d2b2 SetCurrentDirectoryW 105240->105246 105242 f63bc3 GetFullPathNameW 105243 f67bcc 59 API calls 105242->105243 105244 f63bfe 105243->105244 105377 f7092d 105244->105377 105246->105237 105248 f63c1c 105249 f63c26 105248->105249 105480 fb874b AllocateAndInitializeSid CheckTokenMembership FreeSid 105248->105480 105393 f63a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 105249->105393 105252 f9d2cf 105252->105249 105255 f9d2e0 105252->105255 105257 f64706 61 API calls 105255->105257 105256 f63c30 105258 f63c43 105256->105258 105260 f6434a 68 API calls 105256->105260 105259 f9d2e8 105257->105259 105401 f709d0 105258->105401 105262 f67de1 59 API calls 105259->105262 105260->105258 105264 f9d2f5 105262->105264 105263 f63c4e 105263->105233 105478 f6443a Shell_NotifyIconW _memset 105263->105478 105265 f9d2ff 105264->105265 105266 f9d324 105264->105266 105269 f67cab 59 API calls 105265->105269 105268 f67cab 59 API calls 105266->105268 105270 f9d320 GetForegroundWindow ShellExecuteW 105268->105270 105271 f9d30a 105269->105271 105274 f9d354 Mailbox 105270->105274 105273 f67b2e 59 API calls 105271->105273 105275 f9d317 105273->105275 105274->105233 105276 f67cab 59 API calls 105275->105276 105276->105270 105277->105216 105278->105221 105279->105223 105281 f67667 59 API calls 105280->105281 105282 f6377c 105281->105282 105481 f63d31 105282->105481 105284 f6379a 105285 f64706 61 API calls 105284->105285 105286 f637ae 105285->105286 105287 f67de1 59 API calls 105286->105287 105288 f637bb 105287->105288 105495 f64ddd 105288->105495 105291 f9d173 105551 fc955b 105291->105551 105292 f637dc Mailbox 105295 f68047 59 API calls 105292->105295 105298 f637ef 105295->105298 105296 f9d192 105297 f82d55 _free 58 API calls 105296->105297 105300 f9d19f 105297->105300 105519 f6928a 105298->105519 105302 f64e4a 84 API calls 105300->105302 105304 f9d1a8 105302->105304 105308 f63ed0 59 API calls 105304->105308 105305 f67de1 59 API calls 105306 f63808 105305->105306 105522 f684c0 105306->105522 105310 f9d1c3 105308->105310 105309 f6381a Mailbox 105311 f67de1 59 API calls 105309->105311 105312 f63ed0 59 API calls 105310->105312 105313 f63840 105311->105313 105314 f9d1df 105312->105314 105315 f684c0 69 API calls 105313->105315 105316 f64706 61 API calls 105314->105316 105318 f6384f Mailbox 105315->105318 105317 f9d204 105316->105317 105319 f63ed0 59 API calls 105317->105319 105321 f67667 59 API calls 105318->105321 105320 f9d210 105319->105320 105322 f68047 59 API calls 105320->105322 105323 f6386d 105321->105323 105324 f9d21e 105322->105324 105526 f63ed0 105323->105526 105326 f63ed0 59 API calls 105324->105326 105328 f9d22d 105326->105328 105334 f68047 59 API calls 105328->105334 105330 f63887 105330->105304 105331 f63891 105330->105331 105332 f82efd _W_store_winword 60 API calls 105331->105332 105333 f6389c 105332->105333 105333->105310 105335 f638a6 105333->105335 105336 f9d24f 105334->105336 105337 f82efd _W_store_winword 60 API calls 105335->105337 105338 f63ed0 59 API calls 105336->105338 105339 f638b1 105337->105339 105340 f9d25c 105338->105340 105339->105314 105341 f638bb 105339->105341 105340->105340 105342 f82efd _W_store_winword 60 API calls 105341->105342 105343 f638c6 105342->105343 105343->105328 105344 f63907 105343->105344 105346 f63ed0 59 API calls 105343->105346 105344->105328 105345 f63914 105344->105345 105348 f692ce 59 API calls 105345->105348 105347 f638ea 105346->105347 105349 f68047 59 API calls 105347->105349 105350 f63924 105348->105350 105351 f638f8 105349->105351 105352 f69050 59 API calls 105350->105352 105353 f63ed0 59 API calls 105351->105353 105354 f63932 105352->105354 105353->105344 105542 f68ee0 105354->105542 105356 f6928a 59 API calls 105357 f6394f 105356->105357 105357->105356 105358 f63995 Mailbox 105357->105358 105359 f68ee0 60 API calls 105357->105359 105360 f63ed0 59 API calls 105357->105360 105358->105230 105359->105357 105360->105357 105362 f67292 __write_nolock 105361->105362 105363 f9ea22 _memset 105362->105363 105364 f672ab 105362->105364 105366 f9ea3e GetOpenFileNameW 105363->105366 105365 f64750 60 API calls 105364->105365 105367 f672b4 105365->105367 105369 f9ea8d 105366->105369 106397 f80791 105367->106397 105371 f67bcc 59 API calls 105369->105371 105373 f9eaa2 105371->105373 105373->105373 105374 f672c9 106415 f6686a 105374->106415 105378 f7093a __write_nolock 105377->105378 106643 f66d80 105378->106643 105380 f7093f 105381 f63c14 105380->105381 106654 f7119e 89 API calls 105380->106654 105381->105240 105381->105248 105383 f7094c 105383->105381 106655 f73ee7 91 API calls Mailbox 105383->106655 105385 f70955 105385->105381 105386 f70959 GetFullPathNameW 105385->105386 105387 f67bcc 59 API calls 105386->105387 105388 f70985 105387->105388 105389 f67bcc 59 API calls 105388->105389 105390 f70992 105389->105390 105391 f67bcc 59 API calls 105390->105391 105392 fa4cab _wcscat 105390->105392 105391->105381 105394 f63ab0 LoadImageW RegisterClassExW 105393->105394 105395 f9d261 105393->105395 106692 f63041 7 API calls 105394->106692 106693 f647a0 LoadImageW EnumResourceNamesW 105395->106693 105398 f9d26a 105399 f63b34 105400 f639d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 105399->105400 105400->105256 105402 fa4cc3 105401->105402 105411 f709f5 105401->105411 106829 fc9e4a 89 API calls 4 library calls 105402->106829 105404 f70ce4 105405 f70cfa 105404->105405 106826 f71070 10 API calls Mailbox 105404->106826 105405->105263 105408 f70ee4 105408->105405 105409 f70ef1 105408->105409 106827 f71093 331 API calls Mailbox 105409->106827 105410 f70a4b PeekMessageW 105476 f70a05 Mailbox 105410->105476 105411->105476 106830 f69e5d 60 API calls 105411->106830 106831 fb6349 331 API calls 105411->106831 105415 fa4e81 Sleep 105415->105476 105420 fa4d50 TranslateAcceleratorW 105422 f70e43 PeekMessageW 105420->105422 105420->105476 105421 f70ea5 TranslateMessage DispatchMessageW 105421->105422 105422->105476 105423 f80db6 59 API calls Mailbox 105423->105476 105424 f70d13 timeGetTime 105424->105476 105425 fa581f WaitForSingleObject 105427 fa583c GetExitCodeProcess CloseHandle 105425->105427 105425->105476 105462 f70f95 105427->105462 105428 f70e5f Sleep 105460 f70e70 Mailbox 105428->105460 105429 f68047 59 API calls 105429->105476 105430 f67667 59 API calls 105430->105460 105431 fa5af8 Sleep 105431->105460 105434 f8049f timeGetTime 105434->105460 105435 f70f4e timeGetTime 106828 f69e5d 60 API calls 105435->106828 105438 fa5b8f GetExitCodeProcess 105443 fa5bbb CloseHandle 105438->105443 105444 fa5ba5 WaitForSingleObject 105438->105444 105439 f69837 84 API calls 105439->105476 105441 fe5f25 110 API calls 105441->105460 105442 f6b7dd 109 API calls 105442->105460 105443->105460 105444->105443 105444->105476 105446 fa5874 105446->105462 105447 f69e5d 60 API calls 105447->105476 105448 fa5c17 Sleep 105448->105476 105449 fa5078 Sleep 105449->105476 105450 f67de1 59 API calls 105450->105460 105456 f69ea0 304 API calls 105456->105476 105460->105430 105460->105434 105460->105438 105460->105441 105460->105442 105460->105446 105460->105448 105460->105449 105460->105450 105460->105462 105460->105476 106838 fc2408 60 API calls 105460->106838 106839 f69e5d 60 API calls 105460->106839 106840 f689b3 69 API calls Mailbox 105460->106840 106841 f6b73c 331 API calls 105460->106841 106842 fb64da 60 API calls 105460->106842 106843 fc5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 105460->106843 106844 fc3c55 66 API calls Mailbox 105460->106844 105461 f67de1 59 API calls 105461->105476 105462->105263 105465 fc9e4a 89 API calls 105465->105476 105466 f69c90 59 API calls Mailbox 105466->105476 105467 fb617e 59 API calls Mailbox 105467->105476 105469 f684c0 69 API calls 105469->105476 105470 f689b3 69 API calls 105470->105476 105471 fa55d5 VariantClear 105471->105476 105472 fa566b VariantClear 105472->105476 105473 fa5419 VariantClear 105473->105476 105474 f68cd4 59 API calls Mailbox 105474->105476 105475 fb6e8f 59 API calls 105475->105476 105476->105404 105476->105410 105476->105415 105476->105420 105476->105421 105476->105422 105476->105423 105476->105424 105476->105425 105476->105428 105476->105429 105476->105431 105476->105435 105476->105439 105476->105447 105476->105456 105476->105460 105476->105461 105476->105462 105476->105465 105476->105466 105476->105467 105476->105469 105476->105470 105476->105471 105476->105472 105476->105473 105476->105474 105476->105475 105477 f6b73c 304 API calls 105476->105477 106694 f6e6a0 105476->106694 106725 f6f460 105476->106725 106744 f6fce0 105476->106744 106824 f6e420 331 API calls 105476->106824 106825 f631ce IsDialogMessageW GetClassLongW 105476->106825 106832 fe6018 59 API calls 105476->106832 106833 fc9a15 59 API calls Mailbox 105476->106833 106834 fbd4f2 59 API calls 105476->106834 106835 fb60ef 59 API calls 2 library calls 105476->106835 106836 f68401 59 API calls 105476->106836 106837 f682df 59 API calls Mailbox 105476->106837 105477->105476 105478->105233 105479->105240 105480->105252 105482 f63d3e __write_nolock 105481->105482 105483 f67bcc 59 API calls 105482->105483 105487 f63ea4 Mailbox 105482->105487 105485 f63d70 105483->105485 105493 f63da6 Mailbox 105485->105493 105592 f679f2 105485->105592 105486 f63e77 105486->105487 105488 f67de1 59 API calls 105486->105488 105487->105284 105490 f63e98 105488->105490 105489 f67de1 59 API calls 105489->105493 105492 f63f74 59 API calls 105490->105492 105491 f679f2 59 API calls 105491->105493 105492->105487 105493->105486 105493->105487 105493->105489 105493->105491 105494 f63f74 59 API calls 105493->105494 105494->105493 105595 f64bb5 105495->105595 105500 f64e08 LoadLibraryExW 105605 f64b6a 105500->105605 105501 f9d8e6 105503 f64e4a 84 API calls 105501->105503 105505 f9d8ed 105503->105505 105507 f64b6a 3 API calls 105505->105507 105508 f9d8f5 105507->105508 105631 f64f0b 105508->105631 105509 f64e2f 105509->105508 105510 f64e3b 105509->105510 105512 f64e4a 84 API calls 105510->105512 105514 f637d4 105512->105514 105514->105291 105514->105292 105516 f9d91c 105639 f64ec7 105516->105639 105520 f80db6 Mailbox 59 API calls 105519->105520 105521 f637fb 105520->105521 105521->105305 105523 f684cb 105522->105523 105525 f684f2 105523->105525 106066 f689b3 69 API calls Mailbox 105523->106066 105525->105309 105527 f63ef3 105526->105527 105528 f63eda 105526->105528 105529 f67bcc 59 API calls 105527->105529 105530 f68047 59 API calls 105528->105530 105531 f63879 105529->105531 105530->105531 105532 f82efd 105531->105532 105533 f82f09 105532->105533 105534 f82f7e 105532->105534 105538 f82f2e 105533->105538 106067 f88b28 58 API calls __getptd_noexit 105533->106067 106069 f82f90 60 API calls 4 library calls 105534->106069 105537 f82f8b 105537->105330 105538->105330 105539 f82f15 106068 f88db6 9 API calls __snwprintf 105539->106068 105541 f82f20 105541->105330 105543 f9f17c 105542->105543 105545 f68ef7 105542->105545 105543->105545 106071 f68bdb 59 API calls Mailbox 105543->106071 105546 f69040 105545->105546 105547 f68ff8 105545->105547 105550 f68fff 105545->105550 106070 f69d3c 60 API calls Mailbox 105546->106070 105549 f80db6 Mailbox 59 API calls 105547->105549 105549->105550 105550->105357 105552 f64ee5 85 API calls 105551->105552 105553 fc95ca 105552->105553 106072 fc9734 105553->106072 105556 f64f0b 74 API calls 105557 fc95f7 105556->105557 105558 f64f0b 74 API calls 105557->105558 105559 fc9607 105558->105559 105560 f64f0b 74 API calls 105559->105560 105561 fc9622 105560->105561 105562 f64f0b 74 API calls 105561->105562 105563 fc963d 105562->105563 105564 f64ee5 85 API calls 105563->105564 105565 fc9654 105564->105565 105566 f8571c _W_store_winword 58 API calls 105565->105566 105567 fc965b 105566->105567 105568 f8571c _W_store_winword 58 API calls 105567->105568 105569 fc9665 105568->105569 105570 f64f0b 74 API calls 105569->105570 105571 fc9679 105570->105571 105572 fc9109 GetSystemTimeAsFileTime 105571->105572 105573 fc968c 105572->105573 105574 fc96b6 105573->105574 105575 fc96a1 105573->105575 105576 fc96bc 105574->105576 105577 fc971b 105574->105577 105578 f82d55 _free 58 API calls 105575->105578 106078 fc8b06 105576->106078 105580 f82d55 _free 58 API calls 105577->105580 105581 fc96a7 105578->105581 105584 f9d186 105580->105584 105582 f82d55 _free 58 API calls 105581->105582 105582->105584 105584->105296 105586 f64e4a 105584->105586 105585 f82d55 _free 58 API calls 105585->105584 105587 f64e54 105586->105587 105589 f64e5b 105586->105589 105588 f853a6 __fcloseall 83 API calls 105587->105588 105588->105589 105590 f64e6a 105589->105590 105591 f64e7b FreeLibrary 105589->105591 105590->105296 105591->105590 105593 f67e4f 59 API calls 105592->105593 105594 f679fd 105593->105594 105594->105485 105644 f64c03 105595->105644 105598 f64bf5 105602 f8525b 105598->105602 105599 f64bec FreeLibrary 105599->105598 105600 f64c03 2 API calls 105601 f64bdc 105600->105601 105601->105598 105601->105599 105648 f85270 105602->105648 105604 f64dfc 105604->105500 105604->105501 105806 f64c36 105605->105806 105608 f64b8f 105610 f64ba1 FreeLibrary 105608->105610 105611 f64baa 105608->105611 105609 f64c36 2 API calls 105609->105608 105610->105611 105612 f64c70 105611->105612 105613 f80db6 Mailbox 59 API calls 105612->105613 105614 f64c85 105613->105614 105615 f6522e 59 API calls 105614->105615 105616 f64c91 _memmove 105615->105616 105618 f64dc1 105616->105618 105619 f64d89 105616->105619 105622 f64ccc 105616->105622 105617 f64ec7 69 API calls 105627 f64cd5 105617->105627 105821 fc991b 95 API calls 105618->105821 105810 f64e89 CreateStreamOnHGlobal 105619->105810 105622->105617 105623 f64f0b 74 API calls 105623->105627 105625 f64d69 105625->105509 105626 f9d8a7 105628 f64ee5 85 API calls 105626->105628 105627->105623 105627->105625 105627->105626 105816 f64ee5 105627->105816 105629 f9d8bb 105628->105629 105630 f64f0b 74 API calls 105629->105630 105630->105625 105632 f9d9cd 105631->105632 105633 f64f1d 105631->105633 105845 f855e2 105633->105845 105636 fc9109 106043 fc8f5f 105636->106043 105638 fc911f 105638->105516 105640 f64ed6 105639->105640 105641 f9d990 105639->105641 106048 f85c60 105640->106048 105643 f64ede 105645 f64bd0 105644->105645 105646 f64c0c LoadLibraryA 105644->105646 105645->105600 105645->105601 105646->105645 105647 f64c1d GetProcAddress 105646->105647 105647->105645 105649 f8527c _flsall 105648->105649 105650 f8528f 105649->105650 105652 f852c0 105649->105652 105697 f88b28 58 API calls __getptd_noexit 105650->105697 105667 f904e8 105652->105667 105653 f85294 105698 f88db6 9 API calls __snwprintf 105653->105698 105656 f852c5 105657 f852db 105656->105657 105658 f852ce 105656->105658 105660 f85305 105657->105660 105661 f852e5 105657->105661 105699 f88b28 58 API calls __getptd_noexit 105658->105699 105682 f90607 105660->105682 105700 f88b28 58 API calls __getptd_noexit 105661->105700 105662 f8529f _flsall @_EH4_CallFilterFunc@8 105662->105604 105668 f904f4 _flsall 105667->105668 105669 f89c0b __lock 58 API calls 105668->105669 105670 f90502 105669->105670 105671 f9057d 105670->105671 105672 f90576 105670->105672 105678 f89c93 __mtinitlocknum 58 API calls 105670->105678 105705 f86c50 59 API calls __lock 105670->105705 105706 f86cba LeaveCriticalSection LeaveCriticalSection _doexit 105670->105706 105707 f8881d 58 API calls 2 library calls 105671->105707 105702 f905fe 105672->105702 105675 f905f3 _flsall 105675->105656 105676 f90584 105676->105672 105708 f89e2b InitializeCriticalSectionAndSpinCount 105676->105708 105678->105670 105680 f905aa EnterCriticalSection 105680->105672 105683 f90627 __wopenfile 105682->105683 105684 f90641 105683->105684 105696 f907fc 105683->105696 105715 f837cb 60 API calls 3 library calls 105683->105715 105713 f88b28 58 API calls __getptd_noexit 105684->105713 105686 f90646 105714 f88db6 9 API calls __snwprintf 105686->105714 105688 f9085f 105710 f985a1 105688->105710 105689 f85310 105701 f85332 LeaveCriticalSection LeaveCriticalSection _fprintf 105689->105701 105692 f907f5 105692->105696 105716 f837cb 60 API calls 3 library calls 105692->105716 105694 f90814 105694->105696 105717 f837cb 60 API calls 3 library calls 105694->105717 105696->105684 105696->105688 105697->105653 105698->105662 105699->105662 105700->105662 105701->105662 105709 f89d75 LeaveCriticalSection 105702->105709 105704 f90605 105704->105675 105705->105670 105706->105670 105707->105676 105708->105680 105709->105704 105718 f97d85 105710->105718 105712 f985ba 105712->105689 105713->105686 105714->105689 105715->105692 105716->105694 105717->105696 105721 f97d91 _flsall 105718->105721 105719 f97da7 105803 f88b28 58 API calls __getptd_noexit 105719->105803 105721->105719 105722 f97ddd 105721->105722 105729 f97e4e 105722->105729 105723 f97dac 105804 f88db6 9 API calls __snwprintf 105723->105804 105726 f97df9 105805 f97e22 LeaveCriticalSection __unlock_fhandle 105726->105805 105728 f97db6 _flsall 105728->105712 105730 f97e6e 105729->105730 105731 f844ea __wsopen_nolock 58 API calls 105730->105731 105734 f97e8a 105731->105734 105732 f88dc6 __invoke_watson 8 API calls 105733 f985a0 105732->105733 105736 f97d85 __wsopen_helper 103 API calls 105733->105736 105735 f97ec4 105734->105735 105746 f97ee7 105734->105746 105752 f97fc1 105734->105752 105737 f88af4 __set_osfhnd 58 API calls 105735->105737 105738 f985ba 105736->105738 105739 f97ec9 105737->105739 105738->105726 105740 f88b28 __set_osfhnd 58 API calls 105739->105740 105741 f97ed6 105740->105741 105743 f88db6 __snwprintf 9 API calls 105741->105743 105742 f97fa5 105744 f88af4 __set_osfhnd 58 API calls 105742->105744 105745 f97ee0 105743->105745 105747 f97faa 105744->105747 105745->105726 105746->105742 105750 f97f83 105746->105750 105748 f88b28 __set_osfhnd 58 API calls 105747->105748 105749 f97fb7 105748->105749 105751 f88db6 __snwprintf 9 API calls 105749->105751 105753 f8d294 __alloc_osfhnd 61 API calls 105750->105753 105751->105752 105752->105732 105754 f98051 105753->105754 105755 f9805b 105754->105755 105756 f9807e 105754->105756 105757 f88af4 __set_osfhnd 58 API calls 105755->105757 105758 f97cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105756->105758 105759 f98060 105757->105759 105766 f980a0 105758->105766 105760 f88b28 __set_osfhnd 58 API calls 105759->105760 105762 f9806a 105760->105762 105761 f9811e GetFileType 105763 f98129 GetLastError 105761->105763 105764 f9816b 105761->105764 105768 f88b28 __set_osfhnd 58 API calls 105762->105768 105769 f88b07 __dosmaperr 58 API calls 105763->105769 105774 f8d52a __set_osfhnd 59 API calls 105764->105774 105765 f980ec GetLastError 105767 f88b07 __dosmaperr 58 API calls 105765->105767 105766->105761 105766->105765 105770 f97cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105766->105770 105771 f98111 105767->105771 105768->105745 105772 f98150 CloseHandle 105769->105772 105773 f980e1 105770->105773 105776 f88b28 __set_osfhnd 58 API calls 105771->105776 105772->105771 105775 f9815e 105772->105775 105773->105761 105773->105765 105780 f98189 105774->105780 105777 f88b28 __set_osfhnd 58 API calls 105775->105777 105776->105752 105778 f98163 105777->105778 105778->105771 105779 f98344 105779->105752 105782 f98517 CloseHandle 105779->105782 105780->105779 105781 f918c1 __lseeki64_nolock 60 API calls 105780->105781 105789 f9820a 105780->105789 105783 f981f3 105781->105783 105784 f97cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105782->105784 105786 f88af4 __set_osfhnd 58 API calls 105783->105786 105783->105789 105785 f9853e 105784->105785 105787 f98572 105785->105787 105788 f98546 GetLastError 105785->105788 105786->105789 105787->105752 105790 f88b07 __dosmaperr 58 API calls 105788->105790 105789->105779 105791 f90e5b 70 API calls __read_nolock 105789->105791 105792 f90add __close_nolock 61 API calls 105789->105792 105793 f9823c 105789->105793 105797 f8d886 __write 78 API calls 105789->105797 105798 f983c1 105789->105798 105801 f918c1 60 API calls __lseeki64_nolock 105789->105801 105794 f98552 105790->105794 105791->105789 105792->105789 105793->105789 105795 f997a2 __chsize_nolock 82 API calls 105793->105795 105796 f8d43d __free_osfhnd 59 API calls 105794->105796 105795->105793 105796->105787 105797->105789 105799 f90add __close_nolock 61 API calls 105798->105799 105800 f983c8 105799->105800 105802 f88b28 __set_osfhnd 58 API calls 105800->105802 105801->105789 105802->105752 105803->105723 105804->105728 105805->105728 105807 f64b83 105806->105807 105808 f64c3f LoadLibraryA 105806->105808 105807->105608 105807->105609 105808->105807 105809 f64c50 GetProcAddress 105808->105809 105809->105807 105811 f64ea3 FindResourceExW 105810->105811 105815 f64ec0 105810->105815 105812 f9d933 LoadResource 105811->105812 105811->105815 105813 f9d948 SizeofResource 105812->105813 105812->105815 105814 f9d95c LockResource 105813->105814 105813->105815 105814->105815 105815->105622 105817 f9d9ab 105816->105817 105818 f64ef4 105816->105818 105822 f8584d 105818->105822 105820 f64f02 105820->105627 105821->105622 105823 f85859 _flsall 105822->105823 105824 f8586b 105823->105824 105825 f85891 105823->105825 105835 f88b28 58 API calls __getptd_noexit 105824->105835 105837 f86c11 105825->105837 105828 f85870 105836 f88db6 9 API calls __snwprintf 105828->105836 105832 f858a6 105844 f858c8 LeaveCriticalSection LeaveCriticalSection _fprintf 105832->105844 105834 f8587b _flsall 105834->105820 105835->105828 105836->105834 105838 f86c21 105837->105838 105839 f86c43 EnterCriticalSection 105837->105839 105838->105839 105840 f86c29 105838->105840 105841 f85897 105839->105841 105842 f89c0b __lock 58 API calls 105840->105842 105843 f857be 83 API calls 5 library calls 105841->105843 105842->105841 105843->105832 105844->105834 105848 f855fd 105845->105848 105847 f64f2e 105847->105636 105849 f85609 _flsall 105848->105849 105850 f8564c 105849->105850 105851 f85644 _flsall 105849->105851 105856 f8561f _memset 105849->105856 105852 f86c11 __lock_file 59 API calls 105850->105852 105851->105847 105853 f85652 105852->105853 105861 f8541d 105853->105861 105875 f88b28 58 API calls __getptd_noexit 105856->105875 105857 f85639 105876 f88db6 9 API calls __snwprintf 105857->105876 105862 f85453 105861->105862 105865 f85438 _memset 105861->105865 105877 f85686 LeaveCriticalSection LeaveCriticalSection _fprintf 105862->105877 105863 f85443 105973 f88b28 58 API calls __getptd_noexit 105863->105973 105865->105862 105865->105863 105868 f85493 105865->105868 105868->105862 105872 f855a4 _memset 105868->105872 105878 f846e6 105868->105878 105885 f90e5b 105868->105885 105953 f90ba7 105868->105953 105975 f90cc8 58 API calls 4 library calls 105868->105975 105976 f88b28 58 API calls __getptd_noexit 105872->105976 105873 f85448 105974 f88db6 9 API calls __snwprintf 105873->105974 105875->105857 105876->105851 105877->105851 105879 f846f0 105878->105879 105880 f84705 105878->105880 105977 f88b28 58 API calls __getptd_noexit 105879->105977 105880->105868 105882 f846f5 105978 f88db6 9 API calls __snwprintf 105882->105978 105884 f84700 105884->105868 105886 f90e7c 105885->105886 105887 f90e93 105885->105887 105988 f88af4 58 API calls __getptd_noexit 105886->105988 105888 f915cb 105887->105888 105892 f90ecd 105887->105892 106004 f88af4 58 API calls __getptd_noexit 105888->106004 105891 f90e81 105989 f88b28 58 API calls __getptd_noexit 105891->105989 105895 f90ed5 105892->105895 105901 f90eec 105892->105901 105893 f915d0 106005 f88b28 58 API calls __getptd_noexit 105893->106005 105990 f88af4 58 API calls __getptd_noexit 105895->105990 105898 f90ee1 106006 f88db6 9 API calls __snwprintf 105898->106006 105899 f90eda 105991 f88b28 58 API calls __getptd_noexit 105899->105991 105902 f90f01 105901->105902 105903 f90f1b 105901->105903 105906 f90f39 105901->105906 105933 f90e88 105901->105933 105992 f88af4 58 API calls __getptd_noexit 105902->105992 105903->105902 105908 f90f26 105903->105908 105993 f8881d 58 API calls 2 library calls 105906->105993 105979 f95c6b 105908->105979 105909 f90f49 105911 f90f6c 105909->105911 105912 f90f51 105909->105912 105996 f918c1 60 API calls 3 library calls 105911->105996 105994 f88b28 58 API calls __getptd_noexit 105912->105994 105913 f9103a 105914 f910b3 ReadFile 105913->105914 105917 f91050 GetConsoleMode 105913->105917 105918 f91593 GetLastError 105914->105918 105919 f910d5 105914->105919 105921 f910b0 105917->105921 105922 f91064 105917->105922 105923 f915a0 105918->105923 105924 f91093 105918->105924 105919->105918 105928 f910a5 105919->105928 105920 f90f56 105995 f88af4 58 API calls __getptd_noexit 105920->105995 105921->105914 105922->105921 105926 f9106a ReadConsoleW 105922->105926 106002 f88b28 58 API calls __getptd_noexit 105923->106002 105936 f91099 105924->105936 105997 f88b07 58 API calls 2 library calls 105924->105997 105926->105928 105930 f9108d GetLastError 105926->105930 105935 f9110a 105928->105935 105928->105936 105940 f91377 105928->105940 105929 f915a5 106003 f88af4 58 API calls __getptd_noexit 105929->106003 105930->105924 105933->105868 105934 f82d55 _free 58 API calls 105934->105933 105937 f911f7 105935->105937 105939 f91176 ReadFile 105935->105939 105936->105933 105936->105934 105937->105936 105943 f912a4 105937->105943 105946 f912b4 105937->105946 105949 f91264 MultiByteToWideChar 105937->105949 105942 f91197 GetLastError 105939->105942 105951 f911a1 105939->105951 105940->105936 105941 f9147d ReadFile 105940->105941 105945 f914a0 GetLastError 105941->105945 105952 f914ae 105941->105952 105942->105951 105999 f88b28 58 API calls __getptd_noexit 105943->105999 105945->105952 105946->105949 106000 f918c1 60 API calls 3 library calls 105946->106000 105949->105930 105949->105936 105951->105935 105998 f918c1 60 API calls 3 library calls 105951->105998 105952->105940 106001 f918c1 60 API calls 3 library calls 105952->106001 105954 f90bb2 105953->105954 105959 f90bc7 105953->105959 106040 f88b28 58 API calls __getptd_noexit 105954->106040 105956 f90bb7 106041 f88db6 9 API calls __snwprintf 105956->106041 105958 f90bfc 105961 f846e6 __fputwc_nolock 58 API calls 105958->105961 105959->105958 105967 f90bc2 105959->105967 106042 f95fe4 58 API calls __malloc_crt 105959->106042 105962 f90c10 105961->105962 106007 f90d47 105962->106007 105964 f90c17 105965 f846e6 __fputwc_nolock 58 API calls 105964->105965 105964->105967 105966 f90c3a 105965->105966 105966->105967 105968 f846e6 __fputwc_nolock 58 API calls 105966->105968 105967->105868 105969 f90c46 105968->105969 105969->105967 105970 f846e6 __fputwc_nolock 58 API calls 105969->105970 105971 f90c53 105970->105971 105972 f846e6 __fputwc_nolock 58 API calls 105971->105972 105972->105967 105973->105873 105974->105862 105975->105868 105976->105873 105977->105882 105978->105884 105980 f95c83 105979->105980 105981 f95c76 105979->105981 105984 f95c8f 105980->105984 105985 f88b28 __set_osfhnd 58 API calls 105980->105985 105982 f88b28 __set_osfhnd 58 API calls 105981->105982 105983 f95c7b 105982->105983 105983->105913 105984->105913 105986 f95cb0 105985->105986 105987 f88db6 __snwprintf 9 API calls 105986->105987 105987->105983 105988->105891 105989->105933 105990->105899 105991->105898 105992->105899 105993->105909 105994->105920 105995->105933 105996->105908 105997->105936 105998->105951 105999->105936 106000->105949 106001->105952 106002->105929 106003->105936 106004->105893 106005->105898 106006->105933 106008 f90d53 _flsall 106007->106008 106009 f90d60 106008->106009 106010 f90d77 106008->106010 106011 f88af4 __set_osfhnd 58 API calls 106009->106011 106012 f90e3b 106010->106012 106015 f90d8b 106010->106015 106014 f90d65 106011->106014 106013 f88af4 __set_osfhnd 58 API calls 106012->106013 106016 f90dae 106013->106016 106017 f88b28 __set_osfhnd 58 API calls 106014->106017 106018 f90da9 106015->106018 106019 f90db6 106015->106019 106024 f88b28 __set_osfhnd 58 API calls 106016->106024 106031 f90d6c _flsall 106017->106031 106020 f88af4 __set_osfhnd 58 API calls 106018->106020 106021 f90dd8 106019->106021 106022 f90dc3 106019->106022 106020->106016 106023 f8d206 ___lock_fhandle 59 API calls 106021->106023 106025 f88af4 __set_osfhnd 58 API calls 106022->106025 106026 f90dde 106023->106026 106027 f90dd0 106024->106027 106028 f90dc8 106025->106028 106029 f90df1 106026->106029 106030 f90e04 106026->106030 106034 f88db6 __snwprintf 9 API calls 106027->106034 106032 f88b28 __set_osfhnd 58 API calls 106028->106032 106033 f90e5b __read_nolock 70 API calls 106029->106033 106035 f88b28 __set_osfhnd 58 API calls 106030->106035 106031->105964 106032->106027 106036 f90dfd 106033->106036 106034->106031 106037 f90e09 106035->106037 106039 f90e33 __read LeaveCriticalSection 106036->106039 106038 f88af4 __set_osfhnd 58 API calls 106037->106038 106038->106036 106039->106031 106040->105956 106041->105967 106042->105958 106046 f8520a GetSystemTimeAsFileTime 106043->106046 106045 fc8f6e 106045->105638 106047 f85238 __aulldiv 106046->106047 106047->106045 106049 f85c6c _flsall 106048->106049 106050 f85c7e 106049->106050 106051 f85c93 106049->106051 106062 f88b28 58 API calls __getptd_noexit 106050->106062 106053 f86c11 __lock_file 59 API calls 106051->106053 106055 f85c99 106053->106055 106054 f85c83 106063 f88db6 9 API calls __snwprintf 106054->106063 106064 f858d0 67 API calls 7 library calls 106055->106064 106058 f85ca4 106065 f85cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 106058->106065 106060 f85c8e _flsall 106060->105643 106061 f85cb6 106061->106060 106062->106054 106063->106060 106064->106058 106065->106061 106066->105525 106067->105539 106068->105541 106069->105537 106070->105550 106071->105545 106075 fc9748 __tzset_nolock _wcscmp 106072->106075 106073 fc9109 GetSystemTimeAsFileTime 106073->106075 106074 fc95dc 106074->105556 106074->105584 106075->106073 106075->106074 106076 f64f0b 74 API calls 106075->106076 106077 f64ee5 85 API calls 106075->106077 106076->106075 106077->106075 106079 fc8b1f 106078->106079 106080 fc8b11 106078->106080 106082 f8525b 115 API calls 106079->106082 106083 fc8b64 106079->106083 106108 fc8b28 106079->106108 106081 f8525b 115 API calls 106080->106081 106081->106079 106084 fc8b49 106082->106084 106109 fc8d91 106083->106109 106084->106083 106086 fc8b52 106084->106086 106090 f853a6 __fcloseall 83 API calls 106086->106090 106086->106108 106087 fc8ba8 106088 fc8bac 106087->106088 106089 fc8bcd 106087->106089 106092 fc8bb9 106088->106092 106094 f853a6 __fcloseall 83 API calls 106088->106094 106113 fc89a9 106089->106113 106090->106108 106095 f853a6 __fcloseall 83 API calls 106092->106095 106092->106108 106094->106092 106095->106108 106096 fc8bfb 106122 fc8c2b 106096->106122 106097 fc8bdb 106099 fc8be8 106097->106099 106101 f853a6 __fcloseall 83 API calls 106097->106101 106103 f853a6 __fcloseall 83 API calls 106099->106103 106099->106108 106101->106099 106103->106108 106105 fc8c16 106107 f853a6 __fcloseall 83 API calls 106105->106107 106105->106108 106107->106108 106108->105585 106110 fc8db6 106109->106110 106112 fc8d9f __tzset_nolock _memmove 106109->106112 106111 f855e2 __fread_nolock 74 API calls 106110->106111 106111->106112 106112->106087 106114 f8571c _W_store_winword 58 API calls 106113->106114 106115 fc89b8 106114->106115 106116 f8571c _W_store_winword 58 API calls 106115->106116 106117 fc89cc 106116->106117 106118 f8571c _W_store_winword 58 API calls 106117->106118 106119 fc89e0 106118->106119 106120 fc8d0d 58 API calls 106119->106120 106121 fc89f3 106119->106121 106120->106121 106121->106096 106121->106097 106126 fc8c40 106122->106126 106123 fc8cf8 106155 fc8f35 106123->106155 106125 fc8a05 74 API calls 106125->106126 106126->106123 106126->106125 106129 fc8c02 106126->106129 106151 fc8e12 106126->106151 106159 fc8aa1 74 API calls 106126->106159 106130 fc8d0d 106129->106130 106131 fc8d1a 106130->106131 106132 fc8d20 106130->106132 106133 f82d55 _free 58 API calls 106131->106133 106134 f82d55 _free 58 API calls 106132->106134 106137 fc8d31 106132->106137 106133->106132 106134->106137 106135 fc8c09 106135->106105 106138 f853a6 106135->106138 106136 f82d55 _free 58 API calls 106136->106135 106137->106135 106137->106136 106139 f853b2 _flsall 106138->106139 106140 f853de 106139->106140 106141 f853c6 106139->106141 106144 f86c11 __lock_file 59 API calls 106140->106144 106147 f853d6 _flsall 106140->106147 106208 f88b28 58 API calls __getptd_noexit 106141->106208 106143 f853cb 106209 f88db6 9 API calls __snwprintf 106143->106209 106146 f853f0 106144->106146 106192 f8533a 106146->106192 106147->106105 106153 fc8e21 106151->106153 106154 fc8e61 106151->106154 106153->106126 106154->106153 106160 fc8ee8 106154->106160 106156 fc8f53 106155->106156 106157 fc8f42 106155->106157 106156->106129 106158 f84863 80 API calls 106157->106158 106158->106156 106159->106126 106161 fc8f25 106160->106161 106162 fc8f14 106160->106162 106161->106154 106164 f84863 106162->106164 106165 f8486f _flsall 106164->106165 106166 f8488d 106165->106166 106167 f848a5 106165->106167 106168 f8489d _flsall 106165->106168 106189 f88b28 58 API calls __getptd_noexit 106166->106189 106169 f86c11 __lock_file 59 API calls 106167->106169 106168->106161 106172 f848ab 106169->106172 106171 f84892 106190 f88db6 9 API calls __snwprintf 106171->106190 106177 f8470a 106172->106177 106178 f84737 106177->106178 106181 f84719 106177->106181 106191 f848dd LeaveCriticalSection LeaveCriticalSection _fprintf 106178->106191 106179 f84727 106180 f88b28 __set_osfhnd 58 API calls 106179->106180 106182 f8472c 106180->106182 106181->106178 106181->106179 106188 f84751 _memmove 106181->106188 106183 f88db6 __snwprintf 9 API calls 106182->106183 106183->106178 106184 f8ae1e __flsbuf 78 API calls 106184->106188 106185 f84a3d __flush 78 API calls 106185->106188 106186 f846e6 __fputwc_nolock 58 API calls 106186->106188 106187 f8d886 __write 78 API calls 106187->106188 106188->106178 106188->106184 106188->106185 106188->106186 106188->106187 106189->106171 106190->106168 106191->106168 106193 f85349 106192->106193 106194 f8535d 106192->106194 106247 f88b28 58 API calls __getptd_noexit 106193->106247 106200 f85359 106194->106200 106211 f84a3d 106194->106211 106197 f8534e 106248 f88db6 9 API calls __snwprintf 106197->106248 106210 f85415 LeaveCriticalSection LeaveCriticalSection _fprintf 106200->106210 106203 f846e6 __fputwc_nolock 58 API calls 106204 f85377 106203->106204 106221 f90a02 106204->106221 106206 f8537d 106206->106200 106207 f82d55 _free 58 API calls 106206->106207 106207->106200 106208->106143 106209->106147 106210->106147 106212 f84a50 106211->106212 106213 f84a74 106211->106213 106212->106213 106214 f846e6 __fputwc_nolock 58 API calls 106212->106214 106217 f90b77 106213->106217 106215 f84a6d 106214->106215 106249 f8d886 106215->106249 106218 f85371 106217->106218 106219 f90b84 106217->106219 106218->106203 106219->106218 106220 f82d55 _free 58 API calls 106219->106220 106220->106218 106222 f90a0e _flsall 106221->106222 106223 f90a1b 106222->106223 106224 f90a32 106222->106224 106374 f88af4 58 API calls __getptd_noexit 106223->106374 106225 f90abd 106224->106225 106228 f90a42 106224->106228 106379 f88af4 58 API calls __getptd_noexit 106225->106379 106227 f90a20 106375 f88b28 58 API calls __getptd_noexit 106227->106375 106231 f90a6a 106228->106231 106232 f90a60 106228->106232 106235 f8d206 ___lock_fhandle 59 API calls 106231->106235 106376 f88af4 58 API calls __getptd_noexit 106232->106376 106233 f90a65 106380 f88b28 58 API calls __getptd_noexit 106233->106380 106237 f90a70 106235->106237 106239 f90a8e 106237->106239 106240 f90a83 106237->106240 106238 f90ac9 106381 f88db6 9 API calls __snwprintf 106238->106381 106377 f88b28 58 API calls __getptd_noexit 106239->106377 106359 f90add 106240->106359 106241 f90a27 _flsall 106241->106206 106245 f90a89 106378 f90ab5 LeaveCriticalSection __unlock_fhandle 106245->106378 106247->106197 106248->106200 106250 f8d892 _flsall 106249->106250 106251 f8d89f 106250->106251 106252 f8d8b6 106250->106252 106350 f88af4 58 API calls __getptd_noexit 106251->106350 106253 f8d955 106252->106253 106255 f8d8ca 106252->106255 106356 f88af4 58 API calls __getptd_noexit 106253->106356 106258 f8d8e8 106255->106258 106259 f8d8f2 106255->106259 106257 f8d8a4 106351 f88b28 58 API calls __getptd_noexit 106257->106351 106352 f88af4 58 API calls __getptd_noexit 106258->106352 106277 f8d206 106259->106277 106260 f8d8ed 106357 f88b28 58 API calls __getptd_noexit 106260->106357 106262 f8d8ab _flsall 106262->106213 106265 f8d8f8 106267 f8d90b 106265->106267 106268 f8d91e 106265->106268 106286 f8d975 106267->106286 106353 f88b28 58 API calls __getptd_noexit 106268->106353 106269 f8d961 106358 f88db6 9 API calls __snwprintf 106269->106358 106273 f8d923 106354 f88af4 58 API calls __getptd_noexit 106273->106354 106275 f8d917 106355 f8d94d LeaveCriticalSection __unlock_fhandle 106275->106355 106278 f8d212 _flsall 106277->106278 106279 f8d261 EnterCriticalSection 106278->106279 106281 f89c0b __lock 58 API calls 106278->106281 106280 f8d287 _flsall 106279->106280 106280->106265 106282 f8d237 106281->106282 106283 f8d24f 106282->106283 106284 f89e2b __getstream InitializeCriticalSectionAndSpinCount 106282->106284 106285 f8d28b ___lock_fhandle LeaveCriticalSection 106283->106285 106284->106283 106285->106279 106287 f8d982 __write_nolock 106286->106287 106288 f8d9b6 106287->106288 106289 f8d9e0 106287->106289 106290 f8d9c1 106287->106290 106291 f8c5f6 __woutput_l 6 API calls 106288->106291 106295 f8da38 106289->106295 106296 f8da1c 106289->106296 106292 f88af4 __set_osfhnd 58 API calls 106290->106292 106293 f8e1d6 106291->106293 106294 f8d9c6 106292->106294 106293->106275 106297 f88b28 __set_osfhnd 58 API calls 106294->106297 106298 f8da51 106295->106298 106302 f918c1 __lseeki64_nolock 60 API calls 106295->106302 106299 f88af4 __set_osfhnd 58 API calls 106296->106299 106301 f8d9cd 106297->106301 106303 f95c6b __flswbuf 58 API calls 106298->106303 106300 f8da21 106299->106300 106304 f88b28 __set_osfhnd 58 API calls 106300->106304 106305 f88db6 __snwprintf 9 API calls 106301->106305 106302->106298 106306 f8da5f 106303->106306 106307 f8da28 106304->106307 106305->106288 106308 f8ddb8 106306->106308 106314 f899ac _LocaleUpdate::_LocaleUpdate 58 API calls 106306->106314 106311 f88db6 __snwprintf 9 API calls 106307->106311 106309 f8e14b WriteFile 106308->106309 106310 f8ddd6 106308->106310 106312 f8ddab GetLastError 106309->106312 106322 f8dd78 106309->106322 106313 f8defa 106310->106313 106320 f8ddec 106310->106320 106311->106288 106312->106322 106323 f8dfef 106313->106323 106325 f8df05 106313->106325 106315 f8da8b GetConsoleMode 106314->106315 106315->106308 106317 f8daca 106315->106317 106316 f8e184 106316->106288 106321 f88b28 __set_osfhnd 58 API calls 106316->106321 106317->106308 106318 f8dada GetConsoleCP 106317->106318 106318->106316 106346 f8db09 106318->106346 106319 f8de5b WriteFile 106319->106312 106324 f8de98 106319->106324 106320->106316 106320->106319 106326 f8e1b2 106321->106326 106322->106288 106322->106316 106327 f8ded8 106322->106327 106323->106316 106328 f8e064 WideCharToMultiByte 106323->106328 106324->106320 106341 f8debc 106324->106341 106325->106316 106329 f8df6a WriteFile 106325->106329 106330 f88af4 __set_osfhnd 58 API calls 106326->106330 106331 f8e17b 106327->106331 106332 f8dee3 106327->106332 106328->106312 106344 f8e0ab 106328->106344 106329->106312 106337 f8dfb9 106329->106337 106330->106288 106334 f88b07 __dosmaperr 58 API calls 106331->106334 106333 f88b28 __set_osfhnd 58 API calls 106332->106333 106335 f8dee8 106333->106335 106334->106288 106338 f88af4 __set_osfhnd 58 API calls 106335->106338 106336 f8e0b3 WriteFile 106340 f8e106 GetLastError 106336->106340 106336->106344 106337->106322 106337->106325 106337->106341 106338->106288 106339 f835f5 __write_nolock 58 API calls 106339->106346 106340->106344 106341->106322 106342 f962ba 60 API calls __write_nolock 106342->106346 106343 f97a5e WriteConsoleW CreateFileW __putwch_nolock 106348 f8dc5f 106343->106348 106344->106322 106344->106323 106344->106336 106344->106341 106345 f8dbf2 WideCharToMultiByte 106345->106322 106347 f8dc2d WriteFile 106345->106347 106346->106322 106346->106339 106346->106342 106346->106345 106346->106348 106347->106312 106347->106348 106348->106312 106348->106322 106348->106343 106348->106346 106349 f8dc87 WriteFile 106348->106349 106349->106312 106349->106348 106350->106257 106351->106262 106352->106260 106353->106273 106354->106275 106355->106262 106356->106260 106357->106269 106358->106262 106382 f8d4c3 106359->106382 106361 f90b41 106395 f8d43d 59 API calls __set_osfhnd 106361->106395 106362 f90aeb 106362->106361 106365 f8d4c3 __lseek_nolock 58 API calls 106362->106365 106373 f90b1f 106362->106373 106364 f90b49 106370 f90b6b 106364->106370 106396 f88b07 58 API calls 2 library calls 106364->106396 106367 f90b16 106365->106367 106366 f8d4c3 __lseek_nolock 58 API calls 106368 f90b2b CloseHandle 106366->106368 106371 f8d4c3 __lseek_nolock 58 API calls 106367->106371 106368->106361 106372 f90b37 GetLastError 106368->106372 106370->106245 106371->106373 106372->106361 106373->106361 106373->106366 106374->106227 106375->106241 106376->106233 106377->106245 106378->106241 106379->106233 106380->106238 106381->106241 106383 f8d4ce 106382->106383 106385 f8d4e3 106382->106385 106384 f88af4 __set_osfhnd 58 API calls 106383->106384 106387 f8d4d3 106384->106387 106386 f88af4 __set_osfhnd 58 API calls 106385->106386 106388 f8d508 106385->106388 106389 f8d512 106386->106389 106390 f88b28 __set_osfhnd 58 API calls 106387->106390 106388->106362 106391 f88b28 __set_osfhnd 58 API calls 106389->106391 106392 f8d4db 106390->106392 106393 f8d51a 106391->106393 106392->106362 106394 f88db6 __snwprintf 9 API calls 106393->106394 106394->106392 106395->106364 106396->106370 106398 f91940 __write_nolock 106397->106398 106399 f8079e GetLongPathNameW 106398->106399 106400 f67bcc 59 API calls 106399->106400 106401 f672bd 106400->106401 106402 f6700b 106401->106402 106403 f67667 59 API calls 106402->106403 106404 f6701d 106403->106404 106405 f64750 60 API calls 106404->106405 106406 f67028 106405->106406 106407 f67033 106406->106407 106408 f9e885 106406->106408 106410 f63f74 59 API calls 106407->106410 106412 f9e89f 106408->106412 106455 f67908 61 API calls 106408->106455 106411 f6703f 106410->106411 106449 f634c2 106411->106449 106414 f67052 Mailbox 106414->105374 106416 f64ddd 136 API calls 106415->106416 106417 f6688f 106416->106417 106418 f9e031 106417->106418 106419 f64ddd 136 API calls 106417->106419 106420 fc955b 122 API calls 106418->106420 106421 f668a3 106419->106421 106422 f9e046 106420->106422 106421->106418 106423 f668ab 106421->106423 106424 f9e04a 106422->106424 106425 f9e067 106422->106425 106427 f668b7 106423->106427 106428 f9e052 106423->106428 106429 f64e4a 84 API calls 106424->106429 106426 f80db6 Mailbox 59 API calls 106425->106426 106448 f9e0ac Mailbox 106426->106448 106456 f66a8c 106427->106456 106549 fc42f8 90 API calls _wprintf 106428->106549 106429->106428 106433 f9e060 106433->106425 106434 f9e260 106435 f82d55 _free 58 API calls 106434->106435 106436 f9e268 106435->106436 106437 f64e4a 84 API calls 106436->106437 106442 f9e271 106437->106442 106441 f82d55 _free 58 API calls 106441->106442 106442->106441 106443 f64e4a 84 API calls 106442->106443 106555 fbf7a1 89 API calls 4 library calls 106442->106555 106443->106442 106445 f67de1 59 API calls 106445->106448 106448->106434 106448->106442 106448->106445 106550 fbf73d 59 API calls 2 library calls 106448->106550 106551 fbf65e 61 API calls 2 library calls 106448->106551 106552 fc737f 59 API calls Mailbox 106448->106552 106553 f6750f 59 API calls 2 library calls 106448->106553 106554 f6735d 59 API calls Mailbox 106448->106554 106450 f634d4 106449->106450 106454 f634f3 _memmove 106449->106454 106453 f80db6 Mailbox 59 API calls 106450->106453 106451 f80db6 Mailbox 59 API calls 106452 f6350a 106451->106452 106452->106414 106453->106454 106454->106451 106455->106408 106457 f66ab5 106456->106457 106458 f9e41e 106456->106458 106561 f657a6 60 API calls Mailbox 106457->106561 106628 fbf7a1 89 API calls 4 library calls 106458->106628 106461 f66ad7 106562 f657f6 67 API calls 106461->106562 106462 f9e431 106629 fbf7a1 89 API calls 4 library calls 106462->106629 106464 f66aec 106464->106462 106465 f66af4 106464->106465 106467 f67667 59 API calls 106465->106467 106469 f66b00 106467->106469 106468 f9e44d 106471 f66b61 106468->106471 106563 f80957 60 API calls __write_nolock 106469->106563 106473 f66b6f 106471->106473 106474 f9e460 106471->106474 106472 f66b0c 106476 f67667 59 API calls 106472->106476 106475 f67667 59 API calls 106473->106475 106477 f65c6f CloseHandle 106474->106477 106478 f66b78 106475->106478 106479 f66b18 106476->106479 106480 f9e46c 106477->106480 106482 f67667 59 API calls 106478->106482 106483 f64750 60 API calls 106479->106483 106481 f64ddd 136 API calls 106480->106481 106484 f9e488 106481->106484 106485 f66b81 106482->106485 106486 f66b26 106483->106486 106487 f9e4b1 106484->106487 106490 fc955b 122 API calls 106484->106490 106566 f6459b 106485->106566 106564 f65850 ReadFile SetFilePointerEx 106486->106564 106630 fbf7a1 89 API calls 4 library calls 106487->106630 106494 f9e4a4 106490->106494 106491 f66b98 106495 f67b2e 59 API calls 106491->106495 106493 f66b52 106565 f65aee SetFilePointerEx SetFilePointerEx 106493->106565 106498 f9e4cd 106494->106498 106499 f9e4ac 106494->106499 106500 f66ba9 SetCurrentDirectoryW 106495->106500 106496 f9e4c8 106528 f66d0c Mailbox 106496->106528 106502 f64e4a 84 API calls 106498->106502 106501 f64e4a 84 API calls 106499->106501 106505 f66bbc Mailbox 106500->106505 106501->106487 106503 f9e4d2 106502->106503 106504 f80db6 Mailbox 59 API calls 106503->106504 106510 f9e506 106504->106510 106507 f80db6 Mailbox 59 API calls 106505->106507 106509 f66bcf 106507->106509 106508 f63bbb 106508->105233 106508->105242 106511 f6522e 59 API calls 106509->106511 106631 f6750f 59 API calls 2 library calls 106510->106631 106538 f66bda Mailbox __wsetenvp 106511->106538 106513 f66ce7 106624 f65c6f 106513->106624 106516 f9e740 106637 fc72df 59 API calls Mailbox 106516->106637 106520 f9e762 106638 fdfbce 59 API calls 2 library calls 106520->106638 106523 f9e76f 106525 f82d55 _free 58 API calls 106523->106525 106524 f9e7d9 106641 fbf7a1 89 API calls 4 library calls 106524->106641 106525->106528 106556 f657d4 106528->106556 106529 f9e7f2 106529->106513 106532 f9e7d1 106640 fbf5f7 59 API calls 4 library calls 106532->106640 106534 f67de1 59 API calls 106534->106538 106538->106513 106538->106524 106538->106532 106538->106534 106617 f6586d 67 API calls _wcscpy 106538->106617 106618 f66f5d GetStringTypeW 106538->106618 106619 f66ecc 60 API calls __wcsnicmp 106538->106619 106620 f66faa GetStringTypeW __wsetenvp 106538->106620 106621 f8363d GetStringTypeW _iswctype 106538->106621 106622 f668dc 165 API calls 3 library calls 106538->106622 106623 f67213 59 API calls Mailbox 106538->106623 106539 f67de1 59 API calls 106546 f9e54f Mailbox 106539->106546 106542 f9e792 106639 fbf7a1 89 API calls 4 library calls 106542->106639 106545 f9e7ab 106547 f82d55 _free 58 API calls 106545->106547 106546->106516 106546->106539 106546->106542 106632 fbf73d 59 API calls 2 library calls 106546->106632 106633 fbf65e 61 API calls 2 library calls 106546->106633 106634 fc737f 59 API calls Mailbox 106546->106634 106635 f6750f 59 API calls 2 library calls 106546->106635 106636 f67213 59 API calls Mailbox 106546->106636 106548 f9e7be 106547->106548 106548->106528 106549->106433 106550->106448 106551->106448 106552->106448 106553->106448 106554->106448 106555->106442 106557 f65c6f CloseHandle 106556->106557 106558 f657dc Mailbox 106557->106558 106559 f65c6f CloseHandle 106558->106559 106560 f657eb 106559->106560 106560->106508 106561->106461 106562->106464 106563->106472 106564->106493 106565->106471 106567 f67667 59 API calls 106566->106567 106568 f645b1 106567->106568 106569 f67667 59 API calls 106568->106569 106570 f645b9 106569->106570 106571 f67667 59 API calls 106570->106571 106572 f645c1 106571->106572 106573 f67667 59 API calls 106572->106573 106574 f645c9 106573->106574 106575 f9d4d2 106574->106575 106576 f645fd 106574->106576 106577 f68047 59 API calls 106575->106577 106578 f6784b 59 API calls 106576->106578 106579 f9d4db 106577->106579 106580 f6460b 106578->106580 106581 f67d8c 59 API calls 106579->106581 106582 f67d2c 59 API calls 106580->106582 106584 f64640 106581->106584 106583 f64615 106582->106583 106583->106584 106585 f6784b 59 API calls 106583->106585 106586 f64680 106584->106586 106588 f6465f 106584->106588 106599 f9d4fb 106584->106599 106589 f64636 106585->106589 106587 f6784b 59 API calls 106586->106587 106590 f64691 106587->106590 106593 f679f2 59 API calls 106588->106593 106592 f67d2c 59 API calls 106589->106592 106595 f646a3 106590->106595 106597 f68047 59 API calls 106590->106597 106591 f9d5cb 106596 f67bcc 59 API calls 106591->106596 106592->106584 106594 f64669 106593->106594 106594->106586 106600 f6784b 59 API calls 106594->106600 106598 f646b3 106595->106598 106601 f68047 59 API calls 106595->106601 106616 f9d588 106596->106616 106597->106595 106603 f646ba 106598->106603 106604 f68047 59 API calls 106598->106604 106599->106591 106602 f9d5b4 106599->106602 106613 f9d532 106599->106613 106600->106586 106601->106598 106602->106591 106607 f9d59f 106602->106607 106605 f68047 59 API calls 106603->106605 106612 f646c1 Mailbox 106603->106612 106604->106603 106605->106612 106606 f9d590 106608 f67bcc 59 API calls 106606->106608 106609 f67bcc 59 API calls 106607->106609 106608->106616 106609->106616 106610 f679f2 59 API calls 106610->106616 106612->106491 106613->106606 106614 f9d57b 106613->106614 106615 f67bcc 59 API calls 106614->106615 106615->106616 106616->106586 106616->106610 106642 f67924 59 API calls 2 library calls 106616->106642 106617->106538 106618->106538 106619->106538 106620->106538 106621->106538 106622->106538 106623->106538 106625 f65c88 106624->106625 106626 f65c79 SetCurrentDirectoryW 106624->106626 106625->106626 106627 f65c8d CloseHandle 106625->106627 106626->106528 106627->106626 106628->106462 106629->106468 106630->106496 106631->106546 106632->106546 106633->106546 106634->106546 106635->106546 106636->106546 106637->106520 106638->106523 106639->106545 106640->106524 106641->106529 106642->106616 106644 f66d95 106643->106644 106649 f66ea9 106643->106649 106645 f80db6 Mailbox 59 API calls 106644->106645 106644->106649 106647 f66dbc 106645->106647 106646 f80db6 Mailbox 59 API calls 106653 f66e31 106646->106653 106647->106646 106649->105380 106653->106649 106656 f66240 106653->106656 106681 f6735d 59 API calls Mailbox 106653->106681 106682 fb6553 59 API calls Mailbox 106653->106682 106683 f6750f 59 API calls 2 library calls 106653->106683 106654->105383 106655->105385 106657 f67a16 59 API calls 106656->106657 106675 f66265 106657->106675 106658 f6646a 106686 f6750f 59 API calls 2 library calls 106658->106686 106660 f66484 Mailbox 106660->106653 106663 f9dff6 106689 fbf8aa 91 API calls 4 library calls 106663->106689 106664 f6750f 59 API calls 106664->106675 106665 f66799 _memmove 106691 fbf8aa 91 API calls 4 library calls 106665->106691 106669 f9e004 106690 f6750f 59 API calls 2 library calls 106669->106690 106670 f67d8c 59 API calls 106670->106675 106672 f9e01a 106672->106660 106673 f9df92 106674 f68029 59 API calls 106673->106674 106676 f9df9d 106674->106676 106675->106658 106675->106663 106675->106664 106675->106665 106675->106670 106675->106673 106678 f67e4f 59 API calls 106675->106678 106684 f65f6c 60 API calls 106675->106684 106685 f65d41 59 API calls Mailbox 106675->106685 106687 f65e72 60 API calls 106675->106687 106688 f67924 59 API calls 2 library calls 106675->106688 106680 f80db6 Mailbox 59 API calls 106676->106680 106679 f6643b CharUpperBuffW 106678->106679 106679->106675 106680->106665 106681->106653 106682->106653 106683->106653 106684->106675 106685->106675 106686->106660 106687->106675 106688->106675 106689->106669 106690->106672 106691->106660 106692->105399 106693->105398 106695 f6e6d5 106694->106695 106696 fa3aa9 106695->106696 106699 f6e73f 106695->106699 106703 f6e799 106695->106703 106697 f69ea0 331 API calls 106696->106697 106702 f67667 59 API calls 106699->106702 106699->106703 106700 f67667 59 API calls 106700->106703 106703->106700 106705 f82d40 __cinit 67 API calls 106703->106705 106706 fa3b26 106703->106706 106709 f6e95a 106703->106709 106724 f6e970 Mailbox 106703->106724 106705->106703 106706->105476 106709->106724 106726 f6f650 106725->106726 106727 f6f4ba 106725->106727 106730 f67de1 59 API calls 106726->106730 106728 f6f4c6 106727->106728 106729 fa441e 106727->106729 106946 f6f290 331 API calls 2 library calls 106728->106946 106948 fdbc6b 331 API calls Mailbox 106729->106948 106736 f6f58c Mailbox 106730->106736 106735 f6f4fd 106735->106736 107075 f68180 106744->107075 106746 f6fd3d 106824->105476 106825->105476 106826->105408 106828->105476 106829->105411 106830->105411 106831->105411 106832->105476 106833->105476 106834->105476 106835->105476 106836->105476 106837->105476 106838->105460 106839->105460 106840->105460 106841->105460 106842->105460 106843->105460 106844->105460 106946->106735 107076 f6818f 107075->107076 107079 f681aa 107075->107079 107077 f67e4f 59 API calls 107076->107077 107079->106746

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F63B68
                                                                                • IsDebuggerPresent.KERNEL32 ref: 00F63B7A
                                                                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,010252F8,010252E0,?,?), ref: 00F63BEB
                                                                                  • Part of subcall function 00F67BCC: _memmove.LIBCMT ref: 00F67C06
                                                                                  • Part of subcall function 00F7092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00F63C14,010252F8,?,?,?), ref: 00F7096E
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00F63C6F
                                                                                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,01017770,00000010), ref: 00F9D281
                                                                                • SetCurrentDirectoryW.KERNEL32(?,010252F8,?,?,?), ref: 00F9D2B9
                                                                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,01014260,010252F8,?,?,?), ref: 00F9D33F
                                                                                • ShellExecuteW.SHELL32(00000000,?,?), ref: 00F9D346
                                                                                  • Part of subcall function 00F63A46: GetSysColorBrush.USER32(0000000F), ref: 00F63A50
                                                                                  • Part of subcall function 00F63A46: LoadCursorW.USER32(00000000,00007F00), ref: 00F63A5F
                                                                                  • Part of subcall function 00F63A46: LoadIconW.USER32(00000063), ref: 00F63A76
                                                                                  • Part of subcall function 00F63A46: LoadIconW.USER32(000000A4), ref: 00F63A88
                                                                                  • Part of subcall function 00F63A46: LoadIconW.USER32(000000A2), ref: 00F63A9A
                                                                                  • Part of subcall function 00F63A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F63AC0
                                                                                  • Part of subcall function 00F63A46: RegisterClassExW.USER32(?), ref: 00F63B16
                                                                                  • Part of subcall function 00F639D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F63A03
                                                                                  • Part of subcall function 00F639D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F63A24
                                                                                  • Part of subcall function 00F639D5: ShowWindow.USER32(00000000,?,?), ref: 00F63A38
                                                                                  • Part of subcall function 00F639D5: ShowWindow.USER32(00000000,?,?), ref: 00F63A41
                                                                                  • Part of subcall function 00F6434A: _memset.LIBCMT ref: 00F64370
                                                                                  • Part of subcall function 00F6434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F64415
                                                                                Strings
                                                                                • This is a third-party compiled AutoIt script., xrefs: 00F9D279
                                                                                • runas, xrefs: 00F9D33A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                                                • String ID: This is a third-party compiled AutoIt script.$runas
                                                                                • API String ID: 529118366-3287110873
                                                                                • Opcode ID: 6675fa2c2a7fe20ccb78a88f072f03bacedcd6bfcdc7d63aec1e90183c916c2e
                                                                                • Instruction ID: 540fdd5109b8bf768ab03204365d4e7a39975f864301f2c84a6faa75a6acfcc1
                                                                                • Opcode Fuzzy Hash: 6675fa2c2a7fe20ccb78a88f072f03bacedcd6bfcdc7d63aec1e90183c916c2e
                                                                                • Instruction Fuzzy Hash: 9E511431D08248AEDF21EFB4DC46EFD7B78AF47710F204069F491A6192CA795609FB21

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 996 f649a0-f64a00 call f67667 GetVersionExW call f67bcc 1001 f64a06 996->1001 1002 f64b0b-f64b0d 996->1002 1003 f64a09-f64a0e 1001->1003 1004 f9d767-f9d773 1002->1004 1006 f64a14 1003->1006 1007 f64b12-f64b13 1003->1007 1005 f9d774-f9d778 1004->1005 1009 f9d77b-f9d787 1005->1009 1010 f9d77a 1005->1010 1008 f64a15-f64a4c call f67d2c call f67726 1006->1008 1007->1008 1018 f64a52-f64a53 1008->1018 1019 f9d864-f9d867 1008->1019 1009->1005 1012 f9d789-f9d78e 1009->1012 1010->1009 1012->1003 1014 f9d794-f9d79b 1012->1014 1014->1004 1016 f9d79d 1014->1016 1020 f9d7a2-f9d7a5 1016->1020 1018->1020 1021 f64a59-f64a64 1018->1021 1022 f9d869 1019->1022 1023 f9d880-f9d884 1019->1023 1024 f9d7ab-f9d7c9 1020->1024 1025 f64a93-f64aaa GetCurrentProcess IsWow64Process 1020->1025 1030 f9d7ea-f9d7f0 1021->1030 1031 f64a6a-f64a6c 1021->1031 1032 f9d86c 1022->1032 1026 f9d86f-f9d878 1023->1026 1027 f9d886-f9d88f 1023->1027 1024->1025 1033 f9d7cf-f9d7d5 1024->1033 1028 f64aaf-f64ac0 1025->1028 1029 f64aac 1025->1029 1026->1023 1027->1032 1036 f9d891-f9d894 1027->1036 1037 f64ac2-f64ad2 call f64b37 1028->1037 1038 f64b2b-f64b35 GetSystemInfo 1028->1038 1029->1028 1034 f9d7fa-f9d800 1030->1034 1035 f9d7f2-f9d7f5 1030->1035 1039 f64a72-f64a75 1031->1039 1040 f9d805-f9d811 1031->1040 1032->1026 1041 f9d7df-f9d7e5 1033->1041 1042 f9d7d7-f9d7da 1033->1042 1034->1025 1035->1025 1036->1026 1053 f64ad4-f64ae1 call f64b37 1037->1053 1054 f64b1f-f64b29 GetSystemInfo 1037->1054 1043 f64af8-f64b08 1038->1043 1047 f9d831-f9d834 1039->1047 1048 f64a7b-f64a8a 1039->1048 1044 f9d81b-f9d821 1040->1044 1045 f9d813-f9d816 1040->1045 1041->1025 1042->1025 1044->1025 1045->1025 1047->1025 1052 f9d83a-f9d84f 1047->1052 1049 f64a90 1048->1049 1050 f9d826-f9d82c 1048->1050 1049->1025 1050->1025 1055 f9d859-f9d85f 1052->1055 1056 f9d851-f9d854 1052->1056 1061 f64ae3-f64ae7 GetNativeSystemInfo 1053->1061 1062 f64b18-f64b1d 1053->1062 1057 f64ae9-f64aed 1054->1057 1055->1025 1056->1025 1057->1043 1060 f64aef-f64af2 FreeLibrary 1057->1060 1060->1043 1061->1057 1062->1061
                                                                                APIs
                                                                                • GetVersionExW.KERNEL32(?), ref: 00F649CD
                                                                                  • Part of subcall function 00F67BCC: _memmove.LIBCMT ref: 00F67C06
                                                                                • GetCurrentProcess.KERNEL32(?,00FEFAEC,00000000,00000000,?), ref: 00F64A9A
                                                                                • IsWow64Process.KERNEL32(00000000), ref: 00F64AA1
                                                                                • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00F64AE7
                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00F64AF2
                                                                                • GetSystemInfo.KERNEL32(00000000), ref: 00F64B23
                                                                                • GetSystemInfo.KERNEL32(00000000), ref: 00F64B2F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                                                • String ID:
                                                                                • API String ID: 1986165174-0
                                                                                • Opcode ID: 58b780f5fce3675906bf00c8136124c2a3bd872e4efef2b0676125b8c0853ad0
                                                                                • Instruction ID: 69372cebb4a2c637207004869adb057323dbd6ce84834307f2736b36e7fbd8d0
                                                                                • Opcode Fuzzy Hash: 58b780f5fce3675906bf00c8136124c2a3bd872e4efef2b0676125b8c0853ad0
                                                                                • Instruction Fuzzy Hash: F791F8319897C4DECB31EBB885502AAFFF5AF29310B54496DD0CB93A42D224F508E75A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1063 f64e89-f64ea1 CreateStreamOnHGlobal 1064 f64ea3-f64eba FindResourceExW 1063->1064 1065 f64ec1-f64ec6 1063->1065 1066 f64ec0 1064->1066 1067 f9d933-f9d942 LoadResource 1064->1067 1066->1065 1067->1066 1068 f9d948-f9d956 SizeofResource 1067->1068 1068->1066 1069 f9d95c-f9d967 LockResource 1068->1069 1069->1066 1070 f9d96d-f9d98b 1069->1070 1070->1066
                                                                                APIs
                                                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00F64D8E,?,?,00000000,00000000), ref: 00F64E99
                                                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00F64D8E,?,?,00000000,00000000), ref: 00F64EB0
                                                                                • LoadResource.KERNEL32(?,00000000,?,?,00F64D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F64E2F), ref: 00F9D937
                                                                                • SizeofResource.KERNEL32(?,00000000,?,?,00F64D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F64E2F), ref: 00F9D94C
                                                                                • LockResource.KERNEL32(00F64D8E,?,?,00F64D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F64E2F,00000000), ref: 00F9D95F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                • String ID: SCRIPT
                                                                                • API String ID: 3051347437-3967369404
                                                                                • Opcode ID: 255a3bde5cc42d3e4fe2d3b368ef8baf2a9e608416f03954ba45e6d05414b198
                                                                                • Instruction ID: 6fa84fa75547b9b012e7a5c030510d654d7cb9103e2de0d1f3b13f07645ab4e8
                                                                                • Opcode Fuzzy Hash: 255a3bde5cc42d3e4fe2d3b368ef8baf2a9e608416f03954ba45e6d05414b198
                                                                                • Instruction Fuzzy Hash: 6811A0B1600345BFD7209BA5EC88F277BBAFBC5B11F20426CF515CA250DB72EC04A660
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharUpper
                                                                                • String ID:
                                                                                • API String ID: 3964851224-0
                                                                                • Opcode ID: 95a8f92115ccc24bd6e7e8b8133b88e3d54698a910ecdff21159accbfd5e64ea
                                                                                • Instruction ID: 9c11ad4b1d79d11a3026d7211772e63cae9bf82b930ae44798df4b21bca5b330
                                                                                • Opcode Fuzzy Hash: 95a8f92115ccc24bd6e7e8b8133b88e3d54698a910ecdff21159accbfd5e64ea
                                                                                • Instruction Fuzzy Hash: E5926C71A08341CFD720DF14C480B2AB7E5BF89314F14896DE89A9B352DBB5EC45EB92
                                                                                APIs
                                                                                • GetFileAttributesW.KERNELBASE(?,00F9E398), ref: 00FC446A
                                                                                • FindFirstFileW.KERNELBASE(?,?), ref: 00FC447B
                                                                                • FindClose.KERNEL32(00000000), ref: 00FC448B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: FileFind$AttributesCloseFirst
                                                                                • String ID:
                                                                                • API String ID: 48322524-0
                                                                                • Opcode ID: 4c65dd9d1b6f59c706a7f7add8228fb7d8d65f2a3dd13594d3499af2a697c193
                                                                                • Instruction ID: 52db511b10c17b08b6454d43b1cd29921b214bec790848c666bd74ee44491e26
                                                                                • Opcode Fuzzy Hash: 4c65dd9d1b6f59c706a7f7add8228fb7d8d65f2a3dd13594d3499af2a697c193
                                                                                • Instruction Fuzzy Hash: C7E0D8338105456B4214AB38EC4E9E9775D9E05335F204719FD35C50D0E7746D04B595
                                                                                APIs
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F70A5B
                                                                                • timeGetTime.WINMM ref: 00F70D16
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F70E53
                                                                                • Sleep.KERNEL32(0000000A), ref: 00F70E61
                                                                                • LockWindowUpdate.USER32(00000000,?,?), ref: 00F70EFA
                                                                                • DestroyWindow.USER32 ref: 00F70F06
                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00F70F20
                                                                                • Sleep.KERNEL32(0000000A,?,?), ref: 00FA4E83
                                                                                • TranslateMessage.USER32(?), ref: 00FA5C60
                                                                                • DispatchMessageW.USER32(?), ref: 00FA5C6E
                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FA5C82
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                                                • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                                                • API String ID: 4212290369-3242690629
                                                                                • Opcode ID: b061dd61e20f284233ef8acfabfda96e4d3d9c02049bc6d36e4c262e5a4322b7
                                                                                • Instruction ID: e6227a2cefe757d73bca9bcdfd5427d63141e91a3a863029b426dd470e29afdd
                                                                                • Opcode Fuzzy Hash: b061dd61e20f284233ef8acfabfda96e4d3d9c02049bc6d36e4c262e5a4322b7
                                                                                • Instruction Fuzzy Hash: 7EB2F3B0A08741DFD724DF24C884BAAB7E5FF85714F14891EF48997291CB79E848EB42

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 00FC8F5F: __time64.LIBCMT ref: 00FC8F69
                                                                                  • Part of subcall function 00F64EE5: _fseek.LIBCMT ref: 00F64EFD
                                                                                • __wsplitpath.LIBCMT ref: 00FC9234
                                                                                  • Part of subcall function 00F840FB: __wsplitpath_helper.LIBCMT ref: 00F8413B
                                                                                • _wcscpy.LIBCMT ref: 00FC9247
                                                                                • _wcscat.LIBCMT ref: 00FC925A
                                                                                • __wsplitpath.LIBCMT ref: 00FC927F
                                                                                • _wcscat.LIBCMT ref: 00FC9295
                                                                                • _wcscat.LIBCMT ref: 00FC92A8
                                                                                  • Part of subcall function 00FC8FA5: _memmove.LIBCMT ref: 00FC8FDE
                                                                                  • Part of subcall function 00FC8FA5: _memmove.LIBCMT ref: 00FC8FED
                                                                                • _wcscmp.LIBCMT ref: 00FC91EF
                                                                                  • Part of subcall function 00FC9734: _wcscmp.LIBCMT ref: 00FC9824
                                                                                  • Part of subcall function 00FC9734: _wcscmp.LIBCMT ref: 00FC9837
                                                                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00FC9452
                                                                                • _wcsncpy.LIBCMT ref: 00FC94C5
                                                                                • DeleteFileW.KERNEL32(?,?), ref: 00FC94FB
                                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00FC9511
                                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FC9522
                                                                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FC9534
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                                • String ID:
                                                                                • API String ID: 1500180987-0
                                                                                • Opcode ID: 3e95d86492c2f76daa834287b38e0895de41b2c10deb91e0a9e8ec6b3b65f81c
                                                                                • Instruction ID: b8f1a5fc580e4a2822d9a47fdb7211f4e01ffc48b616d28eb5c74cc375d2f1b9
                                                                                • Opcode Fuzzy Hash: 3e95d86492c2f76daa834287b38e0895de41b2c10deb91e0a9e8ec6b3b65f81c
                                                                                • Instruction Fuzzy Hash: 88C15CB1D0421AAADF21EF94CD86EDEB7BCEF45310F0044AAF609E7141DB749A449F61

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00F63074
                                                                                • RegisterClassExW.USER32(00000030), ref: 00F6309E
                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F630AF
                                                                                • InitCommonControlsEx.COMCTL32(?), ref: 00F630CC
                                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F630DC
                                                                                • LoadIconW.USER32(000000A9), ref: 00F630F2
                                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F63101
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                • API String ID: 2914291525-1005189915
                                                                                • Opcode ID: 2ad4e259c5212cf04693cd44128f1bf4032e6ce1a0bc55003875a49a86ef7361
                                                                                • Instruction ID: 99043e7411071ab74c06fef83f1ab876b448db40ce47067d50d68ca5e8dfd706
                                                                                • Opcode Fuzzy Hash: 2ad4e259c5212cf04693cd44128f1bf4032e6ce1a0bc55003875a49a86ef7361
                                                                                • Instruction Fuzzy Hash: BF3129B18413899FDB60CFA4D889ADDBBF0FB09310F24452EE580EA291D3BA0589DF55

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00F63074
                                                                                • RegisterClassExW.USER32(00000030), ref: 00F6309E
                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F630AF
                                                                                • InitCommonControlsEx.COMCTL32(?), ref: 00F630CC
                                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F630DC
                                                                                • LoadIconW.USER32(000000A9), ref: 00F630F2
                                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F63101
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                • API String ID: 2914291525-1005189915
                                                                                • Opcode ID: 703e632900f88f526311fe3da9b17047adfbd5360be55fc21b0c5847d602cb24
                                                                                • Instruction ID: 8267f081177f45eff8c5314ab16de1207b5d76d395ffdf29dbf2905e21b4411e
                                                                                • Opcode Fuzzy Hash: 703e632900f88f526311fe3da9b17047adfbd5360be55fc21b0c5847d602cb24
                                                                                • Instruction Fuzzy Hash: A421F7B1D11248AFDB20DFA4EC88BDDBBF4FB08710F10812AF650AA290D7F645489F95

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 00F64706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,010252F8,?,00F637AE,?), ref: 00F64724
                                                                                  • Part of subcall function 00F8050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00F67165), ref: 00F8052D
                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00F671A8
                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00F9E8C8
                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00F9E909
                                                                                • RegCloseKey.ADVAPI32(?), ref: 00F9E947
                                                                                • _wcscat.LIBCMT ref: 00F9E9A0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                • API String ID: 2673923337-2727554177
                                                                                • Opcode ID: 11732c507b7658b1040ef9af1643907aa3ed41848cefa29366ef2b7975070682
                                                                                • Instruction ID: 1b734f32dad52139934b9e7833139abb0865ec80697170e4f90bffbaa2f8692e
                                                                                • Opcode Fuzzy Hash: 11732c507b7658b1040ef9af1643907aa3ed41848cefa29366ef2b7975070682
                                                                                • Instruction Fuzzy Hash: 7571A1715083419ED720EF25EC819AFBBE8FF85310F50052EF885871A1DB7A994CDB52

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00F63A50
                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00F63A5F
                                                                                • LoadIconW.USER32(00000063), ref: 00F63A76
                                                                                • LoadIconW.USER32(000000A4), ref: 00F63A88
                                                                                • LoadIconW.USER32(000000A2), ref: 00F63A9A
                                                                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F63AC0
                                                                                • RegisterClassExW.USER32(?), ref: 00F63B16
                                                                                  • Part of subcall function 00F63041: GetSysColorBrush.USER32(0000000F), ref: 00F63074
                                                                                  • Part of subcall function 00F63041: RegisterClassExW.USER32(00000030), ref: 00F6309E
                                                                                  • Part of subcall function 00F63041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F630AF
                                                                                  • Part of subcall function 00F63041: InitCommonControlsEx.COMCTL32(?), ref: 00F630CC
                                                                                  • Part of subcall function 00F63041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F630DC
                                                                                  • Part of subcall function 00F63041: LoadIconW.USER32(000000A9), ref: 00F630F2
                                                                                  • Part of subcall function 00F63041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F63101
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                • String ID: #$0$AutoIt v3
                                                                                • API String ID: 423443420-4155596026
                                                                                • Opcode ID: 48e43e30d9ac769af044bf3a98d577a2b4de92ad23a51077f8e8b7a416e9395d
                                                                                • Instruction ID: a795621e8de0905089ce2b166ff7f25d98272dbdc99e21fdbe498e321d4b0028
                                                                                • Opcode Fuzzy Hash: 48e43e30d9ac769af044bf3a98d577a2b4de92ad23a51077f8e8b7a416e9395d
                                                                                • Instruction Fuzzy Hash: 42215171D00308AFEB30DFA4EC45BAD7BB1FB0A711F20411AF540AA2D5D3BA55589F98

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 767 f63633-f63681 769 f63683-f63686 767->769 770 f636e1-f636e3 767->770 772 f636e7 769->772 773 f63688-f6368f 769->773 770->769 771 f636e5 770->771 776 f636ca-f636d2 DefWindowProcW 771->776 777 f9d0cc-f9d0fa call f71070 call f71093 772->777 778 f636ed-f636f0 772->778 774 f63695-f6369a 773->774 775 f6374b-f63753 PostQuitMessage 773->775 780 f636a0-f636a2 774->780 781 f9d154-f9d168 call fc2527 774->781 782 f63711-f63713 775->782 783 f636d8-f636de 776->783 811 f9d0ff-f9d106 777->811 784 f63715-f6373c SetTimer RegisterWindowMessageW 778->784 785 f636f2-f636f3 778->785 787 f63755-f63764 call f644a0 780->787 788 f636a8-f636ad 780->788 781->782 804 f9d16e 781->804 782->783 784->782 789 f6373e-f63749 CreatePopupMenu 784->789 791 f9d06f-f9d072 785->791 792 f636f9-f6370c KillTimer call f6443a call f63114 785->792 787->782 794 f9d139-f9d140 788->794 795 f636b3-f636b8 788->795 789->782 798 f9d0a8-f9d0c7 MoveWindow 791->798 799 f9d074-f9d076 791->799 792->782 794->776 809 f9d146-f9d14f call fb7c36 794->809 802 f636be-f636c4 795->802 803 f9d124-f9d134 call fc2d36 795->803 798->782 806 f9d078-f9d07b 799->806 807 f9d097-f9d0a3 SetFocus 799->807 802->776 802->811 803->782 804->776 806->802 812 f9d081-f9d092 call f71070 806->812 807->782 809->776 811->776 816 f9d10c-f9d11f call f6443a call f6434a 811->816 812->782 816->776
                                                                                APIs
                                                                                • DefWindowProcW.USER32(?,?,?,?), ref: 00F636D2
                                                                                • KillTimer.USER32(?,00000001), ref: 00F636FC
                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F6371F
                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F6372A
                                                                                • CreatePopupMenu.USER32 ref: 00F6373E
                                                                                • PostQuitMessage.USER32(00000000), ref: 00F6374D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                • String ID: TaskbarCreated
                                                                                • API String ID: 129472671-2362178303
                                                                                • Opcode ID: c087a502e4d3b6de7e4914cf3cbed86259ecd1a1d921ca99f6519ccd146a3ee7
                                                                                • Instruction ID: f5e415cd9662edf214373df343c024122cacf5e52d64dc07f465dccea219ff54
                                                                                • Opcode Fuzzy Hash: c087a502e4d3b6de7e4914cf3cbed86259ecd1a1d921ca99f6519ccd146a3ee7
                                                                                • Instruction Fuzzy Hash: 1A417BB3A04149BBDF306F28DC49FB93765FB01320F240125F542D62E5CABA9E48B765

                                                                                Control-flow Graph

                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                                                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                                                                • API String ID: 1825951767-3513169116
                                                                                • Opcode ID: 7fc3b0cc12e34b78bbbdf6b7729cc3d1c1c8e5efee2f83704ecd2d4e50af9e7f
                                                                                • Instruction ID: ae6e14426f810bce00c4e4e116be9712ced42fb11377074dcbabd5cb44c0bde1
                                                                                • Opcode Fuzzy Hash: 7fc3b0cc12e34b78bbbdf6b7729cc3d1c1c8e5efee2f83704ecd2d4e50af9e7f
                                                                                • Instruction Fuzzy Hash: 40A17D72D0022DAADF14EBA0DC95AEEB778FF25310F500529F415B7181DF78AA08EB60

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 942 a54888-a54936 call a522c8 945 a5493d-a54963 call a55798 CreateFileW 942->945 948 a54965 945->948 949 a5496a-a5497a 945->949 950 a54ab5-a54ab9 948->950 956 a54981-a5499b VirtualAlloc 949->956 957 a5497c 949->957 951 a54afb-a54afe 950->951 952 a54abb-a54abf 950->952 958 a54b01-a54b08 951->958 954 a54ac1-a54ac4 952->954 955 a54acb-a54acf 952->955 954->955 961 a54ad1-a54adb 955->961 962 a54adf-a54ae3 955->962 963 a549a2-a549b9 ReadFile 956->963 964 a5499d 956->964 957->950 959 a54b5d-a54b72 958->959 960 a54b0a-a54b15 958->960 967 a54b74-a54b7f VirtualFree 959->967 968 a54b82-a54b8a 959->968 965 a54b17 960->965 966 a54b19-a54b25 960->966 961->962 969 a54ae5-a54aef 962->969 970 a54af3 962->970 971 a549c0-a54a00 VirtualAlloc 963->971 972 a549bb 963->972 964->950 965->959 975 a54b27-a54b37 966->975 976 a54b39-a54b45 966->976 967->968 969->970 970->951 973 a54a07-a54a22 call a559e8 971->973 974 a54a02 971->974 972->950 982 a54a2d-a54a37 973->982 974->950 978 a54b5b 975->978 979 a54b47-a54b50 976->979 980 a54b52-a54b58 976->980 978->958 979->978 980->978 983 a54a39-a54a68 call a559e8 982->983 984 a54a6a-a54a7e call a557f8 982->984 983->982 990 a54a80 984->990 991 a54a82-a54a86 984->991 990->950 992 a54a92-a54a96 991->992 993 a54a88-a54a8c CloseHandle 991->993 994 a54aa6-a54aaf 992->994 995 a54a98-a54aa3 VirtualFree 992->995 993->992 994->945 994->950 995->994
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00A54959
                                                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00A54B7F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2127804313.0000000000A52000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A52000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_a52000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFileFreeVirtual
                                                                                • String ID:
                                                                                • API String ID: 204039940-0
                                                                                • Opcode ID: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                                                                                • Instruction ID: 89e65e86caebeb56a69bfc7facfa3f43987d30aa60daca4432fea54ff327ee3c
                                                                                • Opcode Fuzzy Hash: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                                                                                • Instruction Fuzzy Hash: D8A12974E00209EBDB14CFA4C899BEEB7B5FF48309F208159EA15BB280D7759A84CF54

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1073 f89ae6-f89af2 call f83187 call f89d3c 1078 f89afc-f89b0f call f89d8a 1073->1078 1079 f89af4-f89afb call f89b5c 1073->1079 1078->1079 1084 f89b11-f89b19 call f887d5 1078->1084 1086 f89b1e-f89b24 1084->1086 1087 f89b53-f89b5b call f89b5c 1086->1087 1088 f89b26-f89b36 call f89de6 1086->1088 1088->1087 1093 f89b38-f89b52 call f89a33 GetCurrentThreadId 1088->1093
                                                                                APIs
                                                                                • __init_pointers.LIBCMT ref: 00F89AE6
                                                                                  • Part of subcall function 00F83187: EncodePointer.KERNEL32(00000000), ref: 00F8318A
                                                                                  • Part of subcall function 00F83187: __initp_misc_winsig.LIBCMT ref: 00F831A5
                                                                                  • Part of subcall function 00F83187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00F89EA0
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00F89EB4
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00F89EC7
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00F89EDA
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00F89EED
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00F89F00
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00F89F13
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00F89F26
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00F89F39
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00F89F4C
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00F89F5F
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00F89F72
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00F89F85
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00F89F98
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00F89FAB
                                                                                  • Part of subcall function 00F83187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00F89FBE
                                                                                • __mtinitlocks.LIBCMT ref: 00F89AEB
                                                                                • __mtterm.LIBCMT ref: 00F89AF4
                                                                                  • Part of subcall function 00F89B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00F89AF9,00F87CD0,0101A0B8,00000014), ref: 00F89C56
                                                                                  • Part of subcall function 00F89B5C: _free.LIBCMT ref: 00F89C5D
                                                                                  • Part of subcall function 00F89B5C: DeleteCriticalSection.KERNEL32(0101EC00,?,?,00F89AF9,00F87CD0,0101A0B8,00000014), ref: 00F89C7F
                                                                                • __calloc_crt.LIBCMT ref: 00F89B19
                                                                                • __initptd.LIBCMT ref: 00F89B3B
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00F89B42
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                                • String ID:
                                                                                • API String ID: 3567560977-0
                                                                                • Opcode ID: bfbcb9045137e25bef48846493411608a9750ae4924f70c6db7b8a8c6a192a39
                                                                                • Instruction ID: 4198221d6dea5e839c69b5fbd1736a8a5e44da1f509e6b2459cccad396812985
                                                                                • Opcode Fuzzy Hash: bfbcb9045137e25bef48846493411608a9750ae4924f70c6db7b8a8c6a192a39
                                                                                • Instruction Fuzzy Hash: 6BF0F032A0D7111AE6387674BC036EA36909F42730F280A1DF4A0D60C2FFEC890173A4

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1096 f639d5-f63a45 CreateWindowExW * 2 ShowWindow * 2
                                                                                APIs
                                                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F63A03
                                                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F63A24
                                                                                • ShowWindow.USER32(00000000,?,?), ref: 00F63A38
                                                                                • ShowWindow.USER32(00000000,?,?), ref: 00F63A41
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$CreateShow
                                                                                • String ID: AutoIt v3$edit
                                                                                • API String ID: 1584632944-3779509399
                                                                                • Opcode ID: c0f5cdc1827c88073f0b03329ed3317d7633e23fe834efd9321b14fadad6eaa9
                                                                                • Instruction ID: 9be44e37f4c45a8037a1c167b9fbb3f98302880c6d72e1d8bf1af2d9afd79d1a
                                                                                • Opcode Fuzzy Hash: c0f5cdc1827c88073f0b03329ed3317d7633e23fe834efd9321b14fadad6eaa9
                                                                                • Instruction Fuzzy Hash: E2F05E705002947EEA305B236C4CEBB3E7DD7CBF60F20002EF940A61A4C27A0848DBB4

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1097 a54678-a5477c call a522c8 call a54568 CreateFileW 1104 a54783-a54793 1097->1104 1105 a5477e 1097->1105 1108 a54795 1104->1108 1109 a5479a-a547b4 VirtualAlloc 1104->1109 1106 a54833-a54838 1105->1106 1108->1106 1110 a547b6 1109->1110 1111 a547b8-a547cf ReadFile 1109->1111 1110->1106 1112 a547d1 1111->1112 1113 a547d3-a5480d call a545a8 call a53568 1111->1113 1112->1106 1118 a5480f-a54824 call a545f8 1113->1118 1119 a54829-a54831 ExitProcess 1113->1119 1118->1119 1119->1106
                                                                                APIs
                                                                                  • Part of subcall function 00A54568: Sleep.KERNELBASE(000001F4), ref: 00A54579
                                                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00A54772
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2127804313.0000000000A52000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A52000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_a52000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFileSleep
                                                                                • String ID: 920XTVFUEFKBC
                                                                                • API String ID: 2694422964-1299527702
                                                                                • Opcode ID: 7272ba572cf1e65cc459029f075973c90e64722f9818aeb22f4ea7787fafc81e
                                                                                • Instruction ID: 78de45583d1ae3998546f80231674827aa2f8c9270ce73013dc171049384c7c5
                                                                                • Opcode Fuzzy Hash: 7272ba572cf1e65cc459029f075973c90e64722f9818aeb22f4ea7787fafc81e
                                                                                • Instruction Fuzzy Hash: 47517071D04249EBEF10DBE4D905BEEBBB4AF59305F104199EA08BB2C0D7791B48CB65

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1121 f6407c-f64092 1122 f6416f-f64173 1121->1122 1123 f64098-f640ad call f67a16 1121->1123 1126 f9d3c8-f9d3d7 LoadStringW 1123->1126 1127 f640b3-f640d3 call f67bcc 1123->1127 1130 f9d3e2-f9d3fa call f67b2e call f66fe3 1126->1130 1127->1130 1131 f640d9-f640dd 1127->1131 1139 f640ed-f6416a call f82de0 call f6454e call f82dbc Shell_NotifyIconW call f65904 1130->1139 1143 f9d400-f9d41e call f67cab call f66fe3 call f67cab 1130->1143 1133 f64174-f6417d call f68047 1131->1133 1134 f640e3-f640e8 call f67b2e 1131->1134 1133->1139 1134->1139 1139->1122 1143->1139
                                                                                APIs
                                                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00F9D3D7
                                                                                  • Part of subcall function 00F67BCC: _memmove.LIBCMT ref: 00F67C06
                                                                                • _memset.LIBCMT ref: 00F640FC
                                                                                • _wcscpy.LIBCMT ref: 00F64150
                                                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F64160
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                                                • String ID: Line:
                                                                                • API String ID: 3942752672-1585850449
                                                                                • Opcode ID: 201c7010ef8dd5c38bb38076f66ca816afc3622fc2a252b79aea4df09dbcb65a
                                                                                • Instruction ID: ebc4e6ed3bac6f8ea322f15e46fa6bc94c78b87f7817847a09105884cbea6c1b
                                                                                • Opcode Fuzzy Hash: 201c7010ef8dd5c38bb38076f66ca816afc3622fc2a252b79aea4df09dbcb65a
                                                                                • Instruction Fuzzy Hash: E8319E72408304ABD731FF60DC46FEB77E8AF85314F20491EF58596091EB78A648EB96
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                                • String ID:
                                                                                • API String ID: 1559183368-0
                                                                                • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                                                • Instruction ID: 37cfa763e1181f3756c58f4626396fbc813a117a9674f531c6e556fd0f81dc7e
                                                                                • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                                                • Instruction Fuzzy Hash: 3051C971E00B05DBDF24EFA9DC506EE77A2AF40B35F288729F8259A2D0D7749D50AB40
                                                                                APIs
                                                                                  • Part of subcall function 00F64DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,010252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F64E0F
                                                                                • _free.LIBCMT ref: 00F9E263
                                                                                • _free.LIBCMT ref: 00F9E2AA
                                                                                  • Part of subcall function 00F66A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F66BAD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _free$CurrentDirectoryLibraryLoad
                                                                                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                                • API String ID: 2861923089-1757145024
                                                                                • Opcode ID: 6683efb6ba64e5530fa7f25013dccea6df8bf58135ed7cb0faf9aad05c45d9e9
                                                                                • Instruction ID: 46d5489d3b458b40177c7001903bfd5481074248331c688474160b5f4b0c3918
                                                                                • Opcode Fuzzy Hash: 6683efb6ba64e5530fa7f25013dccea6df8bf58135ed7cb0faf9aad05c45d9e9
                                                                                • Instruction Fuzzy Hash: DC918D71D04219AFDF04EFA4CC819EDB7B8FF18314F14442AF816AB2A1DB79A945EB50
                                                                                APIs
                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00F635A1,SwapMouseButtons,00000004,?), ref: 00F635D4
                                                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00F635A1,SwapMouseButtons,00000004,?,?,?,?,00F62754), ref: 00F635F5
                                                                                • RegCloseKey.KERNELBASE(00000000,?,?,00F635A1,SwapMouseButtons,00000004,?,?,?,?,00F62754), ref: 00F63617
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpenQueryValue
                                                                                • String ID: Control Panel\Mouse
                                                                                • API String ID: 3677997916-824357125
                                                                                • Opcode ID: 20d6fa1d37e4c79284203e80a55ab1c0912927aaa92b4e1ef5582aecda95b440
                                                                                • Instruction ID: 0dbd506240f202d7fbdd1caf4e7cce948743a394de1605321bb7ca42b8acf614
                                                                                • Opcode Fuzzy Hash: 20d6fa1d37e4c79284203e80a55ab1c0912927aaa92b4e1ef5582aecda95b440
                                                                                • Instruction Fuzzy Hash: 70115A71910218BFDB20CF64DC80EAEBBB8EF44750F004469F905DB210D2729F44A760
                                                                                APIs
                                                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 00A53D95
                                                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00A53DB9
                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00A53DDB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2127804313.0000000000A52000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A52000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_a52000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                • String ID:
                                                                                • API String ID: 2438371351-0
                                                                                • Opcode ID: fc310a6135c3389c0587bc6629e9838c2c50d5be0bfc8bfa2df8a04cac11b1e3
                                                                                • Instruction ID: d982588b8f3d177d89c6773ece75875cb3bc3de88a398753549d6b546ea5ab71
                                                                                • Opcode Fuzzy Hash: fc310a6135c3389c0587bc6629e9838c2c50d5be0bfc8bfa2df8a04cac11b1e3
                                                                                • Instruction Fuzzy Hash: 99621C30A14618DBEB24CBA4C841BDEB372FF58301F1091A9D60DEB390E7799E85CB59
                                                                                APIs
                                                                                  • Part of subcall function 00F64EE5: _fseek.LIBCMT ref: 00F64EFD
                                                                                  • Part of subcall function 00FC9734: _wcscmp.LIBCMT ref: 00FC9824
                                                                                  • Part of subcall function 00FC9734: _wcscmp.LIBCMT ref: 00FC9837
                                                                                • _free.LIBCMT ref: 00FC96A2
                                                                                • _free.LIBCMT ref: 00FC96A9
                                                                                • _free.LIBCMT ref: 00FC9714
                                                                                  • Part of subcall function 00F82D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00F89A24), ref: 00F82D69
                                                                                  • Part of subcall function 00F82D55: GetLastError.KERNEL32(00000000,?,00F89A24), ref: 00F82D7B
                                                                                • _free.LIBCMT ref: 00FC971C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                                • String ID:
                                                                                • API String ID: 1552873950-0
                                                                                • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                                                • Instruction ID: b9fd0f5dba69a9da68580abe53b262a02df5b784dae55be7c76092abdc2297cd
                                                                                • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                                                • Instruction Fuzzy Hash: FF514CB1D04259AFDF24AF64CC85BAEBBB9EF48300F10449EF609A3251DB755A80DF58
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                • String ID:
                                                                                • API String ID: 2782032738-0
                                                                                • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                                                • Instruction ID: 6676847cd519ed5128f3f054c7bda685a615494b94dc27dbcba939994caf640f
                                                                                • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                                                • Instruction Fuzzy Hash: 9841B375E007479BDB18AF69CC809EE77A6EF41364B24853DE815C7680EB74FD41AB40
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00F9EA39
                                                                                • GetOpenFileNameW.COMDLG32(?), ref: 00F9EA83
                                                                                  • Part of subcall function 00F64750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F64743,?,?,00F637AE,?), ref: 00F64770
                                                                                  • Part of subcall function 00F80791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F807B0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Name$Path$FileFullLongOpen_memset
                                                                                • String ID: X
                                                                                • API String ID: 3777226403-3081909835
                                                                                • Opcode ID: 40872e173f8d9b1fafbe2ee3ea778db85655b01bcabc4780aec54a3a9fdf14b9
                                                                                • Instruction ID: 61bd3071ffdf73042dd9eba2d41dac5dccbe5f4f2c49568c4e9f8c40956244b8
                                                                                • Opcode Fuzzy Hash: 40872e173f8d9b1fafbe2ee3ea778db85655b01bcabc4780aec54a3a9fdf14b9
                                                                                • Instruction Fuzzy Hash: A621D831A002589BDF51EF94CC45BEE7BF8AF49314F00801AE548E7241DBBC5949EFA1
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __fread_nolock_memmove
                                                                                • String ID: EA06
                                                                                • API String ID: 1988441806-3962188686
                                                                                • Opcode ID: fb585f3e2e4651c29f4c1d2b90fe615dd35e6006829e1efa8f1bfd9a6c968370
                                                                                • Instruction ID: fc7bb742e3f4566ed735c73709e2907bb7661b872b9cf44f8105d8bcd64abefb
                                                                                • Opcode Fuzzy Hash: fb585f3e2e4651c29f4c1d2b90fe615dd35e6006829e1efa8f1bfd9a6c968370
                                                                                • Instruction Fuzzy Hash: 9901D672C042186EDB18DAA8CC16EEA7BF89B11711F00419EF552D6181E878A6089760
                                                                                APIs
                                                                                • GetTempPathW.KERNEL32(00000104,?), ref: 00FC98F8
                                                                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00FC990F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Temp$FileNamePath
                                                                                • String ID: aut
                                                                                • API String ID: 3285503233-3010740371
                                                                                • Opcode ID: 0801c12151550e1eae95e4528cdfcdc08db4084aa860ea4b1f2d18f28798da8f
                                                                                • Instruction ID: 0a1b2dbe0e9039549f232e5bc3f2165f232efa4c960526080e547bf4f97c5321
                                                                                • Opcode Fuzzy Hash: 0801c12151550e1eae95e4528cdfcdc08db4084aa860ea4b1f2d18f28798da8f
                                                                                • Instruction Fuzzy Hash: B9D05E7954030DABDB509BA4EC8EF9A773CE704700F0042B1BF94990A1EAB096989B91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 04626581017b159a95f415b42adaefc7d144c90bd9b538ee4f6006dd963e41b4
                                                                                • Instruction ID: 302ebf08723207bca5cad4a984d4a3f02c474bc8acfe3c53c557d60a690483fe
                                                                                • Opcode Fuzzy Hash: 04626581017b159a95f415b42adaefc7d144c90bd9b538ee4f6006dd963e41b4
                                                                                • Instruction Fuzzy Hash: C1F14E71A083019FC714DF28C880A6ABBE6FF88314F54892EF8999B351D774E945DF92
                                                                                APIs
                                                                                  • Part of subcall function 00F80162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F80193
                                                                                  • Part of subcall function 00F80162: MapVirtualKeyW.USER32(00000010,00000000), ref: 00F8019B
                                                                                  • Part of subcall function 00F80162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F801A6
                                                                                  • Part of subcall function 00F80162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F801B1
                                                                                  • Part of subcall function 00F80162: MapVirtualKeyW.USER32(00000011,00000000), ref: 00F801B9
                                                                                  • Part of subcall function 00F80162: MapVirtualKeyW.USER32(00000012,00000000), ref: 00F801C1
                                                                                  • Part of subcall function 00F760F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00F6F930), ref: 00F76154
                                                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F6F9CD
                                                                                • OleInitialize.OLE32(00000000), ref: 00F6FA4A
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00FA45C8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                • String ID:
                                                                                • API String ID: 1986988660-0
                                                                                • Opcode ID: 4ab28ecd69d108d0f301acb61218f281b65f168bb05778bb74c2852e0e0d837c
                                                                                • Instruction ID: aaac6838919390fecbc3de17067a1c282b2db3b667e905c19a70c4d1ddc688d2
                                                                                • Opcode Fuzzy Hash: 4ab28ecd69d108d0f301acb61218f281b65f168bb05778bb74c2852e0e0d837c
                                                                                • Instruction Fuzzy Hash: C681C0B0A01640CFC3B4DF39FC556E9BBE5FB5831A7B0812AD098CB259EB7A45049F19
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00F64370
                                                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F64415
                                                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F64432
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: IconNotifyShell_$_memset
                                                                                • String ID:
                                                                                • API String ID: 1505330794-0
                                                                                • Opcode ID: d5d8a96ddabb2df8c723e3fb29125a143d01991b891aceaeba789e29b4a7e48d
                                                                                • Instruction ID: f612bbb1be36096142ae6a0ca7fecfe8df3122ebcbbefd5ab0f15e3c5b47aeb4
                                                                                • Opcode Fuzzy Hash: d5d8a96ddabb2df8c723e3fb29125a143d01991b891aceaeba789e29b4a7e48d
                                                                                • Instruction Fuzzy Hash: 0E31B1709043018FC731EF24D88569BBBF8FB4A319F10092EF5CA86281D775B948DB56
                                                                                APIs
                                                                                • __FF_MSGBANNER.LIBCMT ref: 00F85733
                                                                                  • Part of subcall function 00F8A16B: __NMSG_WRITE.LIBCMT ref: 00F8A192
                                                                                  • Part of subcall function 00F8A16B: __NMSG_WRITE.LIBCMT ref: 00F8A19C
                                                                                • __NMSG_WRITE.LIBCMT ref: 00F8573A
                                                                                  • Part of subcall function 00F8A1C8: GetModuleFileNameW.KERNEL32(00000000,010233BA,00000104,?,00000001,00000000), ref: 00F8A25A
                                                                                  • Part of subcall function 00F8A1C8: ___crtMessageBoxW.LIBCMT ref: 00F8A308
                                                                                  • Part of subcall function 00F8309F: ___crtCorExitProcess.LIBCMT ref: 00F830A5
                                                                                  • Part of subcall function 00F8309F: ExitProcess.KERNEL32 ref: 00F830AE
                                                                                  • Part of subcall function 00F88B28: __getptd_noexit.LIBCMT ref: 00F88B28
                                                                                • RtlAllocateHeap.NTDLL(00A10000,00000000,00000001,00000000,?,?,?,00F80DD3,?), ref: 00F8575F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                                • String ID:
                                                                                • API String ID: 1372826849-0
                                                                                • Opcode ID: a6d2679e422af7a791473ae6ba8225406777ae983bbaf51396788622647f16d4
                                                                                • Instruction ID: 2ff908f70117c009994688737366e19a14ec196e1a8db5375a2ff340ec1457bd
                                                                                • Opcode Fuzzy Hash: a6d2679e422af7a791473ae6ba8225406777ae983bbaf51396788622647f16d4
                                                                                • Instruction Fuzzy Hash: 4301F532700B0ADBE6253B34EC86BEE77489B82B71F604426F5059A1C1DF7C8C017760
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00FC9548,?,?,?,?,?,00000004), ref: 00FC98BB
                                                                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00FC9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00FC98D1
                                                                                • CloseHandle.KERNEL32(00000000,?,00FC9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00FC98D8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: File$CloseCreateHandleTime
                                                                                • String ID:
                                                                                • API String ID: 3397143404-0
                                                                                • Opcode ID: 2007830b81814273105d2aee5706d60a6a22e515b078f7416ffcdd024b28a242
                                                                                • Instruction ID: 746d2ee9ab25e03934a92b9050d0dab57c2c644f76a40fe3c7912c693fec87ea
                                                                                • Opcode Fuzzy Hash: 2007830b81814273105d2aee5706d60a6a22e515b078f7416ffcdd024b28a242
                                                                                • Instruction Fuzzy Hash: 21E0863214021CBBD7211B54EC4AFCA7B19AB06771F108120FB146D0E087B11515A798
                                                                                APIs
                                                                                • _free.LIBCMT ref: 00FC8D1B
                                                                                  • Part of subcall function 00F82D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00F89A24), ref: 00F82D69
                                                                                  • Part of subcall function 00F82D55: GetLastError.KERNEL32(00000000,?,00F89A24), ref: 00F82D7B
                                                                                • _free.LIBCMT ref: 00FC8D2C
                                                                                • _free.LIBCMT ref: 00FC8D3E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                                                • Instruction ID: be8f945e11dd4dd112e498499f27beb35fd1b5d4158a0781c08625bf0f3b60ab
                                                                                • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                                                • Instruction Fuzzy Hash: DEE012B2A01A0246CB64B578AF41FD367EC4F983A2714091DB80ED7186CE68FC43A324
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: CALL
                                                                                • API String ID: 0-4196123274
                                                                                • Opcode ID: d14f30717c50dadeaecba8426d28294c28609ae47b707cfbbdb38d5ef4b00ef3
                                                                                • Instruction ID: b3e345d7ac834286c8e0e9d475309646c8b50ab1dd43556dc4d698ec6b1f245f
                                                                                • Opcode Fuzzy Hash: d14f30717c50dadeaecba8426d28294c28609ae47b707cfbbdb38d5ef4b00ef3
                                                                                • Instruction Fuzzy Hash: BF225871908201DFDB24DF14C890B6AB7E1BF85314F14896DE89A9B362DB35EC45EF82
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove
                                                                                • String ID: EA06
                                                                                • API String ID: 4104443479-3962188686
                                                                                • Opcode ID: d1735b6dddc4e51503a32362550396db12d980d282d0f4ced3cd9af406ea4138
                                                                                • Instruction ID: d9fb62987d52d5bdc19ebe8ee22ca43993676397244de8c0985b01cea8947d63
                                                                                • Opcode Fuzzy Hash: d1735b6dddc4e51503a32362550396db12d980d282d0f4ced3cd9af406ea4138
                                                                                • Instruction Fuzzy Hash: 49414A22E041585BDF22BB64CC617BF7FB29B46310F684475ED82EB282D624BD44B7A1
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove
                                                                                • String ID:
                                                                                • API String ID: 4104443479-0
                                                                                • Opcode ID: 40fbce4a1fea4cfe3bf1a015a5a2827c9472d34ae18aa590b79f6fb0e3b65f37
                                                                                • Instruction ID: 51ec83a8476c30a6869ff50fbba194d7d1cfd4c3adb08251e6837ea439f3f320
                                                                                • Opcode Fuzzy Hash: 40fbce4a1fea4cfe3bf1a015a5a2827c9472d34ae18aa590b79f6fb0e3b65f37
                                                                                • Instruction Fuzzy Hash: BF31C8B2604606AFC704EF68C8D1E69F3A9FF483247558629E519CB3A1EF34ED50DB90
                                                                                APIs
                                                                                • IsThemeActive.UXTHEME ref: 00F64834
                                                                                  • Part of subcall function 00F8336C: __lock.LIBCMT ref: 00F83372
                                                                                  • Part of subcall function 00F8336C: DecodePointer.KERNEL32(00000001,?,00F64849,00FB7C74), ref: 00F8337E
                                                                                  • Part of subcall function 00F8336C: EncodePointer.KERNEL32(?,?,00F64849,00FB7C74), ref: 00F83389
                                                                                  • Part of subcall function 00F648FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00F64915
                                                                                  • Part of subcall function 00F648FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F6492A
                                                                                  • Part of subcall function 00F63B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F63B68
                                                                                  • Part of subcall function 00F63B3A: IsDebuggerPresent.KERNEL32 ref: 00F63B7A
                                                                                  • Part of subcall function 00F63B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,010252F8,010252E0,?,?), ref: 00F63BEB
                                                                                  • Part of subcall function 00F63B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00F63C6F
                                                                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F64874
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                                • String ID:
                                                                                • API String ID: 1438897964-0
                                                                                • Opcode ID: 6978b7263db0cf134f521e66bfb4cbf92672e6e0b756f096f1286c0680237986
                                                                                • Instruction ID: 431897c67ed2c875263c2fa2a770a27ace5f07dbe6e6aa7e73e516c2338899e1
                                                                                • Opcode Fuzzy Hash: 6978b7263db0cf134f521e66bfb4cbf92672e6e0b756f096f1286c0680237986
                                                                                • Instruction Fuzzy Hash: A711CD718083419BD720EF38DC4594AFFE8EF8A750F20451EF480872A1DBBA9648DB82
                                                                                APIs
                                                                                  • Part of subcall function 00F8571C: __FF_MSGBANNER.LIBCMT ref: 00F85733
                                                                                  • Part of subcall function 00F8571C: __NMSG_WRITE.LIBCMT ref: 00F8573A
                                                                                  • Part of subcall function 00F8571C: RtlAllocateHeap.NTDLL(00A10000,00000000,00000001,00000000,?,?,?,00F80DD3,?), ref: 00F8575F
                                                                                • std::exception::exception.LIBCMT ref: 00F80DEC
                                                                                • __CxxThrowException@8.LIBCMT ref: 00F80E01
                                                                                  • Part of subcall function 00F8859B: RaiseException.KERNEL32(?,?,?,01019E78,00000000,?,?,?,?,00F80E06,?,01019E78,?,00000001), ref: 00F885F0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                                • String ID:
                                                                                • API String ID: 3902256705-0
                                                                                • Opcode ID: 68e38576d9c1d1c4da44858615c5a1f6865bc0cade5faf55a97f0f8a97f0a398
                                                                                • Instruction ID: d2cdb696f04c6fe1782b6141717b01f5d8ceb4e8017f7cb3d589f3356822974e
                                                                                • Opcode Fuzzy Hash: 68e38576d9c1d1c4da44858615c5a1f6865bc0cade5faf55a97f0f8a97f0a398
                                                                                • Instruction Fuzzy Hash: A8F0A43290021E66CB10BAA4EC159EF7BAC9F01361F504429FD0496252DF749A45B3D1
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __lock_file_memset
                                                                                • String ID:
                                                                                • API String ID: 26237723-0
                                                                                • Opcode ID: add2842a71459ea06e308586f7c52b8d23e7682f6e52e34aa1c719edcffea70f
                                                                                • Instruction ID: 21d46408dc3599c574c1b0a78a0926746b7b861e14612e074dcd6d8fd41363ef
                                                                                • Opcode Fuzzy Hash: add2842a71459ea06e308586f7c52b8d23e7682f6e52e34aa1c719edcffea70f
                                                                                • Instruction Fuzzy Hash: 8A01F772C00608EBCF12BF648C024DE7B61AF91B61F804115F8241B151EB398A12FF91
                                                                                APIs
                                                                                  • Part of subcall function 00F88B28: __getptd_noexit.LIBCMT ref: 00F88B28
                                                                                • __lock_file.LIBCMT ref: 00F853EB
                                                                                  • Part of subcall function 00F86C11: __lock.LIBCMT ref: 00F86C34
                                                                                • __fclose_nolock.LIBCMT ref: 00F853F6
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                • String ID:
                                                                                • API String ID: 2800547568-0
                                                                                • Opcode ID: dbd241f85698d517934aa7875007d6435ca81eaf3dbf78925151bd9d8b7d72cb
                                                                                • Instruction ID: 5ccb2796ddc123e0a2bc72df0641e29a55a7dbe494c2646666c6e5435cf20f82
                                                                                • Opcode Fuzzy Hash: dbd241f85698d517934aa7875007d6435ca81eaf3dbf78925151bd9d8b7d72cb
                                                                                • Instruction Fuzzy Hash: 38F09032901A049BDB21BBA59C027ED76A16F41BB5F608208E464AB1C1CBBC8A42BB51
                                                                                APIs
                                                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 00A53D95
                                                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00A53DB9
                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00A53DDB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2127804313.0000000000A52000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A52000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_a52000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                • String ID:
                                                                                • API String ID: 2438371351-0
                                                                                • Opcode ID: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                                                                                • Instruction ID: fc42d9d242fa4add8e5b22c1f1d0339b0dfcc0dd073dd639d4c9bf8b5ef95556
                                                                                • Opcode Fuzzy Hash: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                                                                                • Instruction Fuzzy Hash: FD12EE20E24658C6EB24DF64D8507DEB232FF68301F1090E9910DEB7A5E77A4F85CB5A
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ProtectVirtual
                                                                                • String ID:
                                                                                • API String ID: 544645111-0
                                                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                • Instruction ID: e681cf0d45a626d19e615b7da772b48558723f66e2a45f83329ac3abf2394c77
                                                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                • Instruction Fuzzy Hash: 9E310A71A001059FC798EF08C494AA9F7A5FF4A310BA48795E40ACB351DB31EDC5EBC0
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ClearVariant
                                                                                • String ID:
                                                                                • API String ID: 1473721057-0
                                                                                • Opcode ID: c90f4577c8898e00fbaf6bf2c0b69e8a2bda72eec36fdc35223db7bc1bec48c5
                                                                                • Instruction ID: 16e6adac37d891fdf9073096b87fee9d76c286b336409f43093b8e6ef3fccddf
                                                                                • Opcode Fuzzy Hash: c90f4577c8898e00fbaf6bf2c0b69e8a2bda72eec36fdc35223db7bc1bec48c5
                                                                                • Instruction Fuzzy Hash: 6B4107749083518FDB14DF14C454B1ABBE0BF45318F0988ACE89A9B362C736EC49EF52
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove
                                                                                • String ID:
                                                                                • API String ID: 4104443479-0
                                                                                • Opcode ID: 5265c999e6be0233acbf58096fe377cf776eda66a6dd257057687f239e338677
                                                                                • Instruction ID: 5760a714d769046cc4d9ff08c79ddeb220bdaa5f43905327faa9c7ed9ec6df9e
                                                                                • Opcode Fuzzy Hash: 5265c999e6be0233acbf58096fe377cf776eda66a6dd257057687f239e338677
                                                                                • Instruction Fuzzy Hash: B7213372A04B09EBEF249F21E8417AA7BB4FB54354F20842EF8C6C9094EB358090F745
                                                                                APIs
                                                                                  • Part of subcall function 00F64BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00F64BEF
                                                                                  • Part of subcall function 00F8525B: __wfsopen.LIBCMT ref: 00F85266
                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,010252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F64E0F
                                                                                  • Part of subcall function 00F64B6A: FreeLibrary.KERNEL32(00000000), ref: 00F64BA4
                                                                                  • Part of subcall function 00F64C70: _memmove.LIBCMT ref: 00F64CBA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Free$Load__wfsopen_memmove
                                                                                • String ID:
                                                                                • API String ID: 1396898556-0
                                                                                • Opcode ID: c042ad3894119be06094197559ca1556ae0fcc038c93664b5c9a80e245ef29dc
                                                                                • Instruction ID: 6956fba66b6474ddb8e3ef06a38631f30c59566b8b0740ede98b2574eb811d99
                                                                                • Opcode Fuzzy Hash: c042ad3894119be06094197559ca1556ae0fcc038c93664b5c9a80e245ef29dc
                                                                                • Instruction Fuzzy Hash: F911E332600206ABCF11FF70CC16FAD77A8AF94B10F108829F541AB181DE7AAA04BB51
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ClearVariant
                                                                                • String ID:
                                                                                • API String ID: 1473721057-0
                                                                                • Opcode ID: ef49cd0ab55a861362a4b885af95a80ed00b98af74067d21ed1623fa8204971d
                                                                                • Instruction ID: dfa1c5cb2177a9f9bbba44b43e9bd7a31510b90c8f51ef33f6a957f378948821
                                                                                • Opcode Fuzzy Hash: ef49cd0ab55a861362a4b885af95a80ed00b98af74067d21ed1623fa8204971d
                                                                                • Instruction Fuzzy Hash: 4A21F3B4908341DFDB14DF64C844B5ABBE1BF88314F058968F88A97762D735E809EF92
                                                                                APIs
                                                                                • __lock_file.LIBCMT ref: 00F848A6
                                                                                  • Part of subcall function 00F88B28: __getptd_noexit.LIBCMT ref: 00F88B28
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __getptd_noexit__lock_file
                                                                                • String ID:
                                                                                • API String ID: 2597487223-0
                                                                                • Opcode ID: 9db6ce3fdc75b4c1832a7f7ff656d18f015617aecd20b0c13da98ea00d70827d
                                                                                • Instruction ID: bc24b80dc622d8a3506ef0e2fc27bf36188cc965a12c8bd186f38dd795d7204c
                                                                                • Opcode Fuzzy Hash: 9db6ce3fdc75b4c1832a7f7ff656d18f015617aecd20b0c13da98ea00d70827d
                                                                                • Instruction Fuzzy Hash: ECF0AF3190160AABDF11BFA48C0A7EE3AA1AF01366F558418F4249A192CB7C9952FF51
                                                                                APIs
                                                                                • FreeLibrary.KERNEL32(?,?,010252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F64E7E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 389db7317c6b37adc14d822d19ddf03405f0ab71c730b4f1822437f85bbdc1dd
                                                                                • Instruction ID: 675a0bd0dec3cadc3ee822a8ba1eafa2e1c8249186c3f174316bcbc8190043e2
                                                                                • Opcode Fuzzy Hash: 389db7317c6b37adc14d822d19ddf03405f0ab71c730b4f1822437f85bbdc1dd
                                                                                • Instruction Fuzzy Hash: EAF01571901B11CFCB34AF64E894812BBE1BF243393208A3EE1D682620C733A844FB40
                                                                                APIs
                                                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F807B0
                                                                                  • Part of subcall function 00F67BCC: _memmove.LIBCMT ref: 00F67C06
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: LongNamePath_memmove
                                                                                • String ID:
                                                                                • API String ID: 2514874351-0
                                                                                • Opcode ID: b07f8461bf6b1a0e4f83261106a10ac1504f0500bb2326b87456fa07e665e885
                                                                                • Instruction ID: d888c586527d5800d8b6d56697feb5f53192a0958815d64796be4a5e5979b13e
                                                                                • Opcode Fuzzy Hash: b07f8461bf6b1a0e4f83261106a10ac1504f0500bb2326b87456fa07e665e885
                                                                                • Instruction Fuzzy Hash: B6E0CD3690422857C720E6589C05FFA77EDDFC87A0F0441B5FD0CD7248D9649C9096D0
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __fread_nolock
                                                                                • String ID:
                                                                                • API String ID: 2638373210-0
                                                                                • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                                                • Instruction ID: a15444569117135ded545bec3a98b89f7f738628d13b9484181d080b097a23d6
                                                                                • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                                                • Instruction Fuzzy Hash: 16E092B0504B005BDB388A24D801BE373E1AB05314F04081DF2AA83241EB627842D759
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __wfsopen
                                                                                • String ID:
                                                                                • API String ID: 197181222-0
                                                                                • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                • Instruction ID: 1df90fbf29b9b0b20436c987d747ec8927e93939c1f21599c52da11563c90ade
                                                                                • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                • Instruction Fuzzy Hash: F6B0927644020C77CE012A82EC02A893B199B42B64F408020FB0C18162AA77A664AA89
                                                                                APIs
                                                                                • Sleep.KERNELBASE(000001F4), ref: 00A54579
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2127804313.0000000000A52000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A52000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_a52000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Sleep
                                                                                • String ID:
                                                                                • API String ID: 3472027048-0
                                                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                • Instruction ID: 91eb9a5e3b251a3e3b1f0f5284dc885c5c1fb1bfb9b33a080777426fe0889df3
                                                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                • Instruction Fuzzy Hash: 70E0E67494420DDFDB00DFB4D54969D7BB4FF04302F100161FD05D2280D6309E50DA62
                                                                                APIs
                                                                                  • Part of subcall function 00F62612: GetWindowLongW.USER32(?,000000EB), ref: 00F62623
                                                                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00FECB37
                                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00FECB95
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00FECBD6
                                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00FECC00
                                                                                • SendMessageW.USER32 ref: 00FECC29
                                                                                • _wcsncpy.LIBCMT ref: 00FECC95
                                                                                • GetKeyState.USER32(00000011), ref: 00FECCB6
                                                                                • GetKeyState.USER32(00000009), ref: 00FECCC3
                                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00FECCD9
                                                                                • GetKeyState.USER32(00000010), ref: 00FECCE3
                                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00FECD0C
                                                                                • SendMessageW.USER32 ref: 00FECD33
                                                                                • SendMessageW.USER32(?,00001030,?,00FEB348), ref: 00FECE37
                                                                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00FECE4D
                                                                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00FECE60
                                                                                • SetCapture.USER32(?), ref: 00FECE69
                                                                                • ClientToScreen.USER32(?,?), ref: 00FECECE
                                                                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00FECEDB
                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00FECEF5
                                                                                • ReleaseCapture.USER32 ref: 00FECF00
                                                                                • GetCursorPos.USER32(?), ref: 00FECF3A
                                                                                • ScreenToClient.USER32(?,?), ref: 00FECF47
                                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00FECFA3
                                                                                • SendMessageW.USER32 ref: 00FECFD1
                                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00FED00E
                                                                                • SendMessageW.USER32 ref: 00FED03D
                                                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00FED05E
                                                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00FED06D
                                                                                • GetCursorPos.USER32(?), ref: 00FED08D
                                                                                • ScreenToClient.USER32(?,?), ref: 00FED09A
                                                                                • GetParent.USER32(?), ref: 00FED0BA
                                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00FED123
                                                                                • SendMessageW.USER32 ref: 00FED154
                                                                                • ClientToScreen.USER32(?,?), ref: 00FED1B2
                                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00FED1E2
                                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00FED20C
                                                                                • SendMessageW.USER32 ref: 00FED22F
                                                                                • ClientToScreen.USER32(?,?), ref: 00FED281
                                                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00FED2B5
                                                                                  • Part of subcall function 00F625DB: GetWindowLongW.USER32(?,000000EB), ref: 00F625EC
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00FED351
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                                • String ID: @GUI_DRAGID$F
                                                                                • API String ID: 3977979337-4164748364
                                                                                • Opcode ID: 9a695bd2729ba7fd9b1a08f0ad9893cd394d7985cee5740c76815d43f491aee9
                                                                                • Instruction ID: 6e47fc8a06c01088f18ec71aaf1c804736f4c77bb73a834b34fd95e376d6c2af
                                                                                • Opcode Fuzzy Hash: 9a695bd2729ba7fd9b1a08f0ad9893cd394d7985cee5740c76815d43f491aee9
                                                                                • Instruction Fuzzy Hash: 2242BE346042C0AFD724CF2ACC85BAABBE5FF89320F140519F695DB2A0C771D945EB92
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove$_memset
                                                                                • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                                                                • API String ID: 1357608183-1798697756
                                                                                • Opcode ID: 72b30a8847636631621288936281cf404454f8873082ee1ead52c7cc06223e1e
                                                                                • Instruction ID: 86ec24079a787ef26c2454e9f22f0a4fbd7319319bd8f1f0a4baf3acd59433b0
                                                                                • Opcode Fuzzy Hash: 72b30a8847636631621288936281cf404454f8873082ee1ead52c7cc06223e1e
                                                                                • Instruction Fuzzy Hash: 0293B375E40215DBDB24DF99C881BEDB7B1FF48320F24816AE949AB281E7749D81EF40
                                                                                APIs
                                                                                • GetForegroundWindow.USER32(00000000,?), ref: 00F648DF
                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F9D665
                                                                                • IsIconic.USER32(?), ref: 00F9D66E
                                                                                • ShowWindow.USER32(?,00000009), ref: 00F9D67B
                                                                                • SetForegroundWindow.USER32(?), ref: 00F9D685
                                                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F9D69B
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00F9D6A2
                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F9D6AE
                                                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F9D6BF
                                                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F9D6C7
                                                                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 00F9D6CF
                                                                                • SetForegroundWindow.USER32(?), ref: 00F9D6D2
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F9D6E7
                                                                                • keybd_event.USER32(00000012,00000000), ref: 00F9D6F2
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F9D6FC
                                                                                • keybd_event.USER32(00000012,00000000), ref: 00F9D701
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F9D70A
                                                                                • keybd_event.USER32(00000012,00000000), ref: 00F9D70F
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F9D719
                                                                                • keybd_event.USER32(00000012,00000000), ref: 00F9D71E
                                                                                • SetForegroundWindow.USER32(?), ref: 00F9D721
                                                                                • AttachThreadInput.USER32(?,?,00000000), ref: 00F9D748
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                • String ID: Shell_TrayWnd
                                                                                • API String ID: 4125248594-2988720461
                                                                                • Opcode ID: 9335987c88ae100493d72fbf94da0bf7dcbe8d10115a1b3c5ddf8e1e2de6c334
                                                                                • Instruction ID: c72d12188103902e03062b5fcab0ed50331af52f3511769a2a20560a0a1d3552
                                                                                • Opcode Fuzzy Hash: 9335987c88ae100493d72fbf94da0bf7dcbe8d10115a1b3c5ddf8e1e2de6c334
                                                                                • Instruction Fuzzy Hash: 6B317271A4035CBBFF206BA19C89F7F7E6CEB44B60F204025FA04EA1D1C6B15900BAA1
                                                                                APIs
                                                                                  • Part of subcall function 00FB87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FB882B
                                                                                  • Part of subcall function 00FB87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FB8858
                                                                                  • Part of subcall function 00FB87E1: GetLastError.KERNEL32 ref: 00FB8865
                                                                                • _memset.LIBCMT ref: 00FB8353
                                                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00FB83A5
                                                                                • CloseHandle.KERNEL32(?), ref: 00FB83B6
                                                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00FB83CD
                                                                                • GetProcessWindowStation.USER32 ref: 00FB83E6
                                                                                • SetProcessWindowStation.USER32(00000000), ref: 00FB83F0
                                                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00FB840A
                                                                                  • Part of subcall function 00FB81CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FB8309), ref: 00FB81E0
                                                                                  • Part of subcall function 00FB81CB: CloseHandle.KERNEL32(?,?,00FB8309), ref: 00FB81F2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                                • String ID: $default$winsta0
                                                                                • API String ID: 2063423040-1027155976
                                                                                • Opcode ID: ffdce192610b7395ab220f88e50a1db0f5ed49f07ace4b8fe6aed56550ad6ea4
                                                                                • Instruction ID: 523b4027cac8d616e4dc27764374379d494293c554c3d693733a48fdddd2c14a
                                                                                • Opcode Fuzzy Hash: ffdce192610b7395ab220f88e50a1db0f5ed49f07ace4b8fe6aed56550ad6ea4
                                                                                • Instruction Fuzzy Hash: D8816971C00249AFDF219FA5CC85AEE7BBCEF443A4F184169F910A6161DB358E16EF20
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00FCC78D
                                                                                • FindClose.KERNEL32(00000000), ref: 00FCC7E1
                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FCC806
                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FCC81D
                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FCC844
                                                                                • __swprintf.LIBCMT ref: 00FCC890
                                                                                • __swprintf.LIBCMT ref: 00FCC8D3
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                • __swprintf.LIBCMT ref: 00FCC927
                                                                                  • Part of subcall function 00F83698: __woutput_l.LIBCMT ref: 00F836F1
                                                                                • __swprintf.LIBCMT ref: 00FCC975
                                                                                  • Part of subcall function 00F83698: __flsbuf.LIBCMT ref: 00F83713
                                                                                  • Part of subcall function 00F83698: __flsbuf.LIBCMT ref: 00F8372B
                                                                                • __swprintf.LIBCMT ref: 00FCC9C4
                                                                                • __swprintf.LIBCMT ref: 00FCCA13
                                                                                • __swprintf.LIBCMT ref: 00FCCA62
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                • API String ID: 3953360268-2428617273
                                                                                • Opcode ID: 4a1e527e5b943681be6d9e3eaca22f233fae1af42a98fb2e47ec75494820a908
                                                                                • Instruction ID: 7095d50d05e87b88bb1dba8412ca2065c90dd056e5b41d732a40060ddbbd0f9b
                                                                                • Opcode Fuzzy Hash: 4a1e527e5b943681be6d9e3eaca22f233fae1af42a98fb2e47ec75494820a908
                                                                                • Instruction Fuzzy Hash: 6FA11AB2408345ABC700EFA4CD96EAFB7ECEF94704F40091DF59586191EA79DA08DB62
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00FCEFB6
                                                                                • _wcscmp.LIBCMT ref: 00FCEFCB
                                                                                • _wcscmp.LIBCMT ref: 00FCEFE2
                                                                                • GetFileAttributesW.KERNEL32(?), ref: 00FCEFF4
                                                                                • SetFileAttributesW.KERNEL32(?,?), ref: 00FCF00E
                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00FCF026
                                                                                • FindClose.KERNEL32(00000000), ref: 00FCF031
                                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00FCF04D
                                                                                • _wcscmp.LIBCMT ref: 00FCF074
                                                                                • _wcscmp.LIBCMT ref: 00FCF08B
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FCF09D
                                                                                • SetCurrentDirectoryW.KERNEL32(01018920), ref: 00FCF0BB
                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FCF0C5
                                                                                • FindClose.KERNEL32(00000000), ref: 00FCF0D2
                                                                                • FindClose.KERNEL32(00000000), ref: 00FCF0E4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                                • String ID: *.*
                                                                                • API String ID: 1803514871-438819550
                                                                                • Opcode ID: ed52662a84042494f030c0572e2a6e010ebc25ae9d2a6e8178a820806adb6034
                                                                                • Instruction ID: 09dd293ab8f1ac14593f774f43d47b2ed54c3dbd50dc902ae2a80b2d2dc49f16
                                                                                • Opcode Fuzzy Hash: ed52662a84042494f030c0572e2a6e010ebc25ae9d2a6e8178a820806adb6034
                                                                                • Instruction Fuzzy Hash: 2331073294024E7ACB149BA0DC4AFDEB7AE9F44720F14417AE800D60A1DB74DA48EB51
                                                                                APIs
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FE0953
                                                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,00FEF910,00000000,?,00000000,?,?), ref: 00FE09C1
                                                                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00FE0A09
                                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00FE0A92
                                                                                • RegCloseKey.ADVAPI32(?), ref: 00FE0DB2
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00FE0DBF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Close$ConnectCreateRegistryValue
                                                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                • API String ID: 536824911-966354055
                                                                                • Opcode ID: d86972b7461a3f8856cd35919bd874d8870a782563e265562c87989b36fb90f4
                                                                                • Instruction ID: 51926ea151aef8b92bcfd904932a1b69f65417fc270a4e99e0c60f7761e6e770
                                                                                • Opcode Fuzzy Hash: d86972b7461a3f8856cd35919bd874d8870a782563e265562c87989b36fb90f4
                                                                                • Instruction Fuzzy Hash: 45027B756046419FCB14EF25C881E2AB7E5FF89324F04886DF8899B362CB74ED45EB81
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00FCF113
                                                                                • _wcscmp.LIBCMT ref: 00FCF128
                                                                                • _wcscmp.LIBCMT ref: 00FCF13F
                                                                                  • Part of subcall function 00FC4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00FC43A0
                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00FCF16E
                                                                                • FindClose.KERNEL32(00000000), ref: 00FCF179
                                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00FCF195
                                                                                • _wcscmp.LIBCMT ref: 00FCF1BC
                                                                                • _wcscmp.LIBCMT ref: 00FCF1D3
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FCF1E5
                                                                                • SetCurrentDirectoryW.KERNEL32(01018920), ref: 00FCF203
                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FCF20D
                                                                                • FindClose.KERNEL32(00000000), ref: 00FCF21A
                                                                                • FindClose.KERNEL32(00000000), ref: 00FCF22C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                                • String ID: *.*
                                                                                • API String ID: 1824444939-438819550
                                                                                • Opcode ID: a06a2d845bbc0adb286db559476056051d4b8d0dd74543bc719b2512abd7f975
                                                                                • Instruction ID: e4a8234ea819368521effd12128932e91b46c9df4b5986d1d5c919a3806d2307
                                                                                • Opcode Fuzzy Hash: a06a2d845bbc0adb286db559476056051d4b8d0dd74543bc719b2512abd7f975
                                                                                • Instruction Fuzzy Hash: 7631D53690025F7ACB10AB64EC5AFDEB7AE9F45370F14417AE800E60A0D734DF49EA54
                                                                                APIs
                                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00FCA20F
                                                                                • __swprintf.LIBCMT ref: 00FCA231
                                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FCA26E
                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00FCA293
                                                                                • _memset.LIBCMT ref: 00FCA2B2
                                                                                • _wcsncpy.LIBCMT ref: 00FCA2EE
                                                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00FCA323
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00FCA32E
                                                                                • RemoveDirectoryW.KERNEL32(?), ref: 00FCA337
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00FCA341
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                                • String ID: :$\$\??\%s
                                                                                • API String ID: 2733774712-3457252023
                                                                                • Opcode ID: bd0128006f19ea664be2118f4375cc8d603dbea8afd882c4eb930ab3d9ca25a2
                                                                                • Instruction ID: fede9f1c7231a72be88a3224612b494c2aca7ab483ca8a5cdc4f1ed92685bc9f
                                                                                • Opcode Fuzzy Hash: bd0128006f19ea664be2118f4375cc8d603dbea8afd882c4eb930ab3d9ca25a2
                                                                                • Instruction Fuzzy Hash: 7D31C37290015EABDB21DFA0DC89FEB37BCEF88714F1040BAF608D6160E775A6449B25
                                                                                APIs
                                                                                  • Part of subcall function 00FB8202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FB821E
                                                                                  • Part of subcall function 00FB8202: GetLastError.KERNEL32(?,00FB7CE2,?,?,?), ref: 00FB8228
                                                                                  • Part of subcall function 00FB8202: GetProcessHeap.KERNEL32(00000008,?,?,00FB7CE2,?,?,?), ref: 00FB8237
                                                                                  • Part of subcall function 00FB8202: HeapAlloc.KERNEL32(00000000,?,00FB7CE2,?,?,?), ref: 00FB823E
                                                                                  • Part of subcall function 00FB8202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FB8255
                                                                                  • Part of subcall function 00FB829F: GetProcessHeap.KERNEL32(00000008,00FB7CF8,00000000,00000000,?,00FB7CF8,?), ref: 00FB82AB
                                                                                  • Part of subcall function 00FB829F: HeapAlloc.KERNEL32(00000000,?,00FB7CF8,?), ref: 00FB82B2
                                                                                  • Part of subcall function 00FB829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00FB7CF8,?), ref: 00FB82C3
                                                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FB7D13
                                                                                • _memset.LIBCMT ref: 00FB7D28
                                                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FB7D47
                                                                                • GetLengthSid.ADVAPI32(?), ref: 00FB7D58
                                                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00FB7D95
                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FB7DB1
                                                                                • GetLengthSid.ADVAPI32(?), ref: 00FB7DCE
                                                                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00FB7DDD
                                                                                • HeapAlloc.KERNEL32(00000000), ref: 00FB7DE4
                                                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FB7E05
                                                                                • CopySid.ADVAPI32(00000000), ref: 00FB7E0C
                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FB7E3D
                                                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FB7E63
                                                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FB7E77
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                                • String ID:
                                                                                • API String ID: 3996160137-0
                                                                                • Opcode ID: 38abed0559d2b6879fa04c12376764018a6cdddd1cf7f711671313c8b1acea95
                                                                                • Instruction ID: a295caa797c97e9a0e9373f9ebc0fc8046e3fb00635bfbf6f0ed9e7fd125893b
                                                                                • Opcode Fuzzy Hash: 38abed0559d2b6879fa04c12376764018a6cdddd1cf7f711671313c8b1acea95
                                                                                • Instruction Fuzzy Hash: 93613B71904209AFDF00EFA5DC85AEEBB79FF44310F048169E915AA291DB35DA05EF60
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: -es$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                                                • API String ID: 0-1236126243
                                                                                • Opcode ID: 617230e08d8a0fd1d15127f991bd47679fe762356f0514a16fc84488ae271043
                                                                                • Instruction ID: 28e04363733e36f3219d3236f4c1a624f8a4c63ddd70cb94e0726a775875dbca
                                                                                • Opcode Fuzzy Hash: 617230e08d8a0fd1d15127f991bd47679fe762356f0514a16fc84488ae271043
                                                                                • Instruction Fuzzy Hash: 25727F75E00619CBDB25CF59C8907EEB7B5FF44320F54816AE849EB280EB349A41EF91
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?), ref: 00FC0097
                                                                                • SetKeyboardState.USER32(?), ref: 00FC0102
                                                                                • GetAsyncKeyState.USER32(000000A0), ref: 00FC0122
                                                                                • GetKeyState.USER32(000000A0), ref: 00FC0139
                                                                                • GetAsyncKeyState.USER32(000000A1), ref: 00FC0168
                                                                                • GetKeyState.USER32(000000A1), ref: 00FC0179
                                                                                • GetAsyncKeyState.USER32(00000011), ref: 00FC01A5
                                                                                • GetKeyState.USER32(00000011), ref: 00FC01B3
                                                                                • GetAsyncKeyState.USER32(00000012), ref: 00FC01DC
                                                                                • GetKeyState.USER32(00000012), ref: 00FC01EA
                                                                                • GetAsyncKeyState.USER32(0000005B), ref: 00FC0213
                                                                                • GetKeyState.USER32(0000005B), ref: 00FC0221
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: State$Async$Keyboard
                                                                                • String ID:
                                                                                • API String ID: 541375521-0
                                                                                • Opcode ID: b28d26f15c7007a42e8688a8ad47a6c5f3585c4ce0c67912810498e52b521832
                                                                                • Instruction ID: fd2f02a34495472d86592098f6a15f077fac6f27e12d8533412e9001ccf5e08f
                                                                                • Opcode Fuzzy Hash: b28d26f15c7007a42e8688a8ad47a6c5f3585c4ce0c67912810498e52b521832
                                                                                • Instruction Fuzzy Hash: D6513C20D043CA99FB34DBA08A16FEAFFB49F01390F08459E95C1561C3DE649B8DE761
                                                                                APIs
                                                                                  • Part of subcall function 00FE0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FDFDAD,?,?), ref: 00FE0E31
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FE04AC
                                                                                  • Part of subcall function 00F69837: __itow.LIBCMT ref: 00F69862
                                                                                  • Part of subcall function 00F69837: __swprintf.LIBCMT ref: 00F698AC
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00FE054B
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00FE05E3
                                                                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00FE0822
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00FE082F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 1240663315-0
                                                                                • Opcode ID: 90905e87664b33f2c8411ce611e34368bd6837c72b3bfc1753f08913c8be5a25
                                                                                • Instruction ID: a657388b93570f71b1199e45137a22cd69c4caf6c397b5093b6f1830843b9399
                                                                                • Opcode Fuzzy Hash: 90905e87664b33f2c8411ce611e34368bd6837c72b3bfc1753f08913c8be5a25
                                                                                • Instruction Fuzzy Hash: 41E17E31604244AFCB14DF25CC91E2ABBE8EF89314F04856DF849DB262DA74ED45DF92
                                                                                APIs
                                                                                  • Part of subcall function 00F69837: __itow.LIBCMT ref: 00F69862
                                                                                  • Part of subcall function 00F69837: __swprintf.LIBCMT ref: 00F698AC
                                                                                • CoInitialize.OLE32 ref: 00FD8403
                                                                                • CoUninitialize.OLE32 ref: 00FD840E
                                                                                • CoCreateInstance.OLE32(?,00000000,00000017,00FF2BEC,?), ref: 00FD846E
                                                                                • IIDFromString.OLE32(?,?), ref: 00FD84E1
                                                                                • VariantInit.OLEAUT32(?), ref: 00FD857B
                                                                                • VariantClear.OLEAUT32(?), ref: 00FD85DC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                • API String ID: 834269672-1287834457
                                                                                • Opcode ID: 8375490115abc8232515e476ee21115ff02b2dc87dd84d0aece43daf6566f97a
                                                                                • Instruction ID: 99a7a699b2745c8108c74fec60c866ca13807c7ed1262b56582f2ed6ef041069
                                                                                • Opcode Fuzzy Hash: 8375490115abc8232515e476ee21115ff02b2dc87dd84d0aece43daf6566f97a
                                                                                • Instruction Fuzzy Hash: A361CD716083129FC700DF14D888F6AB7E9AF457A4F08441EF9819B391CB74ED49EB92
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                • String ID:
                                                                                • API String ID: 1737998785-0
                                                                                • Opcode ID: 154945c0883a07523e5cc44a034a92840af19d5c52b7c864a33cabc898c18dab
                                                                                • Instruction ID: 720114ca092a261108942d2c5ee4067cc8845d12bb5583f37082a178e687aa2c
                                                                                • Opcode Fuzzy Hash: 154945c0883a07523e5cc44a034a92840af19d5c52b7c864a33cabc898c18dab
                                                                                • Instruction Fuzzy Hash: 9021E0756002149FDB11AF20EC49B6E7BA9FF45321F18802AF946DB3A1CB78BD00EB45
                                                                                APIs
                                                                                  • Part of subcall function 00F64750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F64743,?,?,00F637AE,?), ref: 00F64770
                                                                                  • Part of subcall function 00FC4A31: GetFileAttributesW.KERNEL32(?,00FC370B), ref: 00FC4A32
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00FC38A3
                                                                                • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00FC394B
                                                                                • MoveFileW.KERNEL32(?,?), ref: 00FC395E
                                                                                • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00FC397B
                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FC399D
                                                                                • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00FC39B9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                                                • String ID: \*.*
                                                                                • API String ID: 4002782344-1173974218
                                                                                • Opcode ID: 272ada67b0ae673b5ad322dec8efe12ff0beac4042288b7d298b1e52e896c61e
                                                                                • Instruction ID: cf9732f8bc595ee3231f326ff47550d336f7f93d7aebe87004423767f9d398ec
                                                                                • Opcode Fuzzy Hash: 272ada67b0ae673b5ad322dec8efe12ff0beac4042288b7d298b1e52e896c61e
                                                                                • Instruction Fuzzy Hash: 08519E3180414EAACF05FBA0DE92EEDB779AF10354F60406DE442B6191EB356F0DEB61
                                                                                APIs
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00FCF440
                                                                                • Sleep.KERNEL32(0000000A), ref: 00FCF470
                                                                                • _wcscmp.LIBCMT ref: 00FCF484
                                                                                • _wcscmp.LIBCMT ref: 00FCF49F
                                                                                • FindNextFileW.KERNEL32(?,?), ref: 00FCF53D
                                                                                • FindClose.KERNEL32(00000000), ref: 00FCF553
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                                                • String ID: *.*
                                                                                • API String ID: 713712311-438819550
                                                                                • Opcode ID: d5019a777864b2a55d4036c1c1005a37ab354759f5701c1eb32592abaec56ddb
                                                                                • Instruction ID: f4c593017b34f85e7b9063c4e661ce55627f574c9ae1a36061d6ff9fee98ee9a
                                                                                • Opcode Fuzzy Hash: d5019a777864b2a55d4036c1c1005a37ab354759f5701c1eb32592abaec56ddb
                                                                                • Instruction Fuzzy Hash: A1417B71C0020AABCF14EF64DD46BEEBBB5FF04320F14446AE815A6190DB349A48EB50
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove
                                                                                • String ID:
                                                                                • API String ID: 4104443479-0
                                                                                • Opcode ID: 77284da69e8aebfbc6d41e734d72ef375a3617682d4d2c14c5f8e11a28cb2c76
                                                                                • Instruction ID: d8b5a974aeaacde01665b5e6100f92dec6c7e754970beed2bd225ef166ea9f11
                                                                                • Opcode Fuzzy Hash: 77284da69e8aebfbc6d41e734d72ef375a3617682d4d2c14c5f8e11a28cb2c76
                                                                                • Instruction Fuzzy Hash: 3912BC70A00609DFDF14DFA5C981AEEB7F5FF48310F10852AE44AE7250EB3AA915EB51
                                                                                APIs
                                                                                  • Part of subcall function 00F64750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F64743,?,?,00F637AE,?), ref: 00F64770
                                                                                  • Part of subcall function 00FC4A31: GetFileAttributesW.KERNEL32(?,00FC370B), ref: 00FC4A32
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00FC3B89
                                                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 00FC3BD9
                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FC3BEA
                                                                                • FindClose.KERNEL32(00000000), ref: 00FC3C01
                                                                                • FindClose.KERNEL32(00000000), ref: 00FC3C0A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                • String ID: \*.*
                                                                                • API String ID: 2649000838-1173974218
                                                                                • Opcode ID: ece500014c63408c7439b230ecf654cd9ed4cb5c745de915a85c83fe70b9cd31
                                                                                • Instruction ID: 90c27a1573c9d2dec9bf1bbb50489fe1bc85fed5edf3fb5f5e5a1cd324db2b2c
                                                                                • Opcode Fuzzy Hash: ece500014c63408c7439b230ecf654cd9ed4cb5c745de915a85c83fe70b9cd31
                                                                                • Instruction Fuzzy Hash: F8317A314083859BC200FB24DD92DAFB7E8AE91314F408E2DF4D596191EB25EA0CEB63
                                                                                APIs
                                                                                  • Part of subcall function 00FB87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FB882B
                                                                                  • Part of subcall function 00FB87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FB8858
                                                                                  • Part of subcall function 00FB87E1: GetLastError.KERNEL32 ref: 00FB8865
                                                                                • ExitWindowsEx.USER32(?,00000000), ref: 00FC51F9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                • String ID: $@$SeShutdownPrivilege
                                                                                • API String ID: 2234035333-194228
                                                                                • Opcode ID: 54476756f9445eeda4ab4d9189b049fd9a2e3f51ae6a32a25e384a492da52c84
                                                                                • Instruction ID: fbb8ab92c0aeff1c3a58be987d748313a0382f800e9e6947e5e24ec1d33e1a7d
                                                                                • Opcode Fuzzy Hash: 54476756f9445eeda4ab4d9189b049fd9a2e3f51ae6a32a25e384a492da52c84
                                                                                • Instruction Fuzzy Hash: 67017B32B916172BF72822689D8BFFB72DCEB44B60F24042CF903E60D2DA503C80B590
                                                                                APIs
                                                                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00FD62DC
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FD62EB
                                                                                • bind.WSOCK32(00000000,?,00000010), ref: 00FD6307
                                                                                • listen.WSOCK32(00000000,00000005), ref: 00FD6316
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FD6330
                                                                                • closesocket.WSOCK32(00000000,00000000), ref: 00FD6344
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$bindclosesocketlistensocket
                                                                                • String ID:
                                                                                • API String ID: 1279440585-0
                                                                                • Opcode ID: 2776750eef2df96a5a1857e4df649747aebf5328687867c85bb83bcf705071a1
                                                                                • Instruction ID: 5bfc66bf6be785a273b05eb26b80dfecfe8168f7b1790d754f83b22a8a624912
                                                                                • Opcode Fuzzy Hash: 2776750eef2df96a5a1857e4df649747aebf5328687867c85bb83bcf705071a1
                                                                                • Instruction Fuzzy Hash: 9221AD716002049FCB10EF64CC85B6EB7BAEF48724F18816AE816EB3D1CB74AD05EB51
                                                                                APIs
                                                                                  • Part of subcall function 00F80DB6: std::exception::exception.LIBCMT ref: 00F80DEC
                                                                                  • Part of subcall function 00F80DB6: __CxxThrowException@8.LIBCMT ref: 00F80E01
                                                                                • _memmove.LIBCMT ref: 00FB0258
                                                                                • _memmove.LIBCMT ref: 00FB036D
                                                                                • _memmove.LIBCMT ref: 00FB0414
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                                                • String ID:
                                                                                • API String ID: 1300846289-0
                                                                                • Opcode ID: 56f3cce3c59c18a7d1837721a41b82c1bfe3ef3d3573d03845919fd6840bf9cd
                                                                                • Instruction ID: 0c9035d53d45184ef5f91d2ff6a1efce01ba52b68c82c5292f39d9e2953148e7
                                                                                • Opcode Fuzzy Hash: 56f3cce3c59c18a7d1837721a41b82c1bfe3ef3d3573d03845919fd6840bf9cd
                                                                                • Instruction Fuzzy Hash: CF02EFB1E00209DBCF04DF65D981AAEBBF5EF44310F548069E80ADB255EF39D914EB91
                                                                                APIs
                                                                                  • Part of subcall function 00F62612: GetWindowLongW.USER32(?,000000EB), ref: 00F62623
                                                                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 00F619FA
                                                                                • GetSysColor.USER32(0000000F), ref: 00F61A4E
                                                                                • SetBkColor.GDI32(?,00000000), ref: 00F61A61
                                                                                  • Part of subcall function 00F61290: DefDlgProcW.USER32(?,00000020,?), ref: 00F612D8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ColorProc$LongWindow
                                                                                • String ID:
                                                                                • API String ID: 3744519093-0
                                                                                • Opcode ID: 5caa756e787915896a4272ea6a7e9b041595a9e8b3e10a00d6b1b640023d3adb
                                                                                • Instruction ID: 4dcb173bd2586ada156c5e39da2faee8e43a707716f9394e3c1967486968293f
                                                                                • Opcode Fuzzy Hash: 5caa756e787915896a4272ea6a7e9b041595a9e8b3e10a00d6b1b640023d3adb
                                                                                • Instruction Fuzzy Hash: 03A16A72512589BEFB38AE699D48FBF355CFB42366B2C0119F402D6182CA2D8D01F3B5
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00FCBCE6
                                                                                • _wcscmp.LIBCMT ref: 00FCBD16
                                                                                • _wcscmp.LIBCMT ref: 00FCBD2B
                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00FCBD3C
                                                                                • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00FCBD6C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Find$File_wcscmp$CloseFirstNext
                                                                                • String ID:
                                                                                • API String ID: 2387731787-0
                                                                                • Opcode ID: 9a48dd8dd1e222f710213beaa3d64cb76953985a7a1dc9ddde4311e2b9e72e38
                                                                                • Instruction ID: 19c5d9a6a75bae5874ee82f9525b6d70120b57ace56431d08ce94caf3b3001cd
                                                                                • Opcode Fuzzy Hash: 9a48dd8dd1e222f710213beaa3d64cb76953985a7a1dc9ddde4311e2b9e72e38
                                                                                • Instruction Fuzzy Hash: 4951AC79A047029FC714DF68C992E9AB3E8EF49320F04461DE9568B3A1DB34ED04EB91
                                                                                APIs
                                                                                  • Part of subcall function 00FD7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00FD7DB6
                                                                                • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00FD679E
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FD67C7
                                                                                • bind.WSOCK32(00000000,?,00000010), ref: 00FD6800
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FD680D
                                                                                • closesocket.WSOCK32(00000000,00000000), ref: 00FD6821
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                                                • String ID:
                                                                                • API String ID: 99427753-0
                                                                                • Opcode ID: d807b996a391617d07e92bbd8f51d8f5879530b248dbff52048243d22f5ab25d
                                                                                • Instruction ID: c764c8c9247de3975e3eab69a6b513fd7ac90720408cfd6fe6c593188440aa2f
                                                                                • Opcode Fuzzy Hash: d807b996a391617d07e92bbd8f51d8f5879530b248dbff52048243d22f5ab25d
                                                                                • Instruction Fuzzy Hash: 24411575A00214AFDB10BF648C82F7E77E9DF08754F48815CF905AB3C2CA789D00AB91
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                • String ID:
                                                                                • API String ID: 292994002-0
                                                                                • Opcode ID: 3bb9dd2eff2f30ad7fe3e91d7491e0be4e60b0daf7f49e4d48b53283bae9c166
                                                                                • Instruction ID: 94e77e1d985fd537dfba0f8fa1b61e4fb6b546c17c0a47e8351f8e803e9b3bee
                                                                                • Opcode Fuzzy Hash: 3bb9dd2eff2f30ad7fe3e91d7491e0be4e60b0daf7f49e4d48b53283bae9c166
                                                                                • Instruction Fuzzy Hash: 16110431700A946FDB206F27DC84A6E7B9EFF44BA5B444438F845D7241CBB4DC01AAA0
                                                                                APIs
                                                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FB80C0
                                                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FB80CA
                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FB80D9
                                                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FB80E0
                                                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FB80F6
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                • String ID:
                                                                                • API String ID: 44706859-0
                                                                                • Opcode ID: c9cc3152272c5ad85fff026791bd42ac38b052c071fbf8f00c031c4843c3583e
                                                                                • Instruction ID: 43bdb8a8d6b043682635f5006ea327e2daa1ec9a97e280c2e2c7643a93f9ef40
                                                                                • Opcode Fuzzy Hash: c9cc3152272c5ad85fff026791bd42ac38b052c071fbf8f00c031c4843c3583e
                                                                                • Instruction Fuzzy Hash: CAF06831241248AFD7104F65DCCDEA73BACEF857A5B000025F545C6150CB619D46EE60
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00F64AD0), ref: 00F64B45
                                                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00F64B57
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                                                • API String ID: 2574300362-192647395
                                                                                • Opcode ID: 6f8ad40b895cffcbc8186f7136666c02f44eac057198c77cb66d51767cff99d8
                                                                                • Instruction ID: 3ff6288327a982d663e3f4d6d71d4a2c919915f15cfe60be31143f3be45e800c
                                                                                • Opcode Fuzzy Hash: 6f8ad40b895cffcbc8186f7136666c02f44eac057198c77cb66d51767cff99d8
                                                                                • Instruction Fuzzy Hash: 06D0C230E0071BCFC7209F32D858B0272D4AF81350B10C83E9481CA150D674E484E614
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 674341424-0
                                                                                • Opcode ID: ccbdc8137f339876441099abc59106265a675f92052ec469fc3a08e5cfd47781
                                                                                • Instruction ID: 30609682a3607d519ee611bc90d640bd9c2186be3dcb54120dfc68b923eedbea
                                                                                • Opcode Fuzzy Hash: ccbdc8137f339876441099abc59106265a675f92052ec469fc3a08e5cfd47781
                                                                                • Instruction Fuzzy Hash: F422AFB1608300AFC724DF24C891BAEB7E4EF85714F04891DF49A97291DB75E904EB93
                                                                                APIs
                                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00FDEE3D
                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00FDEE4B
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                • Process32NextW.KERNEL32(00000000,?), ref: 00FDEF0B
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00FDEF1A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                                                • String ID:
                                                                                • API String ID: 2576544623-0
                                                                                • Opcode ID: 7c5b4c77665b52e2d2ff6338e6dd118e3107e8b90badbb0f0e5ea939f255a476
                                                                                • Instruction ID: 3cfad35ad0774ce2cdcbd02ce54f6c3c729f64a9db62ba00e87afeadfa4054f9
                                                                                • Opcode Fuzzy Hash: 7c5b4c77665b52e2d2ff6338e6dd118e3107e8b90badbb0f0e5ea939f255a476
                                                                                • Instruction Fuzzy Hash: 3351BE71508305AFD320EF20CC81E6BB7E8EF94750F44482DF495972A1EB74E908DB92
                                                                                APIs
                                                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00FBE628
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen
                                                                                • String ID: ($|
                                                                                • API String ID: 1659193697-1631851259
                                                                                • Opcode ID: 3142b15b3090c485b71d8d78dbd67f49f1e52d10be52059f2e4a22c2022b9dde
                                                                                • Instruction ID: f6d57b272b225bebd987a52d34212ad86cd8cccf154d02b83f10ee2eb8927bec
                                                                                • Opcode Fuzzy Hash: 3142b15b3090c485b71d8d78dbd67f49f1e52d10be52059f2e4a22c2022b9dde
                                                                                • Instruction Fuzzy Hash: B3321575A007059FD728DF19C481AAAB7F1FF48320B15C56EE89ADB3A1DB70A941DB40
                                                                                APIs
                                                                                • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00FD180A,00000000), ref: 00FD23E1
                                                                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00FD2418
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$AvailableDataFileQueryRead
                                                                                • String ID:
                                                                                • API String ID: 599397726-0
                                                                                • Opcode ID: 5721799ebf3f9fa48599ca63d181d1948f8be211246c338c018ea3d3ba67a5b9
                                                                                • Instruction ID: 09073363afd9a474c89ac318c03ee4ad5621e0e88385c90f05aaad9a0bf23be6
                                                                                • Opcode Fuzzy Hash: 5721799ebf3f9fa48599ca63d181d1948f8be211246c338c018ea3d3ba67a5b9
                                                                                • Instruction Fuzzy Hash: 3C41F772904209BFEB50DE95DC81FBB77AEEB50324F14402BFA01A6341DA759E41B690
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 00FCB40B
                                                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00FCB465
                                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00FCB4B2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$DiskFreeSpace
                                                                                • String ID:
                                                                                • API String ID: 1682464887-0
                                                                                • Opcode ID: de0d60bf067f089800338fed7f00cd91d0ee2eed392f844c0707f9c62ae78a6f
                                                                                • Instruction ID: a7a5b826755623f571eafb84d29f8b0be70c79559f27e623670125c20d750d0c
                                                                                • Opcode Fuzzy Hash: de0d60bf067f089800338fed7f00cd91d0ee2eed392f844c0707f9c62ae78a6f
                                                                                • Instruction Fuzzy Hash: BC215C75A00508EFCB00EFA5DC81EEDBBB8FF49314F1480AAE905AB351CB359919DB51
                                                                                APIs
                                                                                  • Part of subcall function 00F80DB6: std::exception::exception.LIBCMT ref: 00F80DEC
                                                                                  • Part of subcall function 00F80DB6: __CxxThrowException@8.LIBCMT ref: 00F80E01
                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FB882B
                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FB8858
                                                                                • GetLastError.KERNEL32 ref: 00FB8865
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                                • String ID:
                                                                                • API String ID: 1922334811-0
                                                                                • Opcode ID: 2ff916d8594094bf3472155d6cf7f21cd589316a58dc52fbee787870950b7639
                                                                                • Instruction ID: d4b481109408d804a21c749fdaad470f1cc7269749f891efd3c085d5a7c3f9b9
                                                                                • Opcode Fuzzy Hash: 2ff916d8594094bf3472155d6cf7f21cd589316a58dc52fbee787870950b7639
                                                                                • Instruction Fuzzy Hash: AA119DB2804204AFE718EFA4DC85DABB7ADEB44310B60852EF45587211EE30EC05DB60
                                                                                APIs
                                                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00FB8774
                                                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00FB878B
                                                                                • FreeSid.ADVAPI32(?), ref: 00FB879B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                • String ID:
                                                                                • API String ID: 3429775523-0
                                                                                • Opcode ID: 265d16e9b530394c5b0c397475a62fcd810e36aedf87e1a4e203c86aa5fbd386
                                                                                • Instruction ID: 26ada9af785cb08f6b889ab296a41cfc666e5ebdd384bae9019da47d5c7366bd
                                                                                • Opcode Fuzzy Hash: 265d16e9b530394c5b0c397475a62fcd810e36aedf87e1a4e203c86aa5fbd386
                                                                                • Instruction Fuzzy Hash: 10F04975A1130CBFDF00DFF4DC89AAEBBBCEF08311F1044A9AA01E6181E6716A089B50
                                                                                APIs
                                                                                • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00FC4CB3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: mouse_event
                                                                                • String ID: DOWN
                                                                                • API String ID: 2434400541-711622031
                                                                                • Opcode ID: 10c468c0ca6c47c38b47dbcef3d54fa58aa7635a9a41f3dd4d1bc046baa333f1
                                                                                • Instruction ID: 08d11afbbf81c81c884c6f51eccf879dd65ff24261246ec68fcdf4d37c5713a7
                                                                                • Opcode Fuzzy Hash: 10c468c0ca6c47c38b47dbcef3d54fa58aa7635a9a41f3dd4d1bc046baa333f1
                                                                                • Instruction Fuzzy Hash: 28E0867219D7223CF9442519BD13FF7234C8B22731720014AF850D94E1DE583D8235BC
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00FCC6FB
                                                                                • FindClose.KERNEL32(00000000), ref: 00FCC72B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Find$CloseFileFirst
                                                                                • String ID:
                                                                                • API String ID: 2295610775-0
                                                                                • Opcode ID: 734dd73711b65066abbdc81e59edb1c9d1e0985947281b2577dacd60d09f6953
                                                                                • Instruction ID: f5aee152a457b0266415acded0045bd686c80ef2459dcd5d5fef79f80e477886
                                                                                • Opcode Fuzzy Hash: 734dd73711b65066abbdc81e59edb1c9d1e0985947281b2577dacd60d09f6953
                                                                                • Instruction Fuzzy Hash: A2118E726042049FDB10EF29CC85A2AF7E9EF85324F04851DF9A9CB290DB74AC05DF81
                                                                                APIs
                                                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00FD9468,?,00FEFB84,?), ref: 00FCA097
                                                                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00FD9468,?,00FEFB84,?), ref: 00FCA0A9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFormatLastMessage
                                                                                • String ID:
                                                                                • API String ID: 3479602957-0
                                                                                • Opcode ID: 730622bc0af1e5c795614699753a120994f9803e7ce8c3b4f9b378bcaeb20360
                                                                                • Instruction ID: 8008192eb7774dd86bf8351ddee5624264892d14648b99da71cb451ce8002144
                                                                                • Opcode Fuzzy Hash: 730622bc0af1e5c795614699753a120994f9803e7ce8c3b4f9b378bcaeb20360
                                                                                • Instruction Fuzzy Hash: CEF0A73654522EBBDB21AFA4CC89FEA776CFF08361F004169F909D7181D730A944DBA1
                                                                                APIs
                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FB8309), ref: 00FB81E0
                                                                                • CloseHandle.KERNEL32(?,?,00FB8309), ref: 00FB81F2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                                                • String ID:
                                                                                • API String ID: 81990902-0
                                                                                • Opcode ID: 3a2b3a359bad5395b69f90995e8cd368fbb33d725510983c2d98665dcb8e07da
                                                                                • Instruction ID: 69408130d04a04dadc4daf182db4f44c6b030942b2d4422938661938606881f0
                                                                                • Opcode Fuzzy Hash: 3a2b3a359bad5395b69f90995e8cd368fbb33d725510983c2d98665dcb8e07da
                                                                                • Instruction Fuzzy Hash: 37E08C32001611AFE7212B20EC08DB37BEEEF00320710882DF8A684470CB22AC95EB10
                                                                                APIs
                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00F88D57,?,?,?,00000001), ref: 00F8A15A
                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00F8A163
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled
                                                                                • String ID:
                                                                                • API String ID: 3192549508-0
                                                                                • Opcode ID: e1e424527fe294bf58993d0f3adb69629a8b5108bba17c53306d9f08c63e0131
                                                                                • Instruction ID: ea93c70c0d5995f0cad53e68cceeb9a7bbc6a47ad8b29831b838b4327625bd66
                                                                                • Opcode Fuzzy Hash: e1e424527fe294bf58993d0f3adb69629a8b5108bba17c53306d9f08c63e0131
                                                                                • Instruction Fuzzy Hash: 41B0923105424CAFCA002B91EC49B883F68EB44AA2F404020F60D88474CB625554AA91
                                                                                Strings
                                                                                • Variable must be of type 'Object'., xrefs: 00FA3E62
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: Variable must be of type 'Object'.
                                                                                • API String ID: 0-109567571
                                                                                • Opcode ID: 0aa700a40d9d7cdb37afdb8785a48d78d2d9ea14825bb650652260d929ef5e46
                                                                                • Instruction ID: 7c4bbcc6da34f63cc5830251345e9490084f82606988fcc526ba6fd28d309cab
                                                                                • Opcode Fuzzy Hash: 0aa700a40d9d7cdb37afdb8785a48d78d2d9ea14825bb650652260d929ef5e46
                                                                                • Instruction Fuzzy Hash: 48A29E7AE00215CFCB24CF98C480AAEB7B2FF59324F248059E855AB341D775ED46EB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1c2ad69c5bb21c585423ab2a96f66e229a9fd5772d8362836de2907ec5519710
                                                                                • Instruction ID: 2a52168b04e4eb745af653bfc3e94e01f4cf2a14b56dfb6d13a567d0dcd4a69f
                                                                                • Opcode Fuzzy Hash: 1c2ad69c5bb21c585423ab2a96f66e229a9fd5772d8362836de2907ec5519710
                                                                                • Instruction Fuzzy Hash: 6032F621D29F454DD723A634DC72336A24DAFB73D4F15D737E81AB59A9EB28C483A200
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ecdedd649629bccec2d3448b39a2bf2558d3ec9074e7a9ace37925d20803e522
                                                                                • Instruction ID: d4a95deb2d3f17f2b250850b4e900695803c4e15f3e4bedda655371228996e25
                                                                                • Opcode Fuzzy Hash: ecdedd649629bccec2d3448b39a2bf2558d3ec9074e7a9ace37925d20803e522
                                                                                • Instruction Fuzzy Hash: 6AB1F160D2AF454DD72397398871336B65CAFBB2C5F52D71BFC2A70D22EB228583A141
                                                                                APIs
                                                                                • __time64.LIBCMT ref: 00FC889B
                                                                                  • Part of subcall function 00F8520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00FC8F6E,00000000,?,?,?,?,00FC911F,00000000,?), ref: 00F85213
                                                                                  • Part of subcall function 00F8520A: __aulldiv.LIBCMT ref: 00F85233
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Time$FileSystem__aulldiv__time64
                                                                                • String ID:
                                                                                • API String ID: 2893107130-0
                                                                                • Opcode ID: 88c2c8ffdd3b52b73d02b4621601e1a5aba624d4c258a61006553c41533cdd4f
                                                                                • Instruction ID: 36f85898e4c57eea3fdba89840809571c50f2de96ce2ccea12306ebf15e675ae
                                                                                • Opcode Fuzzy Hash: 88c2c8ffdd3b52b73d02b4621601e1a5aba624d4c258a61006553c41533cdd4f
                                                                                • Instruction Fuzzy Hash: 3821B432A355218BC729CF25D441B52B3E1EFA5321F688E6CD4F5CB2C0CA39B905DB54
                                                                                APIs
                                                                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00FB8389), ref: 00FB87D1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: LogonUser
                                                                                • String ID:
                                                                                • API String ID: 1244722697-0
                                                                                • Opcode ID: 9c85d6578cd1bdd33f1b67365867ae4bc1656697d7764954665494b697128e72
                                                                                • Instruction ID: 7391776a51f09323181cb5a69d38d24164bd75897e0a2f4c04b1841ffc5cca8d
                                                                                • Opcode Fuzzy Hash: 9c85d6578cd1bdd33f1b67365867ae4bc1656697d7764954665494b697128e72
                                                                                • Instruction Fuzzy Hash: FAD05E3226050EABEF018EA4DC01EAE3B69EB04B01F408111FE15C50A1C775D835AB60
                                                                                APIs
                                                                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00F8A12A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled
                                                                                • String ID:
                                                                                • API String ID: 3192549508-0
                                                                                • Opcode ID: 8ad0afc299c20166fef98dabd9a19f45a63aeedf8aa78721750f758c07e9a43e
                                                                                • Instruction ID: 99a35fbfdbbbc54432f9fc16fc11a5b48b001e8d42552d7defeff3dc5d13647f
                                                                                • Opcode Fuzzy Hash: 8ad0afc299c20166fef98dabd9a19f45a63aeedf8aa78721750f758c07e9a43e
                                                                                • Instruction Fuzzy Hash: 4CA0223000020CFFCF002F82FC08888BFACEB002E0B008030F80C88032CB33A820AAC0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 234a74d94bef03caa4ebc0d66d8d99b36f2af0750bfc0c0e9b874abb2313a082
                                                                                • Instruction ID: 21b20399950e26b6952e4ec16dd393ccf12c5a54ddbbabf7e97fb2aa4c1d5de7
                                                                                • Opcode Fuzzy Hash: 234a74d94bef03caa4ebc0d66d8d99b36f2af0750bfc0c0e9b874abb2313a082
                                                                                • Instruction Fuzzy Hash: 66224731D481469BDF388A19C4987BC77B1BB417A4F28C02BD54ACB592DB789C82FB43
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                • Instruction ID: d2481929ae5b53d8ae4dd880d72633d1a81d73d0e4caf7d4be561b7f22d89722
                                                                                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                • Instruction Fuzzy Hash: E7C1C6336050930ADF6DA73984341BEFAA16EA27B131A476DD4B3CF1D5EE20D925E720
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                • Instruction ID: 8cc5e9d8408bb76da8ba25c7ad0c8eacede3a3c8dd5f05b05bc688e1e14f00cb
                                                                                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                • Instruction Fuzzy Hash: B0C193336051930ADF6D663AC4341BEBAA16EA27B131A076DD4B3DB1D4EE20D925F720
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                • Instruction ID: 74cbaef21aa79415181c2c5368e0a237d64b385852725e9f555b349e9407a012
                                                                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                • Instruction Fuzzy Hash: 40C1833370519309DF2D5639C4742BEBAA96EA27B131A476DD4B3CB1C4EE20C966E720
                                                                                APIs
                                                                                • DeleteObject.GDI32(00000000), ref: 00FD785B
                                                                                • DeleteObject.GDI32(00000000), ref: 00FD786D
                                                                                • DestroyWindow.USER32 ref: 00FD787B
                                                                                • GetDesktopWindow.USER32 ref: 00FD7895
                                                                                • GetWindowRect.USER32(00000000), ref: 00FD789C
                                                                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00FD79DD
                                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00FD79ED
                                                                                • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD7A35
                                                                                • GetClientRect.USER32(00000000,?), ref: 00FD7A41
                                                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00FD7A7B
                                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD7A9D
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD7AB0
                                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD7ABB
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00FD7AC4
                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD7AD3
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00FD7ADC
                                                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD7AE3
                                                                                • GlobalFree.KERNEL32(00000000), ref: 00FD7AEE
                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD7B00
                                                                                • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00FF2CAC,00000000), ref: 00FD7B16
                                                                                • GlobalFree.KERNEL32(00000000), ref: 00FD7B26
                                                                                • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00FD7B4C
                                                                                • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00FD7B6B
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD7B8D
                                                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FD7D7A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                • String ID: $AutoIt v3$DISPLAY$static
                                                                                • API String ID: 2211948467-2373415609
                                                                                • Opcode ID: 4328c6bdd97cc9e2e81a6d3ccd286d5d98c67fdf06ca2dac7691c84f2878c025
                                                                                • Instruction ID: 96329db7a35f1bd7d0ff0dc964d19624ca311699a2d777c0e622cff1871ebc40
                                                                                • Opcode Fuzzy Hash: 4328c6bdd97cc9e2e81a6d3ccd286d5d98c67fdf06ca2dac7691c84f2878c025
                                                                                • Instruction Fuzzy Hash: 30029B71900219EFDB14DFA4CC89EAE7BBAEF49310F148159F905AB3A0D774AD05EB60
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?,00FEF910), ref: 00FE3627
                                                                                • IsWindowVisible.USER32(?), ref: 00FE364B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharUpperVisibleWindow
                                                                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                                • API String ID: 4105515805-45149045
                                                                                • Opcode ID: 881d935c1ae2c01d89eb42522fec4430b997abeeb0190362cbcc9692725c623d
                                                                                • Instruction ID: 11184f208777778c1eb7655b464d53532471158e5d7effa8c7e9449e7fa7b0fa
                                                                                • Opcode Fuzzy Hash: 881d935c1ae2c01d89eb42522fec4430b997abeeb0190362cbcc9692725c623d
                                                                                • Instruction Fuzzy Hash: A7D1C3752083419BCA04FF11C85AAAE77E6AF94354F454458F8825B3A3CF39EE4AEB41
                                                                                APIs
                                                                                • SetTextColor.GDI32(?,00000000), ref: 00FEA630
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00FEA661
                                                                                • GetSysColor.USER32(0000000F), ref: 00FEA66D
                                                                                • SetBkColor.GDI32(?,000000FF), ref: 00FEA687
                                                                                • SelectObject.GDI32(?,00000000), ref: 00FEA696
                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 00FEA6C1
                                                                                • GetSysColor.USER32(00000010), ref: 00FEA6C9
                                                                                • CreateSolidBrush.GDI32(00000000), ref: 00FEA6D0
                                                                                • FrameRect.USER32(?,?,00000000), ref: 00FEA6DF
                                                                                • DeleteObject.GDI32(00000000), ref: 00FEA6E6
                                                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 00FEA731
                                                                                • FillRect.USER32(?,?,00000000), ref: 00FEA763
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00FEA78E
                                                                                  • Part of subcall function 00FEA8CA: GetSysColor.USER32(00000012), ref: 00FEA903
                                                                                  • Part of subcall function 00FEA8CA: SetTextColor.GDI32(?,?), ref: 00FEA907
                                                                                  • Part of subcall function 00FEA8CA: GetSysColorBrush.USER32(0000000F), ref: 00FEA91D
                                                                                  • Part of subcall function 00FEA8CA: GetSysColor.USER32(0000000F), ref: 00FEA928
                                                                                  • Part of subcall function 00FEA8CA: GetSysColor.USER32(00000011), ref: 00FEA945
                                                                                  • Part of subcall function 00FEA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00FEA953
                                                                                  • Part of subcall function 00FEA8CA: SelectObject.GDI32(?,00000000), ref: 00FEA964
                                                                                  • Part of subcall function 00FEA8CA: SetBkColor.GDI32(?,00000000), ref: 00FEA96D
                                                                                  • Part of subcall function 00FEA8CA: SelectObject.GDI32(?,?), ref: 00FEA97A
                                                                                  • Part of subcall function 00FEA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 00FEA999
                                                                                  • Part of subcall function 00FEA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00FEA9B0
                                                                                  • Part of subcall function 00FEA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 00FEA9C5
                                                                                  • Part of subcall function 00FEA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00FEA9ED
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                                                • String ID:
                                                                                • API String ID: 3521893082-0
                                                                                • Opcode ID: b186b6ec772a0f0311ee1d6e2f94ef01ac12d1a92420ddfe2741172d11382b56
                                                                                • Instruction ID: 021487adda421e7feb351f7bfdca554d54c0f5402b6e65021f6982fb76d73fc3
                                                                                • Opcode Fuzzy Hash: b186b6ec772a0f0311ee1d6e2f94ef01ac12d1a92420ddfe2741172d11382b56
                                                                                • Instruction Fuzzy Hash: 9F919072408349EFD7109F64DC48A5B7BB9FF89331F140A29F562DA1A0D734E948EB52
                                                                                APIs
                                                                                • DestroyWindow.USER32(?,?,?), ref: 00F62CA2
                                                                                • DeleteObject.GDI32(00000000), ref: 00F62CE8
                                                                                • DeleteObject.GDI32(00000000), ref: 00F62CF3
                                                                                • DestroyIcon.USER32(00000000,?,?,?), ref: 00F62CFE
                                                                                • DestroyWindow.USER32(00000000,?,?,?), ref: 00F62D09
                                                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 00F9C43B
                                                                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00F9C474
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00F9C89D
                                                                                  • Part of subcall function 00F61B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F62036,?,00000000,?,?,?,?,00F616CB,00000000,?), ref: 00F61B9A
                                                                                • SendMessageW.USER32(?,00001053), ref: 00F9C8DA
                                                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00F9C8F1
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00F9C907
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00F9C912
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                                • String ID: 0
                                                                                • API String ID: 464785882-4108050209
                                                                                • Opcode ID: ede82d616a2d8531d11ef8e1d6ec8dedde06a9d3dc6b1836d2253a29c904fd68
                                                                                • Instruction ID: 77dd2634718fec17d01dada4797fe64c76ff1d4a21c668bb0d2b611cc872e23c
                                                                                • Opcode Fuzzy Hash: ede82d616a2d8531d11ef8e1d6ec8dedde06a9d3dc6b1836d2253a29c904fd68
                                                                                • Instruction Fuzzy Hash: 9A129F30A00641EFEF55CF24C884BA9BBE1FF44320F584569F999CB262C731E846EB91
                                                                                APIs
                                                                                • DestroyWindow.USER32(00000000), ref: 00FD74DE
                                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00FD759D
                                                                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00FD75DB
                                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00FD75ED
                                                                                • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00FD7633
                                                                                • GetClientRect.USER32(00000000,?), ref: 00FD763F
                                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00FD7683
                                                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00FD7692
                                                                                • GetStockObject.GDI32(00000011), ref: 00FD76A2
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00FD76A6
                                                                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00FD76B6
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FD76BF
                                                                                • DeleteDC.GDI32(00000000), ref: 00FD76C8
                                                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00FD76F4
                                                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 00FD770B
                                                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00FD7746
                                                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00FD775A
                                                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 00FD776B
                                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00FD779B
                                                                                • GetStockObject.GDI32(00000011), ref: 00FD77A6
                                                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00FD77B1
                                                                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00FD77BB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                • API String ID: 2910397461-517079104
                                                                                • Opcode ID: 806b9fa90fe9c9742ab6b529b16217f44c1f8131f3a617ff02998b4669325722
                                                                                • Instruction ID: ea4f2853ba616cd46e2d0224b1451a1bb982a5c9e27d6c27b59f5761dcb08bb7
                                                                                • Opcode Fuzzy Hash: 806b9fa90fe9c9742ab6b529b16217f44c1f8131f3a617ff02998b4669325722
                                                                                • Instruction Fuzzy Hash: 0DA1B271A00219BFEB20DFA4DC4AFAE7BB9EB45710F148115FA14AB2E0D774AD04DB64
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 00FCAD1E
                                                                                • GetDriveTypeW.KERNEL32(?,00FEFAC0,?,\\.\,00FEF910), ref: 00FCADFB
                                                                                • SetErrorMode.KERNEL32(00000000,00FEFAC0,?,\\.\,00FEF910), ref: 00FCAF59
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$DriveType
                                                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                • API String ID: 2907320926-4222207086
                                                                                • Opcode ID: d431a24fc40c6b981b6f9542d7cb2f0c3d7404085e613de2993705bbf993fa4f
                                                                                • Instruction ID: 7708c122250d7a6ebbd92cff0428cc916c1dc8a718c354419f0070f1c35c019a
                                                                                • Opcode Fuzzy Hash: d431a24fc40c6b981b6f9542d7cb2f0c3d7404085e613de2993705bbf993fa4f
                                                                                • Instruction Fuzzy Hash: 5C51C6B1A4420E9B8B00DB11CF83FBD7360EB48718760855EE447AB155C679BE01FB53
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __wcsnicmp
                                                                                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                • API String ID: 1038674560-86951937
                                                                                • Opcode ID: 3623827a9d528e106acb5c8c7d73a33a45a503af93fa5cf8576362822a79b480
                                                                                • Instruction ID: 221c4bf77953ad1b28bc1ca3c9bb1b0a95b04bc1de96f6ba59f994fa5f87eab0
                                                                                • Opcode Fuzzy Hash: 3623827a9d528e106acb5c8c7d73a33a45a503af93fa5cf8576362822a79b480
                                                                                • Instruction Fuzzy Hash: AA81E4B1A40205ABDF20FF61DC42FBF3B68AF15710F044029FD05EA196EB69DA45F6A1
                                                                                APIs
                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00FE9AD2
                                                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00FE9B8B
                                                                                • SendMessageW.USER32(?,00001102,00000002,?), ref: 00FE9BA7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Window
                                                                                • String ID: 0
                                                                                • API String ID: 2326795674-4108050209
                                                                                • Opcode ID: 4f38e9e0569986e8fe3dbb68d4ee9df2467fbfa27714acd6cd4a7055fb15d56a
                                                                                • Instruction ID: 0c61d5a46f1a3d1a846a418ae34ac54d5831db053cb553580f9e2b25e390ac78
                                                                                • Opcode Fuzzy Hash: 4f38e9e0569986e8fe3dbb68d4ee9df2467fbfa27714acd6cd4a7055fb15d56a
                                                                                • Instruction Fuzzy Hash: CB020230508381AFD725CF16CC89BAABBE5FF48320F04852DF995D62A1C7B5D944EB62
                                                                                APIs
                                                                                • GetSysColor.USER32(00000012), ref: 00FEA903
                                                                                • SetTextColor.GDI32(?,?), ref: 00FEA907
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00FEA91D
                                                                                • GetSysColor.USER32(0000000F), ref: 00FEA928
                                                                                • CreateSolidBrush.GDI32(?), ref: 00FEA92D
                                                                                • GetSysColor.USER32(00000011), ref: 00FEA945
                                                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00FEA953
                                                                                • SelectObject.GDI32(?,00000000), ref: 00FEA964
                                                                                • SetBkColor.GDI32(?,00000000), ref: 00FEA96D
                                                                                • SelectObject.GDI32(?,?), ref: 00FEA97A
                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 00FEA999
                                                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00FEA9B0
                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00FEA9C5
                                                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00FEA9ED
                                                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00FEAA14
                                                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 00FEAA32
                                                                                • DrawFocusRect.USER32(?,?), ref: 00FEAA3D
                                                                                • GetSysColor.USER32(00000011), ref: 00FEAA4B
                                                                                • SetTextColor.GDI32(?,00000000), ref: 00FEAA53
                                                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00FEAA67
                                                                                • SelectObject.GDI32(?,00FEA5FA), ref: 00FEAA7E
                                                                                • DeleteObject.GDI32(?), ref: 00FEAA89
                                                                                • SelectObject.GDI32(?,?), ref: 00FEAA8F
                                                                                • DeleteObject.GDI32(?), ref: 00FEAA94
                                                                                • SetTextColor.GDI32(?,?), ref: 00FEAA9A
                                                                                • SetBkColor.GDI32(?,?), ref: 00FEAAA4
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                • String ID:
                                                                                • API String ID: 1996641542-0
                                                                                • Opcode ID: b346e526adfaac35dc6d8e70d3078d34dc8b405decfbf6c50fdede8cbfbd79e7
                                                                                • Instruction ID: bf0429bf8e7055796d11a17f32439498e469e35878e255f3a1ed293c9cda058d
                                                                                • Opcode Fuzzy Hash: b346e526adfaac35dc6d8e70d3078d34dc8b405decfbf6c50fdede8cbfbd79e7
                                                                                • Instruction Fuzzy Hash: 3C514B7190024CEFDB109FA5DC88EAE7BB9EF48320F114225F911AB2A1D7759A44EF90
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00FE8AC1
                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FE8AD2
                                                                                • CharNextW.USER32(0000014E), ref: 00FE8B01
                                                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00FE8B42
                                                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00FE8B58
                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FE8B69
                                                                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00FE8B86
                                                                                • SetWindowTextW.USER32(?,0000014E), ref: 00FE8BD8
                                                                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00FE8BEE
                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00FE8C1F
                                                                                • _memset.LIBCMT ref: 00FE8C44
                                                                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00FE8C8D
                                                                                • _memset.LIBCMT ref: 00FE8CEC
                                                                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00FE8D16
                                                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 00FE8D6E
                                                                                • SendMessageW.USER32(?,0000133D,?,?), ref: 00FE8E1B
                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00FE8E3D
                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FE8E87
                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FE8EB4
                                                                                • DrawMenuBar.USER32(?), ref: 00FE8EC3
                                                                                • SetWindowTextW.USER32(?,0000014E), ref: 00FE8EEB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                                • String ID: 0
                                                                                • API String ID: 1073566785-4108050209
                                                                                • Opcode ID: 332ec610e18670d5a6b4797d75a587925e9edd27da2e01c1446853217038aac5
                                                                                • Instruction ID: 08a6b09bb71d0cf2317e64cfd0f5a3cd7912946571e76755905b52b5fd065ad7
                                                                                • Opcode Fuzzy Hash: 332ec610e18670d5a6b4797d75a587925e9edd27da2e01c1446853217038aac5
                                                                                • Instruction Fuzzy Hash: 0AE1A271900288AFDF20EF55CC84EEE7B79FF05760F108166F919AA190DB749A85EF60
                                                                                APIs
                                                                                • GetCursorPos.USER32(?), ref: 00FE49CA
                                                                                • GetDesktopWindow.USER32 ref: 00FE49DF
                                                                                • GetWindowRect.USER32(00000000), ref: 00FE49E6
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00FE4A48
                                                                                • DestroyWindow.USER32(?), ref: 00FE4A74
                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00FE4A9D
                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FE4ABB
                                                                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00FE4AE1
                                                                                • SendMessageW.USER32(?,00000421,?,?), ref: 00FE4AF6
                                                                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00FE4B09
                                                                                • IsWindowVisible.USER32(?), ref: 00FE4B29
                                                                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00FE4B44
                                                                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00FE4B58
                                                                                • GetWindowRect.USER32(?,?), ref: 00FE4B70
                                                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 00FE4B96
                                                                                • GetMonitorInfoW.USER32(00000000,?), ref: 00FE4BB0
                                                                                • CopyRect.USER32(?,?), ref: 00FE4BC7
                                                                                • SendMessageW.USER32(?,00000412,00000000), ref: 00FE4C32
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                • String ID: ($0$tooltips_class32
                                                                                • API String ID: 698492251-4156429822
                                                                                • Opcode ID: 51f595e5daeb4d4d9b41b84bee982b2095fd141fe37b7616da21ee386e833b9f
                                                                                • Instruction ID: e5d23ceea629196fb68e052933bf8f0fa014859fa72f1887774cc4f9a17ad44c
                                                                                • Opcode Fuzzy Hash: 51f595e5daeb4d4d9b41b84bee982b2095fd141fe37b7616da21ee386e833b9f
                                                                                • Instruction Fuzzy Hash: D8B1BD71608380AFDB04DF65C888B6ABBE4FF88714F00892DF5999B2A1D774EC05DB55
                                                                                APIs
                                                                                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00FC44AC
                                                                                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00FC44D2
                                                                                • _wcscpy.LIBCMT ref: 00FC4500
                                                                                • _wcscmp.LIBCMT ref: 00FC450B
                                                                                • _wcscat.LIBCMT ref: 00FC4521
                                                                                • _wcsstr.LIBCMT ref: 00FC452C
                                                                                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00FC4548
                                                                                • _wcscat.LIBCMT ref: 00FC4591
                                                                                • _wcscat.LIBCMT ref: 00FC4598
                                                                                • _wcsncpy.LIBCMT ref: 00FC45C3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                • API String ID: 699586101-1459072770
                                                                                • Opcode ID: 7142e91a14729902c6abeeef5a9d7f38682d091d757ca3e3d40aa770de7991f4
                                                                                • Instruction ID: d71f5e967a0f520b66f584f27d33dfaaaa1581ca33b8c0d9aeb942ec5bf8a261
                                                                                • Opcode Fuzzy Hash: 7142e91a14729902c6abeeef5a9d7f38682d091d757ca3e3d40aa770de7991f4
                                                                                • Instruction Fuzzy Hash: 5941EA32A002057BDB10BA75CC57FFF776CDF45710F04446AF905E6182EA39AA05B7A5
                                                                                APIs
                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F628BC
                                                                                • GetSystemMetrics.USER32(00000007), ref: 00F628C4
                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F628EF
                                                                                • GetSystemMetrics.USER32(00000008), ref: 00F628F7
                                                                                • GetSystemMetrics.USER32(00000004), ref: 00F6291C
                                                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00F62939
                                                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00F62949
                                                                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00F6297C
                                                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00F62990
                                                                                • GetClientRect.USER32(00000000,000000FF), ref: 00F629AE
                                                                                • GetStockObject.GDI32(00000011), ref: 00F629CA
                                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F629D5
                                                                                  • Part of subcall function 00F62344: GetCursorPos.USER32(?), ref: 00F62357
                                                                                  • Part of subcall function 00F62344: ScreenToClient.USER32(010257B0,?), ref: 00F62374
                                                                                  • Part of subcall function 00F62344: GetAsyncKeyState.USER32(00000001), ref: 00F62399
                                                                                  • Part of subcall function 00F62344: GetAsyncKeyState.USER32(00000002), ref: 00F623A7
                                                                                • SetTimer.USER32(00000000,00000000,00000028,00F61256), ref: 00F629FC
                                                                                Strings
                                                                                • 0000006689857cffffffb97400000066898d7effffffba2e00000066895580b85300000066894582b96800000066894d84ba6500000066895586b86c0000006689, xrefs: 00F9C189
                                                                                • AutoIt v3 GUI, xrefs: 00F62974
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                • String ID: 0000006689857cffffffb97400000066898d7effffffba2e00000066895580b85300000066894582b96800000066894d84ba6500000066895586b86c0000006689$AutoIt v3 GUI
                                                                                • API String ID: 1458621304-380698221
                                                                                • Opcode ID: d3e21eb1c05ac8cd9dcab3ae6d3ab6e69ab5f99de6387dcc6bd05861c8cd9a26
                                                                                • Instruction ID: feb7e52122cd0f9ec267e8109ba5bf6f91e894a8fb6e92ca1eb65f53ad859f40
                                                                                • Opcode Fuzzy Hash: d3e21eb1c05ac8cd9dcab3ae6d3ab6e69ab5f99de6387dcc6bd05861c8cd9a26
                                                                                • Instruction Fuzzy Hash: 8CB16E71A0064ADFDB24DFA8DC85BED7BB4FB48310F104129FA15EB290DB789941EB54
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?), ref: 00FE3E6F
                                                                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00FE3F2F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharMessageSendUpper
                                                                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                • API String ID: 3974292440-719923060
                                                                                • Opcode ID: 090cb805a8059f57355c3a946c0f0a6d925ddabfc950d59ce7beab709f3e6797
                                                                                • Instruction ID: b1221d73d5c96ea36b5baf67bad0a8c57621802730c0663b8f6fb6b73d8c395a
                                                                                • Opcode Fuzzy Hash: 090cb805a8059f57355c3a946c0f0a6d925ddabfc950d59ce7beab709f3e6797
                                                                                • Instruction Fuzzy Hash: F4A190316043819BCB14FF25CC56A6AB3E5FF84314F54486CB9A69B2D2CB78ED09EB41
                                                                                APIs
                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 00FBA47A
                                                                                • __swprintf.LIBCMT ref: 00FBA51B
                                                                                • _wcscmp.LIBCMT ref: 00FBA52E
                                                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00FBA583
                                                                                • _wcscmp.LIBCMT ref: 00FBA5BF
                                                                                • GetClassNameW.USER32(?,?,00000400), ref: 00FBA5F6
                                                                                • GetDlgCtrlID.USER32(?), ref: 00FBA648
                                                                                • GetWindowRect.USER32(?,?), ref: 00FBA67E
                                                                                • GetParent.USER32(?), ref: 00FBA69C
                                                                                • ScreenToClient.USER32(00000000), ref: 00FBA6A3
                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 00FBA71D
                                                                                • _wcscmp.LIBCMT ref: 00FBA731
                                                                                • GetWindowTextW.USER32(?,?,00000400), ref: 00FBA757
                                                                                • _wcscmp.LIBCMT ref: 00FBA76B
                                                                                  • Part of subcall function 00F8362C: _iswctype.LIBCMT ref: 00F83634
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                                                • String ID: %s%u
                                                                                • API String ID: 3744389584-679674701
                                                                                • Opcode ID: d60d821a6f7e36697873545cce07eaa3b41f418f7595c940a62c673215340301
                                                                                • Instruction ID: 99750c8677c03bc309599e717252d1c3e897e252e559d7202d6d4b51f464e69d
                                                                                • Opcode Fuzzy Hash: d60d821a6f7e36697873545cce07eaa3b41f418f7595c940a62c673215340301
                                                                                • Instruction Fuzzy Hash: 4DA1F171604206AFC714DF25C884FEAB7E8FF44320F148529F999C61A0EB34EA55EF92
                                                                                APIs
                                                                                • GetClassNameW.USER32(00000008,?,00000400), ref: 00FBAF18
                                                                                • _wcscmp.LIBCMT ref: 00FBAF29
                                                                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 00FBAF51
                                                                                • CharUpperBuffW.USER32(?,00000000), ref: 00FBAF6E
                                                                                • _wcscmp.LIBCMT ref: 00FBAF8C
                                                                                • _wcsstr.LIBCMT ref: 00FBAF9D
                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00FBAFD5
                                                                                • _wcscmp.LIBCMT ref: 00FBAFE5
                                                                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 00FBB00C
                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00FBB055
                                                                                • _wcscmp.LIBCMT ref: 00FBB065
                                                                                • GetClassNameW.USER32(00000010,?,00000400), ref: 00FBB08D
                                                                                • GetWindowRect.USER32(00000004,?), ref: 00FBB0F6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                                • String ID: @$ThumbnailClass
                                                                                • API String ID: 1788623398-1539354611
                                                                                • Opcode ID: aeac094001670d388bd78c0fb6a1f2fe6cd0bd5ae64072178816f821833a0da7
                                                                                • Instruction ID: 403ff4dbc70053a3d50250f37f10b4d1ab23c7ec657b1f07754c5311911fbaae
                                                                                • Opcode Fuzzy Hash: aeac094001670d388bd78c0fb6a1f2fe6cd0bd5ae64072178816f821833a0da7
                                                                                • Instruction Fuzzy Hash: BF81BF715082099FDB00EF16C885BFA77E8EF44764F04846AFD858A0A2DB74DE49EF61
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __wcsnicmp
                                                                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                                • API String ID: 1038674560-1810252412
                                                                                • Opcode ID: bd29c10f4f3b9929e764f352048464fe070e9bad12dfe04c4498d4334f01e770
                                                                                • Instruction ID: 2db60d3962a4570e13f8e393e1a5160d5b6992e564e00ff9940b64c54afbc933
                                                                                • Opcode Fuzzy Hash: bd29c10f4f3b9929e764f352048464fe070e9bad12dfe04c4498d4334f01e770
                                                                                • Instruction Fuzzy Hash: 1A31A572984309A6DB14FA92DD03EEE7774AF10760FA0051DF481750D9EF69AF04FA52
                                                                                APIs
                                                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 00FD5013
                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00FD501E
                                                                                • LoadCursorW.USER32(00000000,00007F03), ref: 00FD5029
                                                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 00FD5034
                                                                                • LoadCursorW.USER32(00000000,00007F01), ref: 00FD503F
                                                                                • LoadCursorW.USER32(00000000,00007F81), ref: 00FD504A
                                                                                • LoadCursorW.USER32(00000000,00007F88), ref: 00FD5055
                                                                                • LoadCursorW.USER32(00000000,00007F80), ref: 00FD5060
                                                                                • LoadCursorW.USER32(00000000,00007F86), ref: 00FD506B
                                                                                • LoadCursorW.USER32(00000000,00007F83), ref: 00FD5076
                                                                                • LoadCursorW.USER32(00000000,00007F85), ref: 00FD5081
                                                                                • LoadCursorW.USER32(00000000,00007F82), ref: 00FD508C
                                                                                • LoadCursorW.USER32(00000000,00007F84), ref: 00FD5097
                                                                                • LoadCursorW.USER32(00000000,00007F04), ref: 00FD50A2
                                                                                • LoadCursorW.USER32(00000000,00007F02), ref: 00FD50AD
                                                                                • LoadCursorW.USER32(00000000,00007F89), ref: 00FD50B8
                                                                                • GetCursorInfo.USER32(?), ref: 00FD50C8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor$Load$Info
                                                                                • String ID:
                                                                                • API String ID: 2577412497-0
                                                                                • Opcode ID: 045d510fe897766d54b711fe57c3ad7d6af9b4792c27b369d3a369396f3ecbaa
                                                                                • Instruction ID: c6fa28e7b2024aaee075346e31a21ada49999ef195c99ad25bca91624ed610c2
                                                                                • Opcode Fuzzy Hash: 045d510fe897766d54b711fe57c3ad7d6af9b4792c27b369d3a369396f3ecbaa
                                                                                • Instruction Fuzzy Hash: F93114B1D0831E6ADF109FB68C8995EBFE9FF04750F54452BA50CE7280DA78A5009F91
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FEA259
                                                                                • DestroyWindow.USER32(?,?), ref: 00FEA2D3
                                                                                  • Part of subcall function 00F67BCC: _memmove.LIBCMT ref: 00F67C06
                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00FEA34D
                                                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00FEA36F
                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FEA382
                                                                                • DestroyWindow.USER32(00000000), ref: 00FEA3A4
                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00F60000,00000000), ref: 00FEA3DB
                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FEA3F4
                                                                                • GetDesktopWindow.USER32 ref: 00FEA40D
                                                                                • GetWindowRect.USER32(00000000), ref: 00FEA414
                                                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00FEA42C
                                                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00FEA444
                                                                                  • Part of subcall function 00F625DB: GetWindowLongW.USER32(?,000000EB), ref: 00F625EC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                                                • String ID: 0$tooltips_class32
                                                                                • API String ID: 1297703922-3619404913
                                                                                • Opcode ID: a2f58af44aedb80b1b101b88fb0b5c23a2f17e60946bdd7369d6c9b4a328d3d2
                                                                                • Instruction ID: 3628663150f486b80fe9a611a2b4f8cf92d3af44f2a5c85fbddef3a69cdec483
                                                                                • Opcode Fuzzy Hash: a2f58af44aedb80b1b101b88fb0b5c23a2f17e60946bdd7369d6c9b4a328d3d2
                                                                                • Instruction Fuzzy Hash: C871CC71540284AFD721CF28CC48FAA7BE6FB88314F04452CF985DB2A0C7B5E906EB56
                                                                                APIs
                                                                                  • Part of subcall function 00F62612: GetWindowLongW.USER32(?,000000EB), ref: 00F62623
                                                                                • DragQueryPoint.SHELL32(?,?), ref: 00FEC627
                                                                                  • Part of subcall function 00FEAB37: ClientToScreen.USER32(?,?), ref: 00FEAB60
                                                                                  • Part of subcall function 00FEAB37: GetWindowRect.USER32(?,?), ref: 00FEABD6
                                                                                  • Part of subcall function 00FEAB37: PtInRect.USER32(?,?,00FEC014), ref: 00FEABE6
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00FEC690
                                                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00FEC69B
                                                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00FEC6BE
                                                                                • _wcscat.LIBCMT ref: 00FEC6EE
                                                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00FEC705
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00FEC71E
                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00FEC735
                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00FEC757
                                                                                • DragFinish.SHELL32(?), ref: 00FEC75E
                                                                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00FEC851
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                • API String ID: 169749273-3440237614
                                                                                • Opcode ID: 61281b441b80cbe81fc90d6941019418dd5b5be50450491cd059f8e519d683ab
                                                                                • Instruction ID: c48e6f659a685f5de295a323091a77a2af9e13d0c0768248ee6d788db019becc
                                                                                • Opcode Fuzzy Hash: 61281b441b80cbe81fc90d6941019418dd5b5be50450491cd059f8e519d683ab
                                                                                • Instruction Fuzzy Hash: A1616871108384AFC701EF65CC85DAFBBE8FF89750F00092EF595961A1DB74AA09DB92
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?), ref: 00FE4424
                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00FE446F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharMessageSendUpper
                                                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                • API String ID: 3974292440-4258414348
                                                                                • Opcode ID: e7fc49646f2288dc7f365975b1e3c4657b6292f3f0af155903f08f28905cc9f6
                                                                                • Instruction ID: 91e6ef196c06d4c159472c893183933c8466141b391d80f235cc7b50134f46e8
                                                                                • Opcode Fuzzy Hash: e7fc49646f2288dc7f365975b1e3c4657b6292f3f0af155903f08f28905cc9f6
                                                                                • Instruction Fuzzy Hash: 40917B756083019FCB04EF21C851AAEB7E5AF95354F44885CF8965B3A2CB78ED09EB81
                                                                                APIs
                                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00FEB8B4
                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00FE91C2), ref: 00FEB910
                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00FEB949
                                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00FEB98C
                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00FEB9C3
                                                                                • FreeLibrary.KERNEL32(?), ref: 00FEB9CF
                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00FEB9DF
                                                                                • DestroyIcon.USER32(?,?,?,?,?,00FE91C2), ref: 00FEB9EE
                                                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00FEBA0B
                                                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00FEBA17
                                                                                  • Part of subcall function 00F82EFD: __wcsicmp_l.LIBCMT ref: 00F82F86
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                                                • String ID: .dll$.exe$.icl
                                                                                • API String ID: 1212759294-1154884017
                                                                                • Opcode ID: ad89ff4c7eae825b5f0c2008286eb28770df386bf80e081afdf81d7c70dbc7d8
                                                                                • Instruction ID: 020910abb654dc81b1d0f8f86fe386a9caa701d3920ae1f31d9fafc7f804d56f
                                                                                • Opcode Fuzzy Hash: ad89ff4c7eae825b5f0c2008286eb28770df386bf80e081afdf81d7c70dbc7d8
                                                                                • Instruction Fuzzy Hash: 4361D071900259BAEB14DF65CC85FBF77ACFB08720F104119F915DA1D1DB78AA80EBA0
                                                                                APIs
                                                                                • GetLocalTime.KERNEL32(?), ref: 00FCDCDC
                                                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00FCDCEC
                                                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00FCDCF8
                                                                                • __wsplitpath.LIBCMT ref: 00FCDD56
                                                                                • _wcscat.LIBCMT ref: 00FCDD6E
                                                                                • _wcscat.LIBCMT ref: 00FCDD80
                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FCDD95
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FCDDA9
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FCDDDB
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FCDDFC
                                                                                • _wcscpy.LIBCMT ref: 00FCDE08
                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00FCDE47
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                                                • String ID: *.*
                                                                                • API String ID: 3566783562-438819550
                                                                                • Opcode ID: ce21a98e1a46f2faad942cfc631a8a1bab3dee001e24d1d68c6e1e206063e64f
                                                                                • Instruction ID: 0a397330c32a80c5db0453f701757ec1e9222c6e6dc01582675c3b84555cb50d
                                                                                • Opcode Fuzzy Hash: ce21a98e1a46f2faad942cfc631a8a1bab3dee001e24d1d68c6e1e206063e64f
                                                                                • Instruction Fuzzy Hash: 97619D725082469FCB10EF20C945EAEB3E8FF89324F04482DF98987251DB75EA05DB92
                                                                                APIs
                                                                                • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00FC9C7F
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00FC9CA0
                                                                                • __swprintf.LIBCMT ref: 00FC9CF9
                                                                                • __swprintf.LIBCMT ref: 00FC9D12
                                                                                • _wprintf.LIBCMT ref: 00FC9DB9
                                                                                • _wprintf.LIBCMT ref: 00FC9DD7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: LoadString__swprintf_wprintf$_memmove
                                                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                • API String ID: 311963372-3080491070
                                                                                • Opcode ID: 59ede9b40b1ddf8f7592d95be1ea177cb6a5075fe5e360228dcfcda2f1d78fad
                                                                                • Instruction ID: b8c71de2db0c422471ee1d7fd0f9a96aedb5b74f6753dc509f7fc68a21057737
                                                                                • Opcode Fuzzy Hash: 59ede9b40b1ddf8f7592d95be1ea177cb6a5075fe5e360228dcfcda2f1d78fad
                                                                                • Instruction Fuzzy Hash: 3451A53290020AAACF14FBE0DD46EEEB778AF14304F204069F54572061EB796F59EF61
                                                                                APIs
                                                                                  • Part of subcall function 00F69837: __itow.LIBCMT ref: 00F69862
                                                                                  • Part of subcall function 00F69837: __swprintf.LIBCMT ref: 00F698AC
                                                                                • CharLowerBuffW.USER32(?,?), ref: 00FCA3CB
                                                                                • GetDriveTypeW.KERNEL32 ref: 00FCA418
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FCA460
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FCA497
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FCA4C5
                                                                                  • Part of subcall function 00F67BCC: _memmove.LIBCMT ref: 00F67C06
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                • API String ID: 2698844021-4113822522
                                                                                • Opcode ID: e0f74d591cfa236cde9d115fd3c06eaac83f8562a0a79e0b0e39e90c69c61afb
                                                                                • Instruction ID: 77f62146e526ddf277acf144ebf4004b3be16a9e9a429b43010374eb4d9a7bfe
                                                                                • Opcode Fuzzy Hash: e0f74d591cfa236cde9d115fd3c06eaac83f8562a0a79e0b0e39e90c69c61afb
                                                                                • Instruction Fuzzy Hash: 0D514A715083059FC704EF20CD8296AB3E8EF98718F44896DF89657261DB75EE09DB42
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00F9E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00FBF8DF
                                                                                • LoadStringW.USER32(00000000,?,00F9E029,00000001), ref: 00FBF8E8
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                • GetModuleHandleW.KERNEL32(00000000,01025310,?,00000FFF,?,?,00F9E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00FBF90A
                                                                                • LoadStringW.USER32(00000000,?,00F9E029,00000001), ref: 00FBF90D
                                                                                • __swprintf.LIBCMT ref: 00FBF95D
                                                                                • __swprintf.LIBCMT ref: 00FBF96E
                                                                                • _wprintf.LIBCMT ref: 00FBFA17
                                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FBFA2E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                • API String ID: 984253442-2268648507
                                                                                • Opcode ID: f70040965c6b1db6dd22c28623e570dab8f21b453a10ae8b21040fd7c742ec61
                                                                                • Instruction ID: 77780a0d798412e466f2b22355211176c755695fe233215325eec5623831111a
                                                                                • Opcode Fuzzy Hash: f70040965c6b1db6dd22c28623e570dab8f21b453a10ae8b21040fd7c742ec61
                                                                                • Instruction Fuzzy Hash: D6414C7280020DAACF15FBE1DD86EEEB778AF14704F500065F505B60A6EA396F09EF61
                                                                                APIs
                                                                                • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00FE9207,?,?), ref: 00FEBA56
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00FE9207,?,?,00000000,?), ref: 00FEBA6D
                                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00FE9207,?,?,00000000,?), ref: 00FEBA78
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00FE9207,?,?,00000000,?), ref: 00FEBA85
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00FEBA8E
                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00FE9207,?,?,00000000,?), ref: 00FEBA9D
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00FEBAA6
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00FE9207,?,?,00000000,?), ref: 00FEBAAD
                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00FE9207,?,?,00000000,?), ref: 00FEBABE
                                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,00FF2CAC,?), ref: 00FEBAD7
                                                                                • GlobalFree.KERNEL32(00000000), ref: 00FEBAE7
                                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 00FEBB0B
                                                                                • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00FEBB36
                                                                                • DeleteObject.GDI32(00000000), ref: 00FEBB5E
                                                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00FEBB74
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                • String ID:
                                                                                • API String ID: 3840717409-0
                                                                                • Opcode ID: 9c9738094fce88b9f97f17eb4cdba3dc859d39e44fa05f808d6f791cab3ea10a
                                                                                • Instruction ID: 0363ba1dc5c8278dbd37169ba2f2549402d07c184132c552f09e6bc6a431261b
                                                                                • Opcode Fuzzy Hash: 9c9738094fce88b9f97f17eb4cdba3dc859d39e44fa05f808d6f791cab3ea10a
                                                                                • Instruction Fuzzy Hash: 58411C75901248EFDB119F65DC88EAB7BB9FF89B21F104068F906DB260D7349E05EB60
                                                                                APIs
                                                                                • __wsplitpath.LIBCMT ref: 00FCDA10
                                                                                • _wcscat.LIBCMT ref: 00FCDA28
                                                                                • _wcscat.LIBCMT ref: 00FCDA3A
                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FCDA4F
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FCDA63
                                                                                • GetFileAttributesW.KERNEL32(?), ref: 00FCDA7B
                                                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00FCDA95
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FCDAA7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                                                • String ID: *.*
                                                                                • API String ID: 34673085-438819550
                                                                                • Opcode ID: 8c0094f8b6d27d67d2d7c53b63ab48e99a33fb2e7f8c4e652f9f3032c589a261
                                                                                • Instruction ID: e3b388a2e86f675e097936ed28c24eed11bd907f5fbce81cdee8ab5cbc36f289
                                                                                • Opcode Fuzzy Hash: 8c0094f8b6d27d67d2d7c53b63ab48e99a33fb2e7f8c4e652f9f3032c589a261
                                                                                • Instruction Fuzzy Hash: 328193769042429FCB24EF64C946F6EB7E8AF89314F14483EF489CB251D734D944EB51
                                                                                APIs
                                                                                  • Part of subcall function 00F62612: GetWindowLongW.USER32(?,000000EB), ref: 00F62623
                                                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00FEC1FC
                                                                                • GetFocus.USER32 ref: 00FEC20C
                                                                                • GetDlgCtrlID.USER32(00000000), ref: 00FEC217
                                                                                • _memset.LIBCMT ref: 00FEC342
                                                                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00FEC36D
                                                                                • GetMenuItemCount.USER32(?), ref: 00FEC38D
                                                                                • GetMenuItemID.USER32(?,00000000), ref: 00FEC3A0
                                                                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00FEC3D4
                                                                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00FEC41C
                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FEC454
                                                                                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00FEC489
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                                • String ID: 0
                                                                                • API String ID: 1296962147-4108050209
                                                                                • Opcode ID: 5a98993c8a085560dfecfed0cd3eb6729ea808ad1755f6d9b5603698cb346ef8
                                                                                • Instruction ID: b45d58a921ea2fb8d985eb1bbff8fdd20f36f9d5072fbf885bde5c1080fa8175
                                                                                • Opcode Fuzzy Hash: 5a98993c8a085560dfecfed0cd3eb6729ea808ad1755f6d9b5603698cb346ef8
                                                                                • Instruction Fuzzy Hash: 7F8190716083819FD710DF15CC94ABBBBE4FB88724F10492EF99597291C770D906EB92
                                                                                APIs
                                                                                • GetDC.USER32(00000000), ref: 00FD738F
                                                                                • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00FD739B
                                                                                • CreateCompatibleDC.GDI32(?), ref: 00FD73A7
                                                                                • SelectObject.GDI32(00000000,?), ref: 00FD73B4
                                                                                • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00FD7408
                                                                                • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00FD7444
                                                                                • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00FD7468
                                                                                • SelectObject.GDI32(00000006,?), ref: 00FD7470
                                                                                • DeleteObject.GDI32(?), ref: 00FD7479
                                                                                • DeleteDC.GDI32(00000006), ref: 00FD7480
                                                                                • ReleaseDC.USER32(00000000,?), ref: 00FD748B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                • String ID: (
                                                                                • API String ID: 2598888154-3887548279
                                                                                • Opcode ID: 4147128e5b224ce3490da3964c457605106c63f94d3f993b008693d7a9a10317
                                                                                • Instruction ID: c4050b66677ba6044ad80ccc6d660de09b3817168dbf7c76948472f89751d515
                                                                                • Opcode Fuzzy Hash: 4147128e5b224ce3490da3964c457605106c63f94d3f993b008693d7a9a10317
                                                                                • Instruction Fuzzy Hash: 66514B71904349EFCB15DFA8CC84EAEBBB9EF48310F14852EF95A9B310D731A9449B50
                                                                                APIs
                                                                                  • Part of subcall function 00F80957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00F66B0C,?,00008000), ref: 00F80973
                                                                                  • Part of subcall function 00F64750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F64743,?,?,00F637AE,?), ref: 00F64770
                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F66BAD
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00F66CFA
                                                                                  • Part of subcall function 00F6586D: _wcscpy.LIBCMT ref: 00F658A5
                                                                                  • Part of subcall function 00F8363D: _iswctype.LIBCMT ref: 00F83645
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                                                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                                • API String ID: 537147316-1018226102
                                                                                • Opcode ID: f72877c600215acf81f565deef97c16a5d839bab6a100dc5b65b43af4144c555
                                                                                • Instruction ID: 8694eb8ef1d3d046bffd008ee5cf285fd271ae03788aa9c350c59de2c3cef51b
                                                                                • Opcode Fuzzy Hash: f72877c600215acf81f565deef97c16a5d839bab6a100dc5b65b43af4144c555
                                                                                • Instruction Fuzzy Hash: A602AC315083419FCB24EF24CC91AAFBBE5AF94314F14491DF496972A2DB38DA49EB42
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FC2D50
                                                                                • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00FC2DDD
                                                                                • GetMenuItemCount.USER32(01025890), ref: 00FC2E66
                                                                                • DeleteMenu.USER32(01025890,00000005,00000000,000000F5,?,?), ref: 00FC2EF6
                                                                                • DeleteMenu.USER32(01025890,00000004,00000000), ref: 00FC2EFE
                                                                                • DeleteMenu.USER32(01025890,00000006,00000000), ref: 00FC2F06
                                                                                • DeleteMenu.USER32(01025890,00000003,00000000), ref: 00FC2F0E
                                                                                • GetMenuItemCount.USER32(01025890), ref: 00FC2F16
                                                                                • SetMenuItemInfoW.USER32(01025890,00000004,00000000,00000030), ref: 00FC2F4C
                                                                                • GetCursorPos.USER32(?), ref: 00FC2F56
                                                                                • SetForegroundWindow.USER32(00000000), ref: 00FC2F5F
                                                                                • TrackPopupMenuEx.USER32(01025890,00000000,?,00000000,00000000,00000000), ref: 00FC2F72
                                                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00FC2F7E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                                • String ID:
                                                                                • API String ID: 3993528054-0
                                                                                • Opcode ID: d6543cb81522074d2d4e2a1701ef6e7bd41b3181f05d2628dcceacf9c15ee6e5
                                                                                • Instruction ID: 7b1af1ddf329a76cd4ba69382d6685cf20c1d70eb2e3ec5a84da74de309138f2
                                                                                • Opcode Fuzzy Hash: d6543cb81522074d2d4e2a1701ef6e7bd41b3181f05d2628dcceacf9c15ee6e5
                                                                                • Instruction Fuzzy Hash: 5371E371A0020BBAEB619F54DD86FAABF64FF05324F14021EF615AA1E1C7B16C14FB91
                                                                                APIs
                                                                                  • Part of subcall function 00F67BCC: _memmove.LIBCMT ref: 00F67C06
                                                                                • _memset.LIBCMT ref: 00FB786B
                                                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00FB78A0
                                                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00FB78BC
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00FB78D8
                                                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00FB7902
                                                                                • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00FB792A
                                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FB7935
                                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FB793A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                • API String ID: 1411258926-22481851
                                                                                • Opcode ID: dad5fce9d261575ca738fc7e3645aec1913af2785e7fb21b243a881cacd2f8b7
                                                                                • Instruction ID: c3e060450b022088ee0fe0b50c96eac408c8c6413c4f7b1fd5c77e3f17c5c981
                                                                                • Opcode Fuzzy Hash: dad5fce9d261575ca738fc7e3645aec1913af2785e7fb21b243a881cacd2f8b7
                                                                                • Instruction Fuzzy Hash: A5411572C1422DABCB11EBA4DC85DEEB7B8BF44714F004129E905A7261EA359E08EF90
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FDFDAD,?,?), ref: 00FE0E31
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharUpper
                                                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                • API String ID: 3964851224-909552448
                                                                                • Opcode ID: 24112fd9016e32051bcf2ed4a0b7e012cfcd1b24f9ba4c3c30885a96b3e1c6d7
                                                                                • Instruction ID: 1c38047a8f5a51a349242fe0a08cd324fb9b72d260a170af0eadf4282a333bd3
                                                                                • Opcode Fuzzy Hash: 24112fd9016e32051bcf2ed4a0b7e012cfcd1b24f9ba4c3c30885a96b3e1c6d7
                                                                                • Instruction Fuzzy Hash: 4A41583650028A8BCF14FE11DC62AEE3764FF11318F540454FC951B296DF7899A9EBA0
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00F9E2A0,00000010,?,Bad directive syntax error,00FEF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00FBF7C2
                                                                                • LoadStringW.USER32(00000000,?,00F9E2A0,00000010), ref: 00FBF7C9
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                • _wprintf.LIBCMT ref: 00FBF7FC
                                                                                • __swprintf.LIBCMT ref: 00FBF81E
                                                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00FBF88D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                • API String ID: 1506413516-4153970271
                                                                                • Opcode ID: 850038117cb3ef151d4d0b85ec55b1f231cbdd68f4c354830b1eba5d4d4228c3
                                                                                • Instruction ID: 797d2df06e61fa4ce92f6ba8df4e08b7dc7d2f6e2ee7008fd6af0bbfe64f789f
                                                                                • Opcode Fuzzy Hash: 850038117cb3ef151d4d0b85ec55b1f231cbdd68f4c354830b1eba5d4d4228c3
                                                                                • Instruction Fuzzy Hash: 6E21713290021EFBCF12FF91CC4AEEE7779BF18704F04446AF515660A2EA799618EB51
                                                                                APIs
                                                                                  • Part of subcall function 00F67BCC: _memmove.LIBCMT ref: 00F67C06
                                                                                  • Part of subcall function 00F67924: _memmove.LIBCMT ref: 00F679AD
                                                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00FC5330
                                                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00FC5346
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FC5357
                                                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00FC5369
                                                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00FC537A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: SendString$_memmove
                                                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                • API String ID: 2279737902-1007645807
                                                                                • Opcode ID: fd39866f584b50f81f52a42d72de090e6ad52b455046f4850360bb2de43f972e
                                                                                • Instruction ID: 2c0b636142114d3b306d6185ee3789a1d64fbdc97405502acb297fdccce187a6
                                                                                • Opcode Fuzzy Hash: fd39866f584b50f81f52a42d72de090e6ad52b455046f4850360bb2de43f972e
                                                                                • Instruction Fuzzy Hash: 9611E220A5026E79D720B662CD4AEFF7BBCEBD5F84F00042EB441A6095EAA45E44D9A0
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                                • String ID: 0.0.0.0
                                                                                • API String ID: 208665112-3771769585
                                                                                • Opcode ID: dbc932ac0b62a99b5b902de0d51d1f715c5c8577bd2954d8a6db519919cca88c
                                                                                • Instruction ID: 6ac8a9eab9c9d41937f9aaf3b7a3c57cc2947e71651458a801dc844342d0aa20
                                                                                • Opcode Fuzzy Hash: dbc932ac0b62a99b5b902de0d51d1f715c5c8577bd2954d8a6db519919cca88c
                                                                                • Instruction Fuzzy Hash: DB11D532900119ABCB24BB309D86FDE77BCEF01721F0441BAF845D6051EF78AA85AB51
                                                                                APIs
                                                                                • timeGetTime.WINMM ref: 00FC4F7A
                                                                                  • Part of subcall function 00F8049F: timeGetTime.WINMM(?,75A8B400,00F70E7B), ref: 00F804A3
                                                                                • Sleep.KERNEL32(0000000A), ref: 00FC4FA6
                                                                                • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00FC4FCA
                                                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00FC4FEC
                                                                                • SetActiveWindow.USER32 ref: 00FC500B
                                                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00FC5019
                                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00FC5038
                                                                                • Sleep.KERNEL32(000000FA), ref: 00FC5043
                                                                                • IsWindow.USER32 ref: 00FC504F
                                                                                • EndDialog.USER32(00000000), ref: 00FC5060
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                • String ID: BUTTON
                                                                                • API String ID: 1194449130-3405671355
                                                                                • Opcode ID: f59440df655a3d019c66d9d1b0b96db34543d8c1b23cbffe0ef63f25822a6428
                                                                                • Instruction ID: 9b6840a01cebf1b2d71ca98767c44578d32a82f3ad2b2086caf4e0f1ec7a6c2d
                                                                                • Opcode Fuzzy Hash: f59440df655a3d019c66d9d1b0b96db34543d8c1b23cbffe0ef63f25822a6428
                                                                                • Instruction Fuzzy Hash: 4621F37064064AAFE7305F20EECAF263B69EB46755F14102CF845C61A9CB3B9E44F761
                                                                                APIs
                                                                                  • Part of subcall function 00F69837: __itow.LIBCMT ref: 00F69862
                                                                                  • Part of subcall function 00F69837: __swprintf.LIBCMT ref: 00F698AC
                                                                                • CoInitialize.OLE32(00000000), ref: 00FCD5EA
                                                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00FCD67D
                                                                                • SHGetDesktopFolder.SHELL32(?), ref: 00FCD691
                                                                                • CoCreateInstance.OLE32(00FF2D7C,00000000,00000001,01018C1C,?), ref: 00FCD6DD
                                                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00FCD74C
                                                                                • CoTaskMemFree.OLE32(?,?), ref: 00FCD7A4
                                                                                • _memset.LIBCMT ref: 00FCD7E1
                                                                                • SHBrowseForFolderW.SHELL32(?), ref: 00FCD81D
                                                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00FCD840
                                                                                • CoTaskMemFree.OLE32(00000000), ref: 00FCD847
                                                                                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00FCD87E
                                                                                • CoUninitialize.OLE32(00000001,00000000), ref: 00FCD880
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                                • String ID:
                                                                                • API String ID: 1246142700-0
                                                                                • Opcode ID: 11976bea91e703ce7c43d49c82975df19e52a2a47031b54d34dba0a97a4b34cc
                                                                                • Instruction ID: a61b4c2fdb90eec6829d795bd20d02cc3bd02bd2041d3a59916f99aac043118d
                                                                                • Opcode Fuzzy Hash: 11976bea91e703ce7c43d49c82975df19e52a2a47031b54d34dba0a97a4b34cc
                                                                                • Instruction Fuzzy Hash: 9FB10A75A00109AFDB04DFA4CD85EAEBBB9FF48314B148069F809EB261DB34EE45DB50
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,00000001), ref: 00FBC283
                                                                                • GetWindowRect.USER32(00000000,?), ref: 00FBC295
                                                                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00FBC2F3
                                                                                • GetDlgItem.USER32(?,00000002), ref: 00FBC2FE
                                                                                • GetWindowRect.USER32(00000000,?), ref: 00FBC310
                                                                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00FBC364
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00FBC372
                                                                                • GetWindowRect.USER32(00000000,?), ref: 00FBC383
                                                                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00FBC3C6
                                                                                • GetDlgItem.USER32(?,000003EA), ref: 00FBC3D4
                                                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00FBC3F1
                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00FBC3FE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ItemMoveRect$Invalidate
                                                                                • String ID:
                                                                                • API String ID: 3096461208-0
                                                                                • Opcode ID: 97ded801c87dd4ea02b5d3bec214c8842dc1eeae4b27ffb306edc3e5bf27c591
                                                                                • Instruction ID: be62ad77cac4605fe89eb75f9e03c97da10c860c3f971a686c2ebdcd01edd696
                                                                                • Opcode Fuzzy Hash: 97ded801c87dd4ea02b5d3bec214c8842dc1eeae4b27ffb306edc3e5bf27c591
                                                                                • Instruction Fuzzy Hash: D0514071F00209AFDB18CFA9DD99AAEBBBAFB88710F14812DF515D7290D7709D049B50
                                                                                APIs
                                                                                  • Part of subcall function 00F61B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F62036,?,00000000,?,?,?,?,00F616CB,00000000,?), ref: 00F61B9A
                                                                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00F620D3
                                                                                • KillTimer.USER32(-00000001,?,?,?,?,00F616CB,00000000,?,?,00F61AE2,?,?), ref: 00F6216E
                                                                                • DestroyAcceleratorTable.USER32(00000000), ref: 00F9BCA6
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F616CB,00000000,?,?,00F61AE2,?,?), ref: 00F9BCD7
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F616CB,00000000,?,?,00F61AE2,?,?), ref: 00F9BCEE
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F616CB,00000000,?,?,00F61AE2,?,?), ref: 00F9BD0A
                                                                                • DeleteObject.GDI32(00000000), ref: 00F9BD1C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                • String ID:
                                                                                • API String ID: 641708696-0
                                                                                • Opcode ID: f5f9a8f35253a7567b9c9976454a862933f138c53be0aa7f28da5fa9df583efe
                                                                                • Instruction ID: a3d47f2d5b13dd7c83610ae5bbb3a8fdb633787b962ea3ef57ad43111320f472
                                                                                • Opcode Fuzzy Hash: f5f9a8f35253a7567b9c9976454a862933f138c53be0aa7f28da5fa9df583efe
                                                                                • Instruction Fuzzy Hash: CA61C031905A40EFDB359F14ED88B69B7F1FF40322F208429E5829B964C7B9A891FF44
                                                                                APIs
                                                                                  • Part of subcall function 00F625DB: GetWindowLongW.USER32(?,000000EB), ref: 00F625EC
                                                                                • GetSysColor.USER32(0000000F), ref: 00F621D3
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ColorLongWindow
                                                                                • String ID:
                                                                                • API String ID: 259745315-0
                                                                                • Opcode ID: f92fadcf10581399a75791eb8f5be17dd2caf9646a0c6ffd7c21b35b93ae3af4
                                                                                • Instruction ID: eeff85dea65c4e39c9fae2861ce931c1b1a5eadda80a743be698d775e9084336
                                                                                • Opcode Fuzzy Hash: f92fadcf10581399a75791eb8f5be17dd2caf9646a0c6ffd7c21b35b93ae3af4
                                                                                • Instruction Fuzzy Hash: 4441C131400948DBEF215F28EC98BB93B66EB46331F188265FE658E1E1C7758D42FB21
                                                                                APIs
                                                                                • CharLowerBuffW.USER32(?,?,00FEF910), ref: 00FCA90B
                                                                                • GetDriveTypeW.KERNEL32(00000061,010189A0,00000061), ref: 00FCA9D5
                                                                                • _wcscpy.LIBCMT ref: 00FCA9FF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharDriveLowerType_wcscpy
                                                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                • API String ID: 2820617543-1000479233
                                                                                • Opcode ID: 1ea6bd46d6a95995fc21c1db3d852ef7065b635154f646787f8ac0beeff57d0e
                                                                                • Instruction ID: 9fceca6eada4095cd7cc0f77773899bbcc2f172054dbcb8c8479c01a4aedb2fa
                                                                                • Opcode Fuzzy Hash: 1ea6bd46d6a95995fc21c1db3d852ef7065b635154f646787f8ac0beeff57d0e
                                                                                • Instruction Fuzzy Hash: A651AC315083069BC204EF24CE93FAEB7A5FF84718F54481DF496572A2DB79A909EB43
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __i64tow__itow__swprintf
                                                                                • String ID: %.15g$0x%p$False$True
                                                                                • API String ID: 421087845-2263619337
                                                                                • Opcode ID: aea3b1852071c939a924f2bf09a657b23fc0ec51f77535111becb153fb80f2b7
                                                                                • Instruction ID: 2a206c11aea2a30c305e7654caffd76d23ee0cfb01cf357581428feaaef5a307
                                                                                • Opcode Fuzzy Hash: aea3b1852071c939a924f2bf09a657b23fc0ec51f77535111becb153fb80f2b7
                                                                                • Instruction Fuzzy Hash: CC41F772904205AFEF24EF34DC42E7A73E8EF05310F64446EE549D7251EA759946BB10
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FE716A
                                                                                • CreateMenu.USER32 ref: 00FE7185
                                                                                • SetMenu.USER32(?,00000000), ref: 00FE7194
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FE7221
                                                                                • IsMenu.USER32(?), ref: 00FE7237
                                                                                • CreatePopupMenu.USER32 ref: 00FE7241
                                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00FE726E
                                                                                • DrawMenuBar.USER32 ref: 00FE7276
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                                                • String ID: 0$F
                                                                                • API String ID: 176399719-3044882817
                                                                                • Opcode ID: 8eae537bd004cd72ab9c7286076d7a3a98ac60b0086659e601936d0d39f7ebb7
                                                                                • Instruction ID: 0d97edb778f61290666747a74f7e26dfb09b8c981c10c2a176ed3b280dea49f8
                                                                                • Opcode Fuzzy Hash: 8eae537bd004cd72ab9c7286076d7a3a98ac60b0086659e601936d0d39f7ebb7
                                                                                • Instruction Fuzzy Hash: 9C417775A01349EFDB20EF65E884EAABBB5FF48310F144028FA45AB350D731A914EF90
                                                                                APIs
                                                                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00FE755E
                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 00FE7565
                                                                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00FE7578
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00FE7580
                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 00FE758B
                                                                                • DeleteDC.GDI32(00000000), ref: 00FE7594
                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 00FE759E
                                                                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00FE75B2
                                                                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00FE75BE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                • String ID: static
                                                                                • API String ID: 2559357485-2160076837
                                                                                • Opcode ID: 1687e47156aa8189da4ecb5bc0807a6b1ca7bbca6049296da1ccf38759512fc3
                                                                                • Instruction ID: 7b94dc1f9990ec5faada50cc0e7b1cb7cebf3090683df9d3d8093ee7171e1e68
                                                                                • Opcode Fuzzy Hash: 1687e47156aa8189da4ecb5bc0807a6b1ca7bbca6049296da1ccf38759512fc3
                                                                                • Instruction Fuzzy Hash: 3D318D32504398BBDF21AF65DC48FEB3B69FF09720F150225FA15A60A0C735D815EBA4
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00F86E3E
                                                                                  • Part of subcall function 00F88B28: __getptd_noexit.LIBCMT ref: 00F88B28
                                                                                • __gmtime64_s.LIBCMT ref: 00F86ED7
                                                                                • __gmtime64_s.LIBCMT ref: 00F86F0D
                                                                                • __gmtime64_s.LIBCMT ref: 00F86F2A
                                                                                • __allrem.LIBCMT ref: 00F86F80
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F86F9C
                                                                                • __allrem.LIBCMT ref: 00F86FB3
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F86FD1
                                                                                • __allrem.LIBCMT ref: 00F86FE8
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F87006
                                                                                • __invoke_watson.LIBCMT ref: 00F87077
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                                • String ID:
                                                                                • API String ID: 384356119-0
                                                                                • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                                                • Instruction ID: 74af2bf6a109c239e4efc38c091b390bfb2d473a7a9e3785347e71f93584c384
                                                                                • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                                                • Instruction Fuzzy Hash: 0A710776E00716ABEB14FF68DC41BDAB7A8AF04774F144229F514D7281E774ED40AB90
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FC2542
                                                                                • GetMenuItemInfoW.USER32(01025890,000000FF,00000000,00000030), ref: 00FC25A3
                                                                                • SetMenuItemInfoW.USER32(01025890,00000004,00000000,00000030), ref: 00FC25D9
                                                                                • Sleep.KERNEL32(000001F4), ref: 00FC25EB
                                                                                • GetMenuItemCount.USER32(?), ref: 00FC262F
                                                                                • GetMenuItemID.USER32(?,00000000), ref: 00FC264B
                                                                                • GetMenuItemID.USER32(?,-00000001), ref: 00FC2675
                                                                                • GetMenuItemID.USER32(?,?), ref: 00FC26BA
                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FC2700
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FC2714
                                                                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FC2735
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                                • String ID:
                                                                                • API String ID: 4176008265-0
                                                                                • Opcode ID: 46f53e8397087937748cd55b3ae5f3072f013129e250bcabbe922a02cfb7416c
                                                                                • Instruction ID: 7a4538a7bd727fbcb355c227884079e81e159cb94e6573db370fab9964efde1a
                                                                                • Opcode Fuzzy Hash: 46f53e8397087937748cd55b3ae5f3072f013129e250bcabbe922a02cfb7416c
                                                                                • Instruction Fuzzy Hash: AA618F7190024AAFDB61CF64CE89FBE7BB8EB45314F14046DE841A7291D735AD09FB21
                                                                                APIs
                                                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00FE6FA5
                                                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00FE6FA8
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00FE6FCC
                                                                                • _memset.LIBCMT ref: 00FE6FDD
                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FE6FEF
                                                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00FE7067
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$LongWindow_memset
                                                                                • String ID:
                                                                                • API String ID: 830647256-0
                                                                                • Opcode ID: c46176a1097d29382977b6e558b068def821a303f5d30ebf7e4a4957b8a495f6
                                                                                • Instruction ID: e3adc80e3f0c7d67ae5ccd408ff878924e45b24881bef8d38b7624ef89300e5f
                                                                                • Opcode Fuzzy Hash: c46176a1097d29382977b6e558b068def821a303f5d30ebf7e4a4957b8a495f6
                                                                                • Instruction Fuzzy Hash: 2C617A75900288AFDB21DFA4CC81EEE77B8EB08710F100159FA14EB2A1D775AE41EB90
                                                                                APIs
                                                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00FB6BBF
                                                                                • SafeArrayAllocData.OLEAUT32(?), ref: 00FB6C18
                                                                                • VariantInit.OLEAUT32(?), ref: 00FB6C2A
                                                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00FB6C4A
                                                                                • VariantCopy.OLEAUT32(?,?), ref: 00FB6C9D
                                                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00FB6CB1
                                                                                • VariantClear.OLEAUT32(?), ref: 00FB6CC6
                                                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 00FB6CD3
                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FB6CDC
                                                                                • VariantClear.OLEAUT32(?), ref: 00FB6CEE
                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FB6CF9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                • String ID:
                                                                                • API String ID: 2706829360-0
                                                                                • Opcode ID: 6cf483c1a461ed34ae3039f6a715db8fb2b3a7d13ac7b3c2f39391cc8aa008d8
                                                                                • Instruction ID: 5fdee7ae0855bbbd0c6c6d2f0a32807b9a5f05c0a3790c5c2e44729620c20d29
                                                                                • Opcode Fuzzy Hash: 6cf483c1a461ed34ae3039f6a715db8fb2b3a7d13ac7b3c2f39391cc8aa008d8
                                                                                • Instruction Fuzzy Hash: 4D413071A001199FDB00DF65DC84DEEBBB9EF48351F008069E955EB2A1CB35A949DF90
                                                                                APIs
                                                                                • WSAStartup.WSOCK32(00000101,?), ref: 00FD5793
                                                                                • inet_addr.WSOCK32(?,?,?), ref: 00FD57D8
                                                                                • gethostbyname.WSOCK32(?), ref: 00FD57E4
                                                                                • IcmpCreateFile.IPHLPAPI ref: 00FD57F2
                                                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00FD5862
                                                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00FD5878
                                                                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00FD58ED
                                                                                • WSACleanup.WSOCK32 ref: 00FD58F3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                • String ID: Ping
                                                                                • API String ID: 1028309954-2246546115
                                                                                • Opcode ID: e44c82d57cfd1d7bc7ebed95d56ec93ca844351d24ffce13da52da91b50ba669
                                                                                • Instruction ID: 887d1113956eac7a51e386c9a8949915c9c8e0893b6a900505cd86b19dda28f1
                                                                                • Opcode Fuzzy Hash: e44c82d57cfd1d7bc7ebed95d56ec93ca844351d24ffce13da52da91b50ba669
                                                                                • Instruction Fuzzy Hash: 12518071A046009FDB20AF25DC85B2A7BE5EF44B20F08452AF956DB3A1DB74E904FB41
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 00FCB4D0
                                                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00FCB546
                                                                                • GetLastError.KERNEL32 ref: 00FCB550
                                                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 00FCB5BD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                • API String ID: 4194297153-14809454
                                                                                • Opcode ID: 57c6b28f380299a3b75082d6114f2435ba47de2c5c1d9882e060432d1399a197
                                                                                • Instruction ID: 0741fadcf972ec2abec3b1bf456d3b5e096fe44947f4e0c97fa4a7368f776ded
                                                                                • Opcode Fuzzy Hash: 57c6b28f380299a3b75082d6114f2435ba47de2c5c1d9882e060432d1399a197
                                                                                • Instruction Fuzzy Hash: 50319E39E0020A9FCB00EB68CD87FA977B4FF44314F18842EE501DB295DB799A06EB41
                                                                                APIs
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                  • Part of subcall function 00FBAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FBAABC
                                                                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00FB9014
                                                                                • GetDlgCtrlID.USER32 ref: 00FB901F
                                                                                • GetParent.USER32 ref: 00FB903B
                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FB903E
                                                                                • GetDlgCtrlID.USER32(?), ref: 00FB9047
                                                                                • GetParent.USER32(?), ref: 00FB9063
                                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FB9066
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 1536045017-1403004172
                                                                                • Opcode ID: 97ee517fba25162f098d4e6dae0c64ef8a26441203cc2696dccfa37d0267a0d3
                                                                                • Instruction ID: 5fc3d9d5a187483f76015652b3b33995531b56dcb4d805e454fedf4f9bbc6c7a
                                                                                • Opcode Fuzzy Hash: 97ee517fba25162f098d4e6dae0c64ef8a26441203cc2696dccfa37d0267a0d3
                                                                                • Instruction Fuzzy Hash: 0E21F870A00148BBDF04ABA1CC85EFEBB78EF45310F104119F961972A1DB795819EF20
                                                                                APIs
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                  • Part of subcall function 00FBAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FBAABC
                                                                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00FB90FD
                                                                                • GetDlgCtrlID.USER32 ref: 00FB9108
                                                                                • GetParent.USER32 ref: 00FB9124
                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FB9127
                                                                                • GetDlgCtrlID.USER32(?), ref: 00FB9130
                                                                                • GetParent.USER32(?), ref: 00FB914C
                                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FB914F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 1536045017-1403004172
                                                                                • Opcode ID: 5665ed77f1289f64a7a3b5a3cb06418ff2a67a530d472a4ab9d7ffc854df5e95
                                                                                • Instruction ID: 4d88a4f050ff097342e12896fe8c4eef10b87558685cf0beb0b185f31b9a4560
                                                                                • Opcode Fuzzy Hash: 5665ed77f1289f64a7a3b5a3cb06418ff2a67a530d472a4ab9d7ffc854df5e95
                                                                                • Instruction Fuzzy Hash: 1B21B675A40148BBDF01ABA5CC85EFEBB78EF44310F104019B951972A1DB795519FE20
                                                                                APIs
                                                                                • GetParent.USER32 ref: 00FB916F
                                                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00FB9184
                                                                                • _wcscmp.LIBCMT ref: 00FB9196
                                                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00FB9211
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameParentSend_wcscmp
                                                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                • API String ID: 1704125052-3381328864
                                                                                • Opcode ID: 16c1f47f654e506fd8113dc86f352c4c0c34e3bd3cc9818e498e233bf4f0b717
                                                                                • Instruction ID: 0a69a49f15df177203689ffbab8198b15073425c84a9c217e574d4a94e7a24d2
                                                                                • Opcode Fuzzy Hash: 16c1f47f654e506fd8113dc86f352c4c0c34e3bd3cc9818e498e233bf4f0b717
                                                                                • Instruction Fuzzy Hash: 67112C3BA8C307BAFA113626DC06DE7379D9B15730B200026FB00E80A5FEF569557E54
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 00FD88D7
                                                                                • CoInitialize.OLE32(00000000), ref: 00FD8904
                                                                                • CoUninitialize.OLE32 ref: 00FD890E
                                                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 00FD8A0E
                                                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00FD8B3B
                                                                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00FF2C0C), ref: 00FD8B6F
                                                                                • CoGetObject.OLE32(?,00000000,00FF2C0C,?), ref: 00FD8B92
                                                                                • SetErrorMode.KERNEL32(00000000), ref: 00FD8BA5
                                                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00FD8C25
                                                                                • VariantClear.OLEAUT32(?), ref: 00FD8C35
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                                • String ID:
                                                                                • API String ID: 2395222682-0
                                                                                • Opcode ID: 0b23b84c6f1e1ba253e9abe86c454c303b65309e7e0f7cc276ce934f40a450b9
                                                                                • Instruction ID: af8ed66a066c5274a27024a3f584ac2f9bc9bf186fa7694ffc20639e6e6dba7d
                                                                                • Opcode Fuzzy Hash: 0b23b84c6f1e1ba253e9abe86c454c303b65309e7e0f7cc276ce934f40a450b9
                                                                                • Instruction Fuzzy Hash: B5C125B1608305AFC700EF64C88492AB7EAFF89798F04491EF5899B351DB71ED06DB52
                                                                                APIs
                                                                                • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00FC7A6C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ArraySafeVartype
                                                                                • String ID:
                                                                                • API String ID: 1725837607-0
                                                                                • Opcode ID: 09523e8643dc748ece51db2d18aa33d2a78b8a0e58eff7cd7e4518e798a36fe4
                                                                                • Instruction ID: 6d4530701c9af1c8dc6743c0b6a5064b29d1eeca667289fcd6f097317bbd2905
                                                                                • Opcode Fuzzy Hash: 09523e8643dc748ece51db2d18aa33d2a78b8a0e58eff7cd7e4518e798a36fe4
                                                                                • Instruction Fuzzy Hash: 86B15E7190821B9FDB00EFA4C986FBEB7B4EF49321F244429E511E7291D738A945EF90
                                                                                APIs
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00FC11F0
                                                                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00FC0268,?,00000001), ref: 00FC1204
                                                                                • GetWindowThreadProcessId.USER32(00000000), ref: 00FC120B
                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FC0268,?,00000001), ref: 00FC121A
                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FC122C
                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FC0268,?,00000001), ref: 00FC1245
                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FC0268,?,00000001), ref: 00FC1257
                                                                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00FC0268,?,00000001), ref: 00FC129C
                                                                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00FC0268,?,00000001), ref: 00FC12B1
                                                                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00FC0268,?,00000001), ref: 00FC12BC
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                • String ID:
                                                                                • API String ID: 2156557900-0
                                                                                • Opcode ID: 2fb95611cc7bbff4461c3917516736574ad246072329be2842ce963848d4c470
                                                                                • Instruction ID: dc57428bf6626ec2fe733eeca367d28649edbf659b9e12e5c10a863a9cb65b35
                                                                                • Opcode Fuzzy Hash: 2fb95611cc7bbff4461c3917516736574ad246072329be2842ce963848d4c470
                                                                                • Instruction Fuzzy Hash: D131E179A00209FBDF309F50DE89FA937A9FB56321F208119FC01CA196D37A9D40AB50
                                                                                APIs
                                                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00F6FAA6
                                                                                • OleUninitialize.OLE32(?,00000000), ref: 00F6FB45
                                                                                • UnregisterHotKey.USER32(?), ref: 00F6FC9C
                                                                                • DestroyWindow.USER32(?), ref: 00FA45D6
                                                                                • FreeLibrary.KERNEL32(?), ref: 00FA463B
                                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00FA4668
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                • String ID: close all
                                                                                • API String ID: 469580280-3243417748
                                                                                • Opcode ID: 84c1c87e8ebb90fa5317f61d2dfd7e031954c4e5d227670568d9732d846cb7a7
                                                                                • Instruction ID: 3845ac251ded4b41f5d689b7c4538658c2b1942e7e55bae0c00aac3d9295d540
                                                                                • Opcode Fuzzy Hash: 84c1c87e8ebb90fa5317f61d2dfd7e031954c4e5d227670568d9732d846cb7a7
                                                                                • Instruction Fuzzy Hash: D6A1AD71B01212CFCB28EF14C995B69F364BF46710F5442ADE80AAB261CB74ED1AEF50
                                                                                APIs
                                                                                • EnumChildWindows.USER32(?,00FBA439), ref: 00FBA377
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ChildEnumWindows
                                                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                • API String ID: 3555792229-1603158881
                                                                                • Opcode ID: 46170947069854272a0319015d636e7e9976cbaa11ba05168df9c52f6b52eec1
                                                                                • Instruction ID: e0687267744018f07a64bf6236b91557b5d19dbd2ca99ded00e178a4c9c81f4e
                                                                                • Opcode Fuzzy Hash: 46170947069854272a0319015d636e7e9976cbaa11ba05168df9c52f6b52eec1
                                                                                • Instruction Fuzzy Hash: E891B531A00606ABCB08EFA5C882BEEFBB5BF04310F548119D859A7251DF356999FF91
                                                                                APIs
                                                                                • SetWindowLongW.USER32(?,000000EB), ref: 00F62EAE
                                                                                  • Part of subcall function 00F61DB3: GetClientRect.USER32(?,?), ref: 00F61DDC
                                                                                  • Part of subcall function 00F61DB3: GetWindowRect.USER32(?,?), ref: 00F61E1D
                                                                                  • Part of subcall function 00F61DB3: ScreenToClient.USER32(?,?), ref: 00F61E45
                                                                                • GetDC.USER32 ref: 00F9CD32
                                                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00F9CD45
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00F9CD53
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00F9CD68
                                                                                • ReleaseDC.USER32(?,00000000), ref: 00F9CD70
                                                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00F9CDFB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                • String ID: U
                                                                                • API String ID: 4009187628-3372436214
                                                                                • Opcode ID: 39274a4bd5f3823f8d1a70f7d2d1c2af59480a4b1c0513226d12ae2c4812cdbb
                                                                                • Instruction ID: f742c348420d2c9bcd3d37f961f36589671247ba4ef4b412ded0a20365585e45
                                                                                • Opcode Fuzzy Hash: 39274a4bd5f3823f8d1a70f7d2d1c2af59480a4b1c0513226d12ae2c4812cdbb
                                                                                • Instruction Fuzzy Hash: 3D71D231900209DFDF219F64CC80AEA7BB5FF59360F14427AED659A2A6C7318C41FBA0
                                                                                APIs
                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00FD1A50
                                                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00FD1A7C
                                                                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00FD1ABE
                                                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00FD1AD3
                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00FD1AE0
                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00FD1B10
                                                                                • InternetCloseHandle.WININET(00000000), ref: 00FD1B57
                                                                                  • Part of subcall function 00FD2483: GetLastError.KERNEL32(?,?,00FD1817,00000000,00000000,00000001), ref: 00FD2498
                                                                                  • Part of subcall function 00FD2483: SetEvent.KERNEL32(?,?,00FD1817,00000000,00000000,00000001), ref: 00FD24AD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                                                • String ID:
                                                                                • API String ID: 2603140658-3916222277
                                                                                • Opcode ID: 7201dec2eed9d50b1a6faa182e518df11c34160dd5f394665714dbdbd0201397
                                                                                • Instruction ID: e723d13e4c35e6d760e93bb361b5e77c403fb82b601754c635f4893798a8af70
                                                                                • Opcode Fuzzy Hash: 7201dec2eed9d50b1a6faa182e518df11c34160dd5f394665714dbdbd0201397
                                                                                • Instruction Fuzzy Hash: DE4171B1901219BFEB119F50CC85FBA7BADFF48354F084127F9059A251E7749E44ABA0
                                                                                APIs
                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00FEF910), ref: 00FD8D28
                                                                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00FEF910), ref: 00FD8D5C
                                                                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00FD8ED6
                                                                                • SysFreeString.OLEAUT32(?), ref: 00FD8F00
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                                • String ID:
                                                                                • API String ID: 560350794-0
                                                                                • Opcode ID: 129971261c8709aaa18e4129c32466dd87ddc8d1c5df6c16e67214badd24fc4e
                                                                                • Instruction ID: 5e668272e2980e4daf2bb5aba616c4ff30c72cda2c3bf5ef7876ad63195910be
                                                                                • Opcode Fuzzy Hash: 129971261c8709aaa18e4129c32466dd87ddc8d1c5df6c16e67214badd24fc4e
                                                                                • Instruction Fuzzy Hash: FBF14A71A00209EFCB04DFA4C888EAEB7BAFF48354F148559F505AB251DB71AE46EF50
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FDF6B5
                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00FDF848
                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00FDF86C
                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00FDF8AC
                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00FDF8CE
                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FDFA4A
                                                                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00FDFA7C
                                                                                • CloseHandle.KERNEL32(?), ref: 00FDFAAB
                                                                                • CloseHandle.KERNEL32(?), ref: 00FDFB22
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                                • String ID:
                                                                                • API String ID: 4090791747-0
                                                                                • Opcode ID: e0659c1d29aab968e602457427d269a4020b4484c0c3e323eb43773af65c291f
                                                                                • Instruction ID: e91568690412fdd74a5549932289fe8da8b97ba8a0db0283630234fb26b7a003
                                                                                • Opcode Fuzzy Hash: e0659c1d29aab968e602457427d269a4020b4484c0c3e323eb43773af65c291f
                                                                                • Instruction Fuzzy Hash: 9FE1A1316042419FC714EF24C891F6ABBE5EF85354F18856EF89A8B3A1CB34DC49EB52
                                                                                APIs
                                                                                  • Part of subcall function 00FC466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FC3697,?), ref: 00FC468B
                                                                                  • Part of subcall function 00FC466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FC3697,?), ref: 00FC46A4
                                                                                  • Part of subcall function 00FC4A31: GetFileAttributesW.KERNEL32(?,00FC370B), ref: 00FC4A32
                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 00FC4D40
                                                                                • _wcscmp.LIBCMT ref: 00FC4D5A
                                                                                • MoveFileW.KERNEL32(?,?), ref: 00FC4D75
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                                • String ID:
                                                                                • API String ID: 793581249-0
                                                                                • Opcode ID: 9de2e8b479f3f7664c8f3ca4a9bdd92a3783bd2d669c9ac3b5d7fcda36606104
                                                                                • Instruction ID: 62a98a71590b14f2639e9770d6369db56738c541a1090cecb0094bd74f182659
                                                                                • Opcode Fuzzy Hash: 9de2e8b479f3f7664c8f3ca4a9bdd92a3783bd2d669c9ac3b5d7fcda36606104
                                                                                • Instruction Fuzzy Hash: C35132B25083859BC764EB60DD92EDBB3ECAF84750F00092EB589D3151EE34B688DB56
                                                                                APIs
                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00FE86FF
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: InvalidateRect
                                                                                • String ID:
                                                                                • API String ID: 634782764-0
                                                                                • Opcode ID: c7c53cf4273f7ab3d75f85d1e521f2814256a5ba57abb806684ca8c88ef284ea
                                                                                • Instruction ID: 7080220857ef8ee4b09294efde66f97bc9826e94ab21c19e227411070f9e2b70
                                                                                • Opcode Fuzzy Hash: c7c53cf4273f7ab3d75f85d1e521f2814256a5ba57abb806684ca8c88ef284ea
                                                                                • Instruction Fuzzy Hash: FC5196319002C4BFEB20AB26CC85F9D7B65BB053A0F604215F959EA1E1CF75AE81FB50
                                                                                APIs
                                                                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00F9C2F7
                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F9C319
                                                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00F9C331
                                                                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00F9C34F
                                                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00F9C370
                                                                                • DestroyIcon.USER32(00000000), ref: 00F9C37F
                                                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00F9C39C
                                                                                • DestroyIcon.USER32(?), ref: 00F9C3AB
                                                                                  • Part of subcall function 00FEA4AF: DeleteObject.GDI32(00000000), ref: 00FEA4E8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                                                • String ID:
                                                                                • API String ID: 2819616528-0
                                                                                • Opcode ID: 6711366eafef1305b35e61676cc146d6135092d0b7f05853d1a065c33be2608f
                                                                                • Instruction ID: b4cdc946d1061f544ee11cd27f4f0bb5a55fd2dbd78f5beec7344f74a12607af
                                                                                • Opcode Fuzzy Hash: 6711366eafef1305b35e61676cc146d6135092d0b7f05853d1a065c33be2608f
                                                                                • Instruction Fuzzy Hash: 57516D71A00609AFEF24DF64CC45FAA37B5FB54320F104528F946A7290DBB5AD50EB90
                                                                                APIs
                                                                                  • Part of subcall function 00FBA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FBA84C
                                                                                  • Part of subcall function 00FBA82C: GetCurrentThreadId.KERNEL32 ref: 00FBA853
                                                                                  • Part of subcall function 00FBA82C: AttachThreadInput.USER32(00000000,?,00FB9683,?,00000001), ref: 00FBA85A
                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FB968E
                                                                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00FB96AB
                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00FB96AE
                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FB96B7
                                                                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00FB96D5
                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00FB96D8
                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FB96E1
                                                                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00FB96F8
                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00FB96FB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                • String ID:
                                                                                • API String ID: 2014098862-0
                                                                                • Opcode ID: 3dde571e1be60607c33548f170786504b55b7c3953ff6ac0532194300c8f9e7f
                                                                                • Instruction ID: 0a3b1ead2f87e1f81772223fa4e8b53b78509c2028d3b23c7742b8a546c7a352
                                                                                • Opcode Fuzzy Hash: 3dde571e1be60607c33548f170786504b55b7c3953ff6ac0532194300c8f9e7f
                                                                                • Instruction Fuzzy Hash: 7511CEB191061CBFF6106B619C89FAA3F2DEB4C750F100425F244AB0E1C9F25C10AAA4
                                                                                APIs
                                                                                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00FB853C,00000B00,?,?), ref: 00FB892A
                                                                                • HeapAlloc.KERNEL32(00000000,?,00FB853C,00000B00,?,?), ref: 00FB8931
                                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00FB853C,00000B00,?,?), ref: 00FB8946
                                                                                • GetCurrentProcess.KERNEL32(?,00000000,?,00FB853C,00000B00,?,?), ref: 00FB894E
                                                                                • DuplicateHandle.KERNEL32(00000000,?,00FB853C,00000B00,?,?), ref: 00FB8951
                                                                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00FB853C,00000B00,?,?), ref: 00FB8961
                                                                                • GetCurrentProcess.KERNEL32(00FB853C,00000000,?,00FB853C,00000B00,?,?), ref: 00FB8969
                                                                                • DuplicateHandle.KERNEL32(00000000,?,00FB853C,00000B00,?,?), ref: 00FB896C
                                                                                • CreateThread.KERNEL32(00000000,00000000,00FB8992,00000000,00000000,00000000), ref: 00FB8986
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                • String ID:
                                                                                • API String ID: 1957940570-0
                                                                                • Opcode ID: 52c2155d8510cf34d8098dd0c2a25c8509c9f7a4a22eea72cfc0f308231978f8
                                                                                • Instruction ID: b02a172475b03c1c4af278a01374a468e998d2fdf333848646707d1b83206c45
                                                                                • Opcode Fuzzy Hash: 52c2155d8510cf34d8098dd0c2a25c8509c9f7a4a22eea72cfc0f308231978f8
                                                                                • Instruction Fuzzy Hash: 6E01A8B524034CFFE610ABA5DC89F6B3BACEB89711F418421FA05DF1A1CA749804DA21
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: NULL Pointer assignment$Not an Object type
                                                                                • API String ID: 0-572801152
                                                                                • Opcode ID: 792c8ff5a0ca5c2bbd076dc68deddec1e8ac75536400e1393d2b19e42439c2ed
                                                                                • Instruction ID: 4f0a643431b61bc41bf177bddd4a26b97871b6919e609739021946706c98cc18
                                                                                • Opcode Fuzzy Hash: 792c8ff5a0ca5c2bbd076dc68deddec1e8ac75536400e1393d2b19e42439c2ed
                                                                                • Instruction Fuzzy Hash: E7C19571E0421A9BDF10DF98D884BAEB7F6FB48314F18846AE905A7380E7B09D45DB60
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit$_memset
                                                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                • API String ID: 2862541840-625585964
                                                                                • Opcode ID: 42a331975c392d98fc3626a53b1dfa3ea6280c2738bb7d05592c2510d5593c8a
                                                                                • Instruction ID: 319e639886050f2fb13e3ed17f2838211771af40b95bafbc48cd0d7e5b75d85d
                                                                                • Opcode Fuzzy Hash: 42a331975c392d98fc3626a53b1dfa3ea6280c2738bb7d05592c2510d5593c8a
                                                                                • Instruction Fuzzy Hash: A7919C71E04219ABDF24DFE5CC48FAEBBB9EF45720F14811AF515AB280D7B09905DBA0
                                                                                APIs
                                                                                  • Part of subcall function 00FB710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FB7044,80070057,?,?,?,00FB7455), ref: 00FB7127
                                                                                  • Part of subcall function 00FB710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FB7044,80070057,?,?), ref: 00FB7142
                                                                                  • Part of subcall function 00FB710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FB7044,80070057,?,?), ref: 00FB7150
                                                                                  • Part of subcall function 00FB710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FB7044,80070057,?), ref: 00FB7160
                                                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00FD9806
                                                                                • _memset.LIBCMT ref: 00FD9813
                                                                                • _memset.LIBCMT ref: 00FD9956
                                                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00FD9982
                                                                                • CoTaskMemFree.OLE32(?), ref: 00FD998D
                                                                                Strings
                                                                                • NULL Pointer assignment, xrefs: 00FD99DB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                                                • String ID: NULL Pointer assignment
                                                                                • API String ID: 1300414916-2785691316
                                                                                • Opcode ID: 4f0bfe8e8f582ddc0c0e8332629e1e3dd42debe9d470651675bddba111b75083
                                                                                • Instruction ID: edaa451d27e05e1d7f2c1c19c913be80659ee3248a2f5ae57a5d03433228b4b6
                                                                                • Opcode Fuzzy Hash: 4f0bfe8e8f582ddc0c0e8332629e1e3dd42debe9d470651675bddba111b75083
                                                                                • Instruction Fuzzy Hash: 69914971D00229EBDB10DFA5DC81EDEBBB9EF08710F20415AF419A7281DB759A44EFA1
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00FE6E24
                                                                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 00FE6E38
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00FE6E52
                                                                                • _wcscat.LIBCMT ref: 00FE6EAD
                                                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 00FE6EC4
                                                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00FE6EF2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Window_wcscat
                                                                                • String ID: SysListView32
                                                                                • API String ID: 307300125-78025650
                                                                                • Opcode ID: 8ca7a4ce5d2b7293a9564ce0f103d9e32dd2d56fd6c1623a6696222961e88808
                                                                                • Instruction ID: 69122a4550c9ad330ef480ec4119fd6576d8a5572ac8ac4c136356cc72a29632
                                                                                • Opcode Fuzzy Hash: 8ca7a4ce5d2b7293a9564ce0f103d9e32dd2d56fd6c1623a6696222961e88808
                                                                                • Instruction Fuzzy Hash: 1341B271A0038CABDB21DF65CC85BEE77E8EF183A0F10042AF584E7191D6759D849B64
                                                                                APIs
                                                                                  • Part of subcall function 00FC3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00FC3C7A
                                                                                  • Part of subcall function 00FC3C55: Process32FirstW.KERNEL32(00000000,?), ref: 00FC3C88
                                                                                  • Part of subcall function 00FC3C55: CloseHandle.KERNEL32(00000000), ref: 00FC3D52
                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00FDE9A4
                                                                                • GetLastError.KERNEL32 ref: 00FDE9B7
                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00FDE9E6
                                                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 00FDEA63
                                                                                • GetLastError.KERNEL32(00000000), ref: 00FDEA6E
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00FDEAA3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                • String ID: SeDebugPrivilege
                                                                                • API String ID: 2533919879-2896544425
                                                                                • Opcode ID: a002f3f0cd0a614e15d54ef76d020444887311eb3c6a125ceb24788ec9ee7700
                                                                                • Instruction ID: b4a35a5fc02975ad6ad56030b3feac844a80c7cab18810936fcf9d47879eed9a
                                                                                • Opcode Fuzzy Hash: a002f3f0cd0a614e15d54ef76d020444887311eb3c6a125ceb24788ec9ee7700
                                                                                • Instruction Fuzzy Hash: 8441AD716042059FDB24EF24CC95F6DB7A6AF40314F188419F9069F3D2CBB8AC08EB92
                                                                                APIs
                                                                                • LoadIconW.USER32(00000000,00007F03), ref: 00FC3033
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: IconLoad
                                                                                • String ID: blank$info$question$stop$warning
                                                                                • API String ID: 2457776203-404129466
                                                                                • Opcode ID: 82d3cde7c21038e92ef790ae340801b7f437d410e753cdd8552dcd4822af0eed
                                                                                • Instruction ID: 4c556bb9eb9780f1762a2ae404d095f88530d9d77ee06e94acaafa21b653dd64
                                                                                • Opcode Fuzzy Hash: 82d3cde7c21038e92ef790ae340801b7f437d410e753cdd8552dcd4822af0eed
                                                                                • Instruction Fuzzy Hash: A8112E33B88347BED7149A55DC83EAB779CDF153B4B10806EF9006A181DB746F4076A4
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00FC4312
                                                                                • LoadStringW.USER32(00000000), ref: 00FC4319
                                                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00FC432F
                                                                                • LoadStringW.USER32(00000000), ref: 00FC4336
                                                                                • _wprintf.LIBCMT ref: 00FC435C
                                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FC437A
                                                                                Strings
                                                                                • %s (%d) : ==> %s: %s %s, xrefs: 00FC4357
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: HandleLoadModuleString$Message_wprintf
                                                                                • String ID: %s (%d) : ==> %s: %s %s
                                                                                • API String ID: 3648134473-3128320259
                                                                                • Opcode ID: 1ffd3f672f08f74b1a753d134eacaf0a5801acfd14207fe1115c84f878ee4fce
                                                                                • Instruction ID: f1e4a3fd2462e29c2eaf557275ec941799da8ebf64817647562ab129ba2784b6
                                                                                • Opcode Fuzzy Hash: 1ffd3f672f08f74b1a753d134eacaf0a5801acfd14207fe1115c84f878ee4fce
                                                                                • Instruction Fuzzy Hash: AC0167F290024CBFE711AB90DD89FE6776CD708700F4045A6BB45E6011E6755F895B70
                                                                                APIs
                                                                                  • Part of subcall function 00F62612: GetWindowLongW.USER32(?,000000EB), ref: 00F62623
                                                                                • GetSystemMetrics.USER32(0000000F), ref: 00FED47C
                                                                                • GetSystemMetrics.USER32(0000000F), ref: 00FED49C
                                                                                • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00FED6D7
                                                                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00FED6F5
                                                                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00FED716
                                                                                • ShowWindow.USER32(00000003,00000000), ref: 00FED735
                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00FED75A
                                                                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 00FED77D
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                • String ID:
                                                                                • API String ID: 1211466189-0
                                                                                • Opcode ID: 7aeece943b5a74e481abaf9641d7f3becfa5205f26d0abec3dda599fb0d25e76
                                                                                • Instruction ID: 90064af77578a12d9198cecb82ce532bd7eb06c81acac51b862e424dfff381aa
                                                                                • Opcode Fuzzy Hash: 7aeece943b5a74e481abaf9641d7f3becfa5205f26d0abec3dda599fb0d25e76
                                                                                • Instruction Fuzzy Hash: 51B1BA35A00269EFDF14CF6AC9C57AD7BB1BF04710F088069EC48AF695D774A950EB90
                                                                                APIs
                                                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00F9C1C7,00000004,00000000,00000000,00000000), ref: 00F62ACF
                                                                                • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00F9C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00F62B17
                                                                                • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00F9C1C7,00000004,00000000,00000000,00000000), ref: 00F9C21A
                                                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00F9C1C7,00000004,00000000,00000000,00000000), ref: 00F9C286
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ShowWindow
                                                                                • String ID:
                                                                                • API String ID: 1268545403-0
                                                                                • Opcode ID: bdb2a9a515198fcf3f8956619ec2d9fdba86ae85aac94fbe32f57d0631c35d45
                                                                                • Instruction ID: 5b8b1c2fc4f1dd986b6950130efdba2f380f0d5eab0f5baa81508753954eaeac
                                                                                • Opcode Fuzzy Hash: bdb2a9a515198fcf3f8956619ec2d9fdba86ae85aac94fbe32f57d0631c35d45
                                                                                • Instruction Fuzzy Hash: FC412A31E08FC09BDBB59B68DCCCB7B7B92AB85320F14891DE08786561C6B9A845F750
                                                                                APIs
                                                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 00FC70DD
                                                                                  • Part of subcall function 00F80DB6: std::exception::exception.LIBCMT ref: 00F80DEC
                                                                                  • Part of subcall function 00F80DB6: __CxxThrowException@8.LIBCMT ref: 00F80E01
                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00FC7114
                                                                                • EnterCriticalSection.KERNEL32(?), ref: 00FC7130
                                                                                • _memmove.LIBCMT ref: 00FC717E
                                                                                • _memmove.LIBCMT ref: 00FC719B
                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 00FC71AA
                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00FC71BF
                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FC71DE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                                                • String ID:
                                                                                • API String ID: 256516436-0
                                                                                • Opcode ID: b03d3f4a9f4938275966b3e60a91b4f2cf723c34ce1da08672fa441dc24ce74c
                                                                                • Instruction ID: 0fe295a43a033ed71d15238acd8e18c69c99b1cdff1b33341077d1b0bf7551f3
                                                                                • Opcode Fuzzy Hash: b03d3f4a9f4938275966b3e60a91b4f2cf723c34ce1da08672fa441dc24ce74c
                                                                                • Instruction Fuzzy Hash: CB315E32900205EBDB50EFA4DD85EABB7B8EF45710F1481A9F9049B256DB349A14EB60
                                                                                APIs
                                                                                • DeleteObject.GDI32(00000000), ref: 00FE61EB
                                                                                • GetDC.USER32(00000000), ref: 00FE61F3
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FE61FE
                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00FE620A
                                                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00FE6246
                                                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00FE6257
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00FE902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00FE6291
                                                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00FE62B1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                • String ID:
                                                                                • API String ID: 3864802216-0
                                                                                • Opcode ID: 5d5856676a2817a2e66859848f3a85e2de2c7e4e05ef0779d3e4a50b473070aa
                                                                                • Instruction ID: 5e3c823a8677593a8033204d4bee2b898d92cd0fd69d3b64ac1107025269bc3c
                                                                                • Opcode Fuzzy Hash: 5d5856676a2817a2e66859848f3a85e2de2c7e4e05ef0779d3e4a50b473070aa
                                                                                • Instruction Fuzzy Hash: 2B316B72201258BFEF118F51CC8AFEA3BA9EF59765F044065FE08DE2A1C6759841DB60
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memcmp
                                                                                • String ID:
                                                                                • API String ID: 2931989736-0
                                                                                • Opcode ID: 80acb14944081705a3e4ab242875e548b610543b93063e2b4dc524dab64a32a1
                                                                                • Instruction ID: 3f6096ccb6ffb795440c450837b7c0697e58b3e1943350d2718f44d2c66c1d70
                                                                                • Opcode Fuzzy Hash: 80acb14944081705a3e4ab242875e548b610543b93063e2b4dc524dab64a32a1
                                                                                • Instruction Fuzzy Hash: FA21AAB27016097BE605F7129D42FFF775DAE51368F044010FE0456747EB98DE11BAA1
                                                                                APIs
                                                                                  • Part of subcall function 00F69837: __itow.LIBCMT ref: 00F69862
                                                                                  • Part of subcall function 00F69837: __swprintf.LIBCMT ref: 00F698AC
                                                                                  • Part of subcall function 00F7FC86: _wcscpy.LIBCMT ref: 00F7FCA9
                                                                                • _wcstok.LIBCMT ref: 00FCEC94
                                                                                • _wcscpy.LIBCMT ref: 00FCED23
                                                                                • _memset.LIBCMT ref: 00FCED56
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                                • String ID: X
                                                                                • API String ID: 774024439-3081909835
                                                                                • Opcode ID: 38c0329c9fc5d78acf237b75add875515173ab819a49bc53a46ee4d0e04c90e1
                                                                                • Instruction ID: 1380d6bbc215c1cbf656da6beb73b3373a0e9c5b7ff749278534839238cceaea
                                                                                • Opcode Fuzzy Hash: 38c0329c9fc5d78acf237b75add875515173ab819a49bc53a46ee4d0e04c90e1
                                                                                • Instruction Fuzzy Hash: 91C18F315083419FC754EF24C982E5AB7E4FF85314F00492DF8999B2A2DB74ED49EB42
                                                                                APIs
                                                                                • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00FD6C00
                                                                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00FD6C21
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FD6C34
                                                                                • htons.WSOCK32(?,?,?,00000000,?), ref: 00FD6CEA
                                                                                • inet_ntoa.WSOCK32(?), ref: 00FD6CA7
                                                                                  • Part of subcall function 00FBA7E9: _strlen.LIBCMT ref: 00FBA7F3
                                                                                  • Part of subcall function 00FBA7E9: _memmove.LIBCMT ref: 00FBA815
                                                                                • _strlen.LIBCMT ref: 00FD6D44
                                                                                • _memmove.LIBCMT ref: 00FD6DAD
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                                                • String ID:
                                                                                • API String ID: 3619996494-0
                                                                                • Opcode ID: f7f1a07ef94b2b7c985f1fb01ec11b8d172461895cda39ceebe9a5514a75a71c
                                                                                • Instruction ID: 0fd7c62477e0e44f3c5b06965954f5df08bd72a905eba56139fec1210a58e5cb
                                                                                • Opcode Fuzzy Hash: f7f1a07ef94b2b7c985f1fb01ec11b8d172461895cda39ceebe9a5514a75a71c
                                                                                • Instruction Fuzzy Hash: 4C810272608300ABC710EB24DC82F6EB7AAEF94724F144A1EF545DB292DA74ED05EB51
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c80ad53f78e5a48db0d795e3b6eb54ebd6a9af8c0c4fccd1b38d5c21756d2105
                                                                                • Instruction ID: 5d6bbc12e7a9f77aaf6c0c67b29671e169be3cb5776ded7d47de7d288c226064
                                                                                • Opcode Fuzzy Hash: c80ad53f78e5a48db0d795e3b6eb54ebd6a9af8c0c4fccd1b38d5c21756d2105
                                                                                • Instruction Fuzzy Hash: 8E715F31900109EFDF14CF98CC85ABEBB75FF86324F288259F915AB251C734AA51EB61
                                                                                APIs
                                                                                • IsWindow.USER32(00A26198), ref: 00FEB3EB
                                                                                • IsWindowEnabled.USER32(00A26198), ref: 00FEB3F7
                                                                                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00FEB4DB
                                                                                • SendMessageW.USER32(00A26198,000000B0,?,?), ref: 00FEB512
                                                                                • IsDlgButtonChecked.USER32(?,?), ref: 00FEB54F
                                                                                • GetWindowLongW.USER32(00A26198,000000EC), ref: 00FEB571
                                                                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00FEB589
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                • String ID:
                                                                                • API String ID: 4072528602-0
                                                                                • Opcode ID: 231c3d73edd342813bad79a5df4a1ec8f1db13d7869cdcf0ee7acb62ef85c284
                                                                                • Instruction ID: c24e3a89b4edb67135dea7bb55d0200694b4e253bd102d6e49781f0e3056570e
                                                                                • Opcode Fuzzy Hash: 231c3d73edd342813bad79a5df4a1ec8f1db13d7869cdcf0ee7acb62ef85c284
                                                                                • Instruction Fuzzy Hash: 2D718D34A00284AFDB21DF56CCD5FBB7BA9FF09320F144059E986972A2C776AD40EB50
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FDF448
                                                                                • _memset.LIBCMT ref: 00FDF511
                                                                                • ShellExecuteExW.SHELL32(?), ref: 00FDF556
                                                                                  • Part of subcall function 00F69837: __itow.LIBCMT ref: 00F69862
                                                                                  • Part of subcall function 00F69837: __swprintf.LIBCMT ref: 00F698AC
                                                                                  • Part of subcall function 00F7FC86: _wcscpy.LIBCMT ref: 00F7FCA9
                                                                                • GetProcessId.KERNEL32(00000000), ref: 00FDF5CD
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00FDF5FC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                                                • String ID: @
                                                                                • API String ID: 3522835683-2766056989
                                                                                • Opcode ID: 3be5f63f677ea42ab585a04678283312ba391766f4e63b028d95e0db0981e80e
                                                                                • Instruction ID: fa7a4ed70737ab200cd385beb80503f66d40054658c6865b6767935d5b13607e
                                                                                • Opcode Fuzzy Hash: 3be5f63f677ea42ab585a04678283312ba391766f4e63b028d95e0db0981e80e
                                                                                • Instruction Fuzzy Hash: B361C375A00619DFCB14EFA4C8819AEB7F5FF49310F18806AE856AB351CB34AD45EF80
                                                                                APIs
                                                                                • GetParent.USER32(?), ref: 00FC0F8C
                                                                                • GetKeyboardState.USER32(?), ref: 00FC0FA1
                                                                                • SetKeyboardState.USER32(?), ref: 00FC1002
                                                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 00FC1030
                                                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 00FC104F
                                                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00FC1095
                                                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00FC10B8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                • String ID:
                                                                                • API String ID: 87235514-0
                                                                                • Opcode ID: d917f40d2c8bf23fec78f496e10be2c46265467785e53a538e9fab61d661eb73
                                                                                • Instruction ID: a766cc5db20dcaf20d046fed444245f5315c46512ccbbe456f333262b415abc3
                                                                                • Opcode Fuzzy Hash: d917f40d2c8bf23fec78f496e10be2c46265467785e53a538e9fab61d661eb73
                                                                                • Instruction Fuzzy Hash: 9F5102A0A447D67DFB3642348D16FBABEA96B07310F08858DE1D4858C3C798DCE9E750
                                                                                APIs
                                                                                • GetParent.USER32(00000000), ref: 00FC0DA5
                                                                                • GetKeyboardState.USER32(?), ref: 00FC0DBA
                                                                                • SetKeyboardState.USER32(?), ref: 00FC0E1B
                                                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00FC0E47
                                                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00FC0E64
                                                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00FC0EA8
                                                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00FC0EC9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                • String ID:
                                                                                • API String ID: 87235514-0
                                                                                • Opcode ID: 6e4cd8529b3cc7b6864c5ec431db11153f039da79cec9a7f56e76fb27044c3ad
                                                                                • Instruction ID: 93a2b2c18bf5a8f311d1d194138a627c56811f7f5079d47e9b1aa653072fd361
                                                                                • Opcode Fuzzy Hash: 6e4cd8529b3cc7b6864c5ec431db11153f039da79cec9a7f56e76fb27044c3ad
                                                                                • Instruction Fuzzy Hash: C95117A09447D7BDFB3243748D56FBA7E996B06310F08888CE1D54A4C3CB95AC99F760
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsncpy$LocalTime
                                                                                • String ID:
                                                                                • API String ID: 2945705084-0
                                                                                • Opcode ID: 6bfd51e04f6b9d914ca41130135a6b3a244ff50249f3f0f489ac2d3b6b3e318e
                                                                                • Instruction ID: 04fa87f59d24ddf0238e3249424bc3ee0a8d640fe6f343c1375af32e0ef8cf02
                                                                                • Opcode Fuzzy Hash: 6bfd51e04f6b9d914ca41130135a6b3a244ff50249f3f0f489ac2d3b6b3e318e
                                                                                • Instruction Fuzzy Hash: C841A375C1161976CB11FBB48C86ACFB3B89F04710F508956E909E3221EB38B785E7A6
                                                                                APIs
                                                                                • GetCursorPos.USER32(?), ref: 00F62357
                                                                                • ScreenToClient.USER32(010257B0,?), ref: 00F62374
                                                                                • GetAsyncKeyState.USER32(00000001), ref: 00F62399
                                                                                • GetAsyncKeyState.USER32(00000002), ref: 00F623A7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AsyncState$ClientCursorScreen
                                                                                • String ID: -es
                                                                                • API String ID: 4210589936-508736453
                                                                                • Opcode ID: c8ce6eb02ed54f4ac48fa12040a095d7123f5c2525830a7139c1d234bb66c1f7
                                                                                • Instruction ID: 57d9ebb8aacaa69f244e7debb6ae1e1c0f1ccdb62d1c1b4a497d6b7500ecb2c1
                                                                                • Opcode Fuzzy Hash: c8ce6eb02ed54f4ac48fa12040a095d7123f5c2525830a7139c1d234bb66c1f7
                                                                                • Instruction Fuzzy Hash: F9418E35A04609FBDF258F68CC45AEDBB74BB05370F20435AF828962A0CB349954EF91
                                                                                APIs
                                                                                  • Part of subcall function 00FC466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FC3697,?), ref: 00FC468B
                                                                                  • Part of subcall function 00FC466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FC3697,?), ref: 00FC46A4
                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 00FC36B7
                                                                                • _wcscmp.LIBCMT ref: 00FC36D3
                                                                                • MoveFileW.KERNEL32(?,?), ref: 00FC36EB
                                                                                • _wcscat.LIBCMT ref: 00FC3733
                                                                                • SHFileOperationW.SHELL32(?), ref: 00FC379F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                                                • String ID: \*.*
                                                                                • API String ID: 1377345388-1173974218
                                                                                • Opcode ID: 88f9b541a5d264d3121c250b003b9c1a01403072dbe191d680a4f52ad8f1e883
                                                                                • Instruction ID: 2f2981383f5a67c22a89aa541e9ef21ea77bc55ad087895485638f3b95875c31
                                                                                • Opcode Fuzzy Hash: 88f9b541a5d264d3121c250b003b9c1a01403072dbe191d680a4f52ad8f1e883
                                                                                • Instruction Fuzzy Hash: 874182B1508345AEC751EF64C952FDFB7E8AF88390F00482EB499C7251EA38D689E752
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FE72AA
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FE7351
                                                                                • IsMenu.USER32(?), ref: 00FE7369
                                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00FE73B1
                                                                                • DrawMenuBar.USER32 ref: 00FE73C4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Item$DrawInfoInsert_memset
                                                                                • String ID: 0
                                                                                • API String ID: 3866635326-4108050209
                                                                                • Opcode ID: b5f68f6d4eb7393615f19bdf0ff9cb3c58974d55cd0650e3b72484a1547d4a0f
                                                                                • Instruction ID: cf82c2b98dc90867e9a4db2a77f443e8af34b5fff4e2859e641ddcf97e68463a
                                                                                • Opcode Fuzzy Hash: b5f68f6d4eb7393615f19bdf0ff9cb3c58974d55cd0650e3b72484a1547d4a0f
                                                                                • Instruction Fuzzy Hash: EE413975A04389EFDB20EF51D884AAABBF4FB04320F14842AFD45AB250D771AD54EF61
                                                                                APIs
                                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00FE0FD4
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FE0FFE
                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00FE10B5
                                                                                  • Part of subcall function 00FE0FA5: RegCloseKey.ADVAPI32(?), ref: 00FE101B
                                                                                  • Part of subcall function 00FE0FA5: FreeLibrary.KERNEL32(?), ref: 00FE106D
                                                                                  • Part of subcall function 00FE0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00FE1090
                                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00FE1058
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                                • String ID:
                                                                                • API String ID: 395352322-0
                                                                                • Opcode ID: cf4f0fd7ca6297fb9a09815ece4c7d47ee89c0d3eeac7039a812f3b2319223c5
                                                                                • Instruction ID: d93a997db372f83c611f0b456c5d5b8e95461194c7839e013da7a17c3250226c
                                                                                • Opcode Fuzzy Hash: cf4f0fd7ca6297fb9a09815ece4c7d47ee89c0d3eeac7039a812f3b2319223c5
                                                                                • Instruction Fuzzy Hash: CA31EE71D01149BFDB259F91DC89EFFB7BCEF08310F00016AE616A6151DA745E89AAA0
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00FE62EC
                                                                                • GetWindowLongW.USER32(00A26198,000000F0), ref: 00FE631F
                                                                                • GetWindowLongW.USER32(00A26198,000000F0), ref: 00FE6354
                                                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00FE6386
                                                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00FE63B0
                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00FE63C1
                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00FE63DB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: LongWindow$MessageSend
                                                                                • String ID:
                                                                                • API String ID: 2178440468-0
                                                                                • Opcode ID: 9d449162d25c3612f776c2a3bfb2dd0337518c3e7bd6e4e7f0e00d072bc3b58b
                                                                                • Instruction ID: 9ac514559b6d739968f6a6c9be154723fe58523e589a28f9c8893bd8a386f73e
                                                                                • Opcode Fuzzy Hash: 9d449162d25c3612f776c2a3bfb2dd0337518c3e7bd6e4e7f0e00d072bc3b58b
                                                                                • Instruction Fuzzy Hash: B5310731A402989FDB30CF1ADC84F5937E1FB59764F2901A4F951DF2B2CBB2A844AB51
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FBDB2E
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FBDB54
                                                                                • SysAllocString.OLEAUT32(00000000), ref: 00FBDB57
                                                                                • SysAllocString.OLEAUT32(?), ref: 00FBDB75
                                                                                • SysFreeString.OLEAUT32(?), ref: 00FBDB7E
                                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00FBDBA3
                                                                                • SysAllocString.OLEAUT32(?), ref: 00FBDBB1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                • String ID:
                                                                                • API String ID: 3761583154-0
                                                                                • Opcode ID: 9634495920697e5123fe67512ca4590cc3b4332621669254863ed55894632844
                                                                                • Instruction ID: 0f5d97be0bec2203b542640d95b38ba567b0a09b8a63bf1ee5b7df7d12473a3f
                                                                                • Opcode Fuzzy Hash: 9634495920697e5123fe67512ca4590cc3b4332621669254863ed55894632844
                                                                                • Instruction Fuzzy Hash: 3821B536601219AFDF10DFA9DC84DFB73ACFB48360B018125F914DB290E7709D45AB61
                                                                                APIs
                                                                                  • Part of subcall function 00FD7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00FD7DB6
                                                                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00FD61C6
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FD61D5
                                                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00FD620E
                                                                                • connect.WSOCK32(00000000,?,00000010), ref: 00FD6217
                                                                                • WSAGetLastError.WSOCK32 ref: 00FD6221
                                                                                • closesocket.WSOCK32(00000000), ref: 00FD624A
                                                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00FD6263
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                                                • String ID:
                                                                                • API String ID: 910771015-0
                                                                                • Opcode ID: b131f2051952fcc2e874b1ac3aaf92afaae7d5d715271e11e84462e3fa4e1349
                                                                                • Instruction ID: a9ec85d82138411d90334a3bd49fb3a9685502e65b4b56e7273acd39dc8e5de1
                                                                                • Opcode Fuzzy Hash: b131f2051952fcc2e874b1ac3aaf92afaae7d5d715271e11e84462e3fa4e1349
                                                                                • Instruction Fuzzy Hash: 4C318471600118ABEF10AF64CC85BBD77AEEB45765F08402AFD05DB291DB74AD08ABA1
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __wcsnicmp
                                                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                • API String ID: 1038674560-2734436370
                                                                                • Opcode ID: 5d83b7902a83e54bdeecb94cdbbbdba4f79b0a87656544069b38a897294cfcdc
                                                                                • Instruction ID: 2d91a4aaa1130ecbf85fbca108037f63f5cc6f36ccca9e28dcaa35ab8987eed2
                                                                                • Opcode Fuzzy Hash: 5d83b7902a83e54bdeecb94cdbbbdba4f79b0a87656544069b38a897294cfcdc
                                                                                • Instruction Fuzzy Hash: 3B21987260411166C320FA36AC02FFB73D9EF55320F20403AF946C60A1EF549E4AF795
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FBDC09
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FBDC2F
                                                                                • SysAllocString.OLEAUT32(00000000), ref: 00FBDC32
                                                                                • SysAllocString.OLEAUT32 ref: 00FBDC53
                                                                                • SysFreeString.OLEAUT32 ref: 00FBDC5C
                                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00FBDC76
                                                                                • SysAllocString.OLEAUT32(?), ref: 00FBDC84
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                • String ID:
                                                                                • API String ID: 3761583154-0
                                                                                • Opcode ID: 4411edc6e95a56760184b0975bcf57794d7d3bd6049eb95373c649c764a138dd
                                                                                • Instruction ID: 2264402a8520adc09f094d29a5dbfe141840ce8c99677b786132e864b41e280c
                                                                                • Opcode Fuzzy Hash: 4411edc6e95a56760184b0975bcf57794d7d3bd6049eb95373c649c764a138dd
                                                                                • Instruction Fuzzy Hash: BD218876604109AFDB10DFA9DC88DFB77ECEB08360B108125F914CB2A1EA74DD45EB65
                                                                                APIs
                                                                                  • Part of subcall function 00F62612: GetWindowLongW.USER32(?,000000EB), ref: 00F62623
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00FEB192
                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00FEB1B7
                                                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00FEB1CF
                                                                                • GetSystemMetrics.USER32(00000004), ref: 00FEB1F8
                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00FD0E90,00000000), ref: 00FEB216
                                                                                Strings
                                                                                • 0000006689857cffffffb97400000066898d7effffffba2e00000066895580b85300000066894582b96800000066894d84ba6500000066895586b86c0000006689, xrefs: 00FEB19B, 00FEB1E3
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Long$MetricsSystem
                                                                                • String ID: 0000006689857cffffffb97400000066898d7effffffba2e00000066895580b85300000066894582b96800000066894d84ba6500000066895586b86c0000006689
                                                                                • API String ID: 2294984445-365026190
                                                                                • Opcode ID: f232b152d19e4a42969a1ffc3f0e844cc445ccdfb735c46e116f4c15ee122a9f
                                                                                • Instruction ID: 88e382391f245de844264d06bebd2936bc260baa43d2e2861a4129bf648f0733
                                                                                • Opcode Fuzzy Hash: f232b152d19e4a42969a1ffc3f0e844cc445ccdfb735c46e116f4c15ee122a9f
                                                                                • Instruction Fuzzy Hash: 522180719106A5AFCB209F39DC44A6B37A4FB05331F244729FA26D71E0D7349811AB90
                                                                                APIs
                                                                                  • Part of subcall function 00F61D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F61D73
                                                                                  • Part of subcall function 00F61D35: GetStockObject.GDI32(00000011), ref: 00F61D87
                                                                                  • Part of subcall function 00F61D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F61D91
                                                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00FE7632
                                                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00FE763F
                                                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00FE764A
                                                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00FE7659
                                                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00FE7665
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CreateObjectStockWindow
                                                                                • String ID: Msctls_Progress32
                                                                                • API String ID: 1025951953-3636473452
                                                                                • Opcode ID: e206fce1618b21d4e37477f239effb9e951ac71bb9bf97c6cbbb16a4210468f5
                                                                                • Instruction ID: 0c2385c7e8fac60e24fae058b4ba345f8201538e49ab2bfc4380dc09d1fc0442
                                                                                • Opcode Fuzzy Hash: e206fce1618b21d4e37477f239effb9e951ac71bb9bf97c6cbbb16a4210468f5
                                                                                • Instruction Fuzzy Hash: 7111D0B2110219BFEF109F65CC85EE77F6DFF087A8F014114FA04A6050CA729C21EBA4
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00F83F85), ref: 00F84085
                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00F8408C
                                                                                • EncodePointer.KERNEL32(00000000), ref: 00F84097
                                                                                • DecodePointer.KERNEL32(00F83F85), ref: 00F840B2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                • String ID: RoUninitialize$combase.dll
                                                                                • API String ID: 3489934621-2819208100
                                                                                • Opcode ID: 74bb71d2cb89c291670823238c71f9ecf2e8a4ac8e7e94c9f00c307d51a5facc
                                                                                • Instruction ID: ed793dfcf4fb20d8fb3d6463e56683ac1eb9ce65b56c05924e083705b9264c18
                                                                                • Opcode Fuzzy Hash: 74bb71d2cb89c291670823238c71f9ecf2e8a4ac8e7e94c9f00c307d51a5facc
                                                                                • Instruction Fuzzy Hash: FBE09A706453499FEA70AF61EC49B553AB4BB08742F204025FA51D90A4CB7F9504AB15
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove$__itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 3253778849-0
                                                                                • Opcode ID: 06c3e0da596de7e5ebd166ea91c544cb533233ce1895cc83c049d75c6dd0b7a7
                                                                                • Instruction ID: 07fb2884ef7fc78834e831f8c78767f0f0de13f452b7b61412fdc9c0a8482944
                                                                                • Opcode Fuzzy Hash: 06c3e0da596de7e5ebd166ea91c544cb533233ce1895cc83c049d75c6dd0b7a7
                                                                                • Instruction Fuzzy Hash: EE618A3190865A9BCF01FF60CD82FFE37A9AF05308F444919F855AB292DB79A905EB50
                                                                                APIs
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                  • Part of subcall function 00FE0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FDFDAD,?,?), ref: 00FE0E31
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FE02BD
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FE02FD
                                                                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00FE0320
                                                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00FE0349
                                                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00FE038C
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00FE0399
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                                                • String ID:
                                                                                • API String ID: 4046560759-0
                                                                                • Opcode ID: ba80bf8d8ea640208ea9d272c01d1c97ca0f8b900728768c6b55cde1f75a86ce
                                                                                • Instruction ID: cf38829e0910273689237eb64067e0130599521cd1be2ab1aac388bc117c6c3f
                                                                                • Opcode Fuzzy Hash: ba80bf8d8ea640208ea9d272c01d1c97ca0f8b900728768c6b55cde1f75a86ce
                                                                                • Instruction Fuzzy Hash: 9E516831508244AFC710EF64CC85EAABBE8FF84314F44491DF5858B2A2DB75E949EB52
                                                                                APIs
                                                                                • GetMenu.USER32(?), ref: 00FE57FB
                                                                                • GetMenuItemCount.USER32(00000000), ref: 00FE5832
                                                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00FE585A
                                                                                • GetMenuItemID.USER32(?,?), ref: 00FE58C9
                                                                                • GetSubMenu.USER32(?,?), ref: 00FE58D7
                                                                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 00FE5928
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Item$CountMessagePostString
                                                                                • String ID:
                                                                                • API String ID: 650687236-0
                                                                                • Opcode ID: 963d1db922e6a27bd1336cf70b3e9e1da89eaabe738039d7b9a92e4ca41f7007
                                                                                • Instruction ID: f8e7042bcdbe34ccbf8a581ed57068cdf7cd5e7bb1bbbc0af35875f838997ae5
                                                                                • Opcode Fuzzy Hash: 963d1db922e6a27bd1336cf70b3e9e1da89eaabe738039d7b9a92e4ca41f7007
                                                                                • Instruction Fuzzy Hash: 33514B36E00659EFCF11EF65C885AAEB7B5EF48724F144069E801BB351CB74AE41EB90
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 00FBEF06
                                                                                • VariantClear.OLEAUT32(00000013), ref: 00FBEF78
                                                                                • VariantClear.OLEAUT32(00000000), ref: 00FBEFD3
                                                                                • _memmove.LIBCMT ref: 00FBEFFD
                                                                                • VariantClear.OLEAUT32(?), ref: 00FBF04A
                                                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00FBF078
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$Clear$ChangeInitType_memmove
                                                                                • String ID:
                                                                                • API String ID: 1101466143-0
                                                                                • Opcode ID: 818437e6b300532a6084c5d441f44c61650bee65897464abaa00bcf7649d2e24
                                                                                • Instruction ID: 155e335a9652288e044a8a78a11e81214ad8ff77b97e88bf924d29b77e49c281
                                                                                • Opcode Fuzzy Hash: 818437e6b300532a6084c5d441f44c61650bee65897464abaa00bcf7649d2e24
                                                                                • Instruction Fuzzy Hash: 2B5178B5A00209EFCB10DF58C880AAAB7B8FF4C350B15856AED49DB355E334E915CFA0
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FC2258
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FC22A3
                                                                                • IsMenu.USER32(00000000), ref: 00FC22C3
                                                                                • CreatePopupMenu.USER32 ref: 00FC22F7
                                                                                • GetMenuItemCount.USER32(000000FF), ref: 00FC2355
                                                                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00FC2386
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                                • String ID:
                                                                                • API String ID: 3311875123-0
                                                                                • Opcode ID: d3b851233f7ca1ce61fefde70b487ea524f6da5fa449c41ab6fcd00f85ae262f
                                                                                • Instruction ID: e30a1342c63776e66ee85996973f6ec55962eb76ae8b672a6bfbed6c72df67a2
                                                                                • Opcode Fuzzy Hash: d3b851233f7ca1ce61fefde70b487ea524f6da5fa449c41ab6fcd00f85ae262f
                                                                                • Instruction Fuzzy Hash: 5351BE30A0038ADBDF61CF68CA8AFADBBF5EF45324F14412DE8159B290D3789904EB51
                                                                                APIs
                                                                                  • Part of subcall function 00F62612: GetWindowLongW.USER32(?,000000EB), ref: 00F62623
                                                                                • BeginPaint.USER32(?,?,?,?,?,?), ref: 00F6179A
                                                                                • GetWindowRect.USER32(?,?), ref: 00F617FE
                                                                                • ScreenToClient.USER32(?,?), ref: 00F6181B
                                                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00F6182C
                                                                                • EndPaint.USER32(?,?), ref: 00F61876
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                                                • String ID:
                                                                                • API String ID: 1827037458-0
                                                                                • Opcode ID: ec9cd9e34f24e04ed30d824bff4668b5fcc43c405de3b10d9eed2ceac43689a3
                                                                                • Instruction ID: ae7b30b4932bcdca806f4117402e4604f3a3d59cb4ebbdf4363fba3c075d2f97
                                                                                • Opcode Fuzzy Hash: ec9cd9e34f24e04ed30d824bff4668b5fcc43c405de3b10d9eed2ceac43689a3
                                                                                • Instruction Fuzzy Hash: 1841CF31504300AFDB20DF24DC84FBA7BE8FB4A324F184668F9A48B2A1C7759805EB61
                                                                                APIs
                                                                                • ShowWindow.USER32(010257B0,00000000,00A26198,?,?,010257B0,?,00FEB5A8,?,?), ref: 00FEB712
                                                                                • EnableWindow.USER32(00000000,00000000), ref: 00FEB736
                                                                                • ShowWindow.USER32(010257B0,00000000,00A26198,?,?,010257B0,?,00FEB5A8,?,?), ref: 00FEB796
                                                                                • ShowWindow.USER32(00000000,00000004,?,00FEB5A8,?,?), ref: 00FEB7A8
                                                                                • EnableWindow.USER32(00000000,00000001), ref: 00FEB7CC
                                                                                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00FEB7EF
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Show$Enable$MessageSend
                                                                                • String ID:
                                                                                • API String ID: 642888154-0
                                                                                • Opcode ID: 1570493404290b9a51e3cd46284557de683864786dd2adf91144dbbfb8a1b95e
                                                                                • Instruction ID: 9489a16b8b936718fbd4d3dea44b3bb028eb0ef19fd9b059bd6dcf1ccf6b4c2f
                                                                                • Opcode Fuzzy Hash: 1570493404290b9a51e3cd46284557de683864786dd2adf91144dbbfb8a1b95e
                                                                                • Instruction Fuzzy Hash: 4B418734A01284EFDB25CF25C4D9B967BE1FF45320F1841B9F9488FAA2C731A856EB51
                                                                                APIs
                                                                                • GetForegroundWindow.USER32(?,?,?,?,?,?,00FD4E41,?,?,00000000,00000001), ref: 00FD70AC
                                                                                  • Part of subcall function 00FD39A0: GetWindowRect.USER32(?,?), ref: 00FD39B3
                                                                                • GetDesktopWindow.USER32 ref: 00FD70D6
                                                                                • GetWindowRect.USER32(00000000), ref: 00FD70DD
                                                                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00FD710F
                                                                                  • Part of subcall function 00FC5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FC52BC
                                                                                • GetCursorPos.USER32(?), ref: 00FD713B
                                                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00FD7199
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                                • String ID:
                                                                                • API String ID: 4137160315-0
                                                                                • Opcode ID: 630d5e5d5a24a049f11bb18b02f2fecb06435ebd85ad190c41032199668184b4
                                                                                • Instruction ID: c663ddf7fb33bf5c6ba8344134ac0c456643f00725b08c6d27dbefa5b0df62c8
                                                                                • Opcode Fuzzy Hash: 630d5e5d5a24a049f11bb18b02f2fecb06435ebd85ad190c41032199668184b4
                                                                                • Instruction Fuzzy Hash: 9E31E67250534AABD720EF14CC49F9BB7EAFF88314F04051AF5859B291D734EA09DB92
                                                                                APIs
                                                                                  • Part of subcall function 00FB80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FB80C0
                                                                                  • Part of subcall function 00FB80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FB80CA
                                                                                  • Part of subcall function 00FB80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FB80D9
                                                                                  • Part of subcall function 00FB80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FB80E0
                                                                                  • Part of subcall function 00FB80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FB80F6
                                                                                • GetLengthSid.ADVAPI32(?,00000000,00FB842F), ref: 00FB88CA
                                                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00FB88D6
                                                                                • HeapAlloc.KERNEL32(00000000), ref: 00FB88DD
                                                                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 00FB88F6
                                                                                • GetProcessHeap.KERNEL32(00000000,00000000,00FB842F), ref: 00FB890A
                                                                                • HeapFree.KERNEL32(00000000), ref: 00FB8911
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                • String ID:
                                                                                • API String ID: 3008561057-0
                                                                                • Opcode ID: 18acb627421f097c504556f4d90ca78829986b6a93697722770efbbc09e637a7
                                                                                • Instruction ID: 137a24a7e39ead2bfa11b01e9f103ff4c1064eb002e604bdbdb6d689b0b4f96a
                                                                                • Opcode Fuzzy Hash: 18acb627421f097c504556f4d90ca78829986b6a93697722770efbbc09e637a7
                                                                                • Instruction Fuzzy Hash: 3C11AF32901209FFDF119FA5DC49BFE7B6CEB853A1F108028E84597151CB369A06EF60
                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00FB85E2
                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00FB85E9
                                                                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00FB85F8
                                                                                • CloseHandle.KERNEL32(00000004), ref: 00FB8603
                                                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FB8632
                                                                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 00FB8646
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                • String ID:
                                                                                • API String ID: 1413079979-0
                                                                                • Opcode ID: 7d192a2578dc9354b47ee013b68c4e8f2e5bddfd0ed321812209c331972cc2e7
                                                                                • Instruction ID: 01a815c53a62a3783b5c77589a800ad24725e7dc0cc040501da14f033b8ecaa3
                                                                                • Opcode Fuzzy Hash: 7d192a2578dc9354b47ee013b68c4e8f2e5bddfd0ed321812209c331972cc2e7
                                                                                • Instruction Fuzzy Hash: F5116A7250024DABDF118FA4DC48FDE7BA9EF48354F044024FE01A6160C7718E65EB60
                                                                                APIs
                                                                                • GetDC.USER32(00000000), ref: 00FBB7B5
                                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 00FBB7C6
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FBB7CD
                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00FBB7D5
                                                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00FBB7EC
                                                                                • MulDiv.KERNEL32(000009EC,?,?), ref: 00FBB7FE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CapsDevice$Release
                                                                                • String ID:
                                                                                • API String ID: 1035833867-0
                                                                                • Opcode ID: c1ea3debee73c18c08b896bf0241273337ae4afb2918774ca3f8db73760c7b11
                                                                                • Instruction ID: 4724ae30e283655c37c90c61285ea2b19b78ddbcd948a402634c00bb279b7fb4
                                                                                • Opcode Fuzzy Hash: c1ea3debee73c18c08b896bf0241273337ae4afb2918774ca3f8db73760c7b11
                                                                                • Instruction Fuzzy Hash: DA018875E00349BBEB105BA69C85A5EBFB8EB48361F004075FA04EB291D6709D00DF51
                                                                                APIs
                                                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F80193
                                                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00F8019B
                                                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F801A6
                                                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F801B1
                                                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00F801B9
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F801C1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Virtual
                                                                                • String ID:
                                                                                • API String ID: 4278518827-0
                                                                                • Opcode ID: 15b74b1b4fe4f7e41e6ad27789e9ab1f9c8cdfefaa08d4e24601faedb97b1f02
                                                                                • Instruction ID: 6b6b98f33abeb5c106c7d7b958ce25a675de3bd843a406afe56e0fa7f1ab5e81
                                                                                • Opcode Fuzzy Hash: 15b74b1b4fe4f7e41e6ad27789e9ab1f9c8cdfefaa08d4e24601faedb97b1f02
                                                                                • Instruction Fuzzy Hash: DB016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C4B941C7F5A868CBE5
                                                                                APIs
                                                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00FC53F9
                                                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00FC540F
                                                                                • GetWindowThreadProcessId.USER32(?,?), ref: 00FC541E
                                                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FC542D
                                                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FC5437
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FC543E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                • String ID:
                                                                                • API String ID: 839392675-0
                                                                                • Opcode ID: abc30061a31aab2d7d9c2445993720c664f8faf3bba5818ccd979022879e446a
                                                                                • Instruction ID: f0a83ad745c5200282c578ec6459b2856e2e9d49ff807f925e74e30608fbce82
                                                                                • Opcode Fuzzy Hash: abc30061a31aab2d7d9c2445993720c664f8faf3bba5818ccd979022879e446a
                                                                                • Instruction Fuzzy Hash: E4F0903224119CBBE7205BA2DC4EEEF7B7CEFC6B11F000169FA04D50A0D7A41A05A6B5
                                                                                APIs
                                                                                • InterlockedExchange.KERNEL32(?,?), ref: 00FC7243
                                                                                • EnterCriticalSection.KERNEL32(?,?,00F70EE4,?,?), ref: 00FC7254
                                                                                • TerminateThread.KERNEL32(00000000,000001F6,?,00F70EE4,?,?), ref: 00FC7261
                                                                                • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00F70EE4,?,?), ref: 00FC726E
                                                                                  • Part of subcall function 00FC6C35: CloseHandle.KERNEL32(00000000,?,00FC727B,?,00F70EE4,?,?), ref: 00FC6C3F
                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FC7281
                                                                                • LeaveCriticalSection.KERNEL32(?,?,00F70EE4,?,?), ref: 00FC7288
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                • String ID:
                                                                                • API String ID: 3495660284-0
                                                                                • Opcode ID: 15b944f8fdb40cd15d364b3846e736b40cd88dac1fb7112a78c411562be47a1a
                                                                                • Instruction ID: 7fde1c24c1c03bc035f04751d73838406d47a0cae1ba61ca007a0a4355827821
                                                                                • Opcode Fuzzy Hash: 15b944f8fdb40cd15d364b3846e736b40cd88dac1fb7112a78c411562be47a1a
                                                                                • Instruction Fuzzy Hash: D0F0BE36841206EBD7112B24ED8DEEA7729EF45312B010135F203980A0CB7A1808EF50
                                                                                APIs
                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00FB899D
                                                                                • UnloadUserProfile.USERENV(?,?), ref: 00FB89A9
                                                                                • CloseHandle.KERNEL32(?), ref: 00FB89B2
                                                                                • CloseHandle.KERNEL32(?), ref: 00FB89BA
                                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00FB89C3
                                                                                • HeapFree.KERNEL32(00000000), ref: 00FB89CA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                • String ID:
                                                                                • API String ID: 146765662-0
                                                                                • Opcode ID: a50badaac7900717a49a4f84df06479854e5cebf292282424b8dd365d913863d
                                                                                • Instruction ID: d3c1ca235203e48b61118f9d7174927692239fa213c959d1931517d8e5491aeb
                                                                                • Opcode Fuzzy Hash: a50badaac7900717a49a4f84df06479854e5cebf292282424b8dd365d913863d
                                                                                • Instruction Fuzzy Hash: 4AE0C236004049FFDA011FE1EC4C90ABB69FB89322B108230F219890B0CB369468EB50
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 00FD8613
                                                                                • CharUpperBuffW.USER32(?,?), ref: 00FD8722
                                                                                • VariantClear.OLEAUT32(?), ref: 00FD889A
                                                                                  • Part of subcall function 00FC7562: VariantInit.OLEAUT32(00000000), ref: 00FC75A2
                                                                                  • Part of subcall function 00FC7562: VariantCopy.OLEAUT32(00000000,?), ref: 00FC75AB
                                                                                  • Part of subcall function 00FC7562: VariantClear.OLEAUT32(00000000), ref: 00FC75B7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                • API String ID: 4237274167-1221869570
                                                                                • Opcode ID: e87abfad2b57ca38aee23440f94c61303fa5b47abaad9a0ff392b9542cba422a
                                                                                • Instruction ID: 6913119947831ab585460b3ead6e4656a536f903f0b02f29abc2683d943b3e86
                                                                                • Opcode Fuzzy Hash: e87abfad2b57ca38aee23440f94c61303fa5b47abaad9a0ff392b9542cba422a
                                                                                • Instruction Fuzzy Hash: 6D918F71A08301DFC710DF24C88095ABBE5EF89754F18896EF88A8B361DB35ED06EB51
                                                                                APIs
                                                                                  • Part of subcall function 00F7FC86: _wcscpy.LIBCMT ref: 00F7FCA9
                                                                                • _memset.LIBCMT ref: 00FC2B87
                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FC2BB6
                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FC2C69
                                                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00FC2C97
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                                • String ID: 0
                                                                                • API String ID: 4152858687-4108050209
                                                                                • Opcode ID: d42655f005deef9ecba8a8f2b40b94db5d849e1fd851e8c191fe41a607ee5fbf
                                                                                • Instruction ID: b88398ca0de48e105f68bdd9e6de27ba85d751d1a5119d79dad5fd62a81f5243
                                                                                • Opcode Fuzzy Hash: d42655f005deef9ecba8a8f2b40b94db5d849e1fd851e8c191fe41a607ee5fbf
                                                                                • Instruction Fuzzy Hash: 6D51B071A083029AD7A4EE28DA86F6F77E4EF95330F040A2DF895D7190DB74CD04A752
                                                                                APIs
                                                                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00FBD5D4
                                                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00FBD60A
                                                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00FBD61B
                                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00FBD69D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                • String ID: DllGetClassObject
                                                                                • API String ID: 753597075-1075368562
                                                                                • Opcode ID: 2e3555f98f69210011d6b4ace67417be8ddac697980ddfd9ba0588ae0ab600aa
                                                                                • Instruction ID: f2856941c8a67807dda38a87b6f9ef622b8d8b077c8b4c7c0ccdfe951b95e5ea
                                                                                • Opcode Fuzzy Hash: 2e3555f98f69210011d6b4ace67417be8ddac697980ddfd9ba0588ae0ab600aa
                                                                                • Instruction Fuzzy Hash: 0641CFB5600208EFDB04CF15C884ADA7BAAEF48310F1580A9ED099F205E7B5DA44EFA1
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FC27C0
                                                                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00FC27DC
                                                                                • DeleteMenu.USER32(?,00000007,00000000), ref: 00FC2822
                                                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,01025890,00000000), ref: 00FC286B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Delete$InfoItem_memset
                                                                                • String ID: 0
                                                                                • API String ID: 1173514356-4108050209
                                                                                • Opcode ID: 3898fdb9a9716c2b961796a3765d266cce08133a7907f75b02c1c9c19b67c497
                                                                                • Instruction ID: e8b6f0506a95b878d11998f873f3e7dd0b6ab441d7eb210aedea015b226e4db3
                                                                                • Opcode Fuzzy Hash: 3898fdb9a9716c2b961796a3765d266cce08133a7907f75b02c1c9c19b67c497
                                                                                • Instruction Fuzzy Hash: 3841CE716043429FDB60EF24CD86F5ABBE4EF84324F044A2EF8A5972D1C734A804DB62
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00FC0B27
                                                                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 00FC0B43
                                                                                • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00FC0BA9
                                                                                • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00FC0BFB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                • String ID: -es
                                                                                • API String ID: 432972143-508736453
                                                                                • Opcode ID: 398d9dac1bbf2b1710cb09836382010f7fd615393eca60ae6c86a0efecddac3a
                                                                                • Instruction ID: f3bc40479ce52bc91e042b4a00fbde1b403b3a973a612af04028bf024948467b
                                                                                • Opcode Fuzzy Hash: 398d9dac1bbf2b1710cb09836382010f7fd615393eca60ae6c86a0efecddac3a
                                                                                • Instruction Fuzzy Hash: 33314830D40609EAFB30CB258D06FF9BBA9AB85338F08426EE481911D1CB748D46B751
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00FC0C66
                                                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 00FC0C82
                                                                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 00FC0CE1
                                                                                • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00FC0D33
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                • String ID: -es
                                                                                • API String ID: 432972143-508736453
                                                                                • Opcode ID: f3af25a5ea999b66dbb5da46a599ce401fbda57a168f8251e58fd17180358160
                                                                                • Instruction ID: dd9964d377bbd1841d70ba17f5fb6582e1ea35eec345efec9278b592f508ed00
                                                                                • Opcode Fuzzy Hash: f3af25a5ea999b66dbb5da46a599ce401fbda57a168f8251e58fd17180358160
                                                                                • Instruction Fuzzy Hash: 25312630E00719EEFF34CA658D06FFEBB66AB45320F08432EE491621D1CB39994AA751
                                                                                APIs
                                                                                • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00FDD7C5
                                                                                  • Part of subcall function 00F6784B: _memmove.LIBCMT ref: 00F67899
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharLower_memmove
                                                                                • String ID: cdecl$none$stdcall$winapi
                                                                                • API String ID: 3425801089-567219261
                                                                                • Opcode ID: 1f11ef49973ff725e6a45477c9a74e3d181e1e6560ee444806a57f0ab28f47d8
                                                                                • Instruction ID: b22e6f83231d3290adde58110bd7beb11ce969fd09fd660c668c06df5624d6b2
                                                                                • Opcode Fuzzy Hash: 1f11ef49973ff725e6a45477c9a74e3d181e1e6560ee444806a57f0ab28f47d8
                                                                                • Instruction Fuzzy Hash: E031B071904219ABCF00EF54CC519EEB3B5FF14724B14862AE865A77D1DB35AD09EB80
                                                                                APIs
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                  • Part of subcall function 00FBAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FBAABC
                                                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00FB8F14
                                                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00FB8F27
                                                                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 00FB8F57
                                                                                  • Part of subcall function 00F67BCC: _memmove.LIBCMT ref: 00F67C06
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$_memmove$ClassName
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 365058703-1403004172
                                                                                • Opcode ID: 532acaa79aa4c4eb02b07a6ed56e245cb397d9c64ae3581f1285b542da1b9dca
                                                                                • Instruction ID: 8ae2f7b4dc4d805caeebb338752af75a1e6489bfc9497edf3d03acdadfcdd5e8
                                                                                • Opcode Fuzzy Hash: 532acaa79aa4c4eb02b07a6ed56e245cb397d9c64ae3581f1285b542da1b9dca
                                                                                • Instruction Fuzzy Hash: C121D075A00108BADB14ABA1CC85DFFB76DDF85360F144529F821A71E1DE39490AFA20
                                                                                APIs
                                                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00FD184C
                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00FD1872
                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00FD18A2
                                                                                • InternetCloseHandle.WININET(00000000), ref: 00FD18E9
                                                                                  • Part of subcall function 00FD2483: GetLastError.KERNEL32(?,?,00FD1817,00000000,00000000,00000001), ref: 00FD2498
                                                                                  • Part of subcall function 00FD2483: SetEvent.KERNEL32(?,?,00FD1817,00000000,00000000,00000001), ref: 00FD24AD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                • String ID:
                                                                                • API String ID: 3113390036-3916222277
                                                                                • Opcode ID: 5674d412bc618197ab469afde0e7fb7858950161b6a4dcd0d6f347f650e40c6d
                                                                                • Instruction ID: b45880c0141cebf727ef512d002b73eb36c1d1ffd512c002f7eee51c7e2f4053
                                                                                • Opcode Fuzzy Hash: 5674d412bc618197ab469afde0e7fb7858950161b6a4dcd0d6f347f650e40c6d
                                                                                • Instruction Fuzzy Hash: 8421ACB250020CBFEB11DB60DC85EBF76AEFB88754F14412BF805A7240EA358D08B7A1
                                                                                APIs
                                                                                  • Part of subcall function 00F61D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F61D73
                                                                                  • Part of subcall function 00F61D35: GetStockObject.GDI32(00000011), ref: 00F61D87
                                                                                  • Part of subcall function 00F61D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F61D91
                                                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00FE6461
                                                                                • LoadLibraryW.KERNEL32(?), ref: 00FE6468
                                                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00FE647D
                                                                                • DestroyWindow.USER32(?), ref: 00FE6485
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                                • String ID: SysAnimate32
                                                                                • API String ID: 4146253029-1011021900
                                                                                • Opcode ID: d4ae4bf25b293e2324a1f4d1a8a008aa25de16949b5aad36b857ce424db58641
                                                                                • Instruction ID: cbebbfd2afc87a0aa98f47eeb6b7c2f476950c841bb10ffa7364353e3140e496
                                                                                • Opcode Fuzzy Hash: d4ae4bf25b293e2324a1f4d1a8a008aa25de16949b5aad36b857ce424db58641
                                                                                • Instruction Fuzzy Hash: 24218E7150028DAFEF108F66DC80EBA77ADEB693B8F104629F950D61D0D7359C41B760
                                                                                APIs
                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 00FC6DBC
                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FC6DEF
                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 00FC6E01
                                                                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00FC6E3B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CreateHandle$FilePipe
                                                                                • String ID: nul
                                                                                • API String ID: 4209266947-2873401336
                                                                                • Opcode ID: ea74738c24d404ec7549fb7cbf8f15e1e138923f9c0b47bf7a10c88ba3bee1ec
                                                                                • Instruction ID: d4a1acc2921025f6d4ceea6ee81669fc2397ad5cafc0ea5202bfd9b7a30791a7
                                                                                • Opcode Fuzzy Hash: ea74738c24d404ec7549fb7cbf8f15e1e138923f9c0b47bf7a10c88ba3bee1ec
                                                                                • Instruction Fuzzy Hash: 3221D175A0420BABCB209F29DD46F9A77A4EF44720F20462DFDA1DB2D0D7709815AB14
                                                                                APIs
                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00FC6E89
                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FC6EBB
                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00FC6ECC
                                                                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00FC6F06
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CreateHandle$FilePipe
                                                                                • String ID: nul
                                                                                • API String ID: 4209266947-2873401336
                                                                                • Opcode ID: 3d95d2e240cd33342bbac27db045e2e8d17a1b86c344a85c28d557598ad53a17
                                                                                • Instruction ID: c058b78dcb32990d5b49ad93594e76625650b8f5c7ad6d1ce8765c59bfc8a089
                                                                                • Opcode Fuzzy Hash: 3d95d2e240cd33342bbac27db045e2e8d17a1b86c344a85c28d557598ad53a17
                                                                                • Instruction Fuzzy Hash: DD21B2759043069BDB209F69CD46F9A77E8AF45730F200A1EF9A0D72D0D7709851E714
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 00FCAC54
                                                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00FCACA8
                                                                                • __swprintf.LIBCMT ref: 00FCACC1
                                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,00FEF910), ref: 00FCACFF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$InformationVolume__swprintf
                                                                                • String ID: %lu
                                                                                • API String ID: 3164766367-685833217
                                                                                • Opcode ID: 153e022489d75c936608ec3bee24a66279efc4448291fb836990c8367d0918aa
                                                                                • Instruction ID: eb279605e2b6a443ca8d29fd25c05039fd9441cad3c325c3fc92f2b2acc2ad3c
                                                                                • Opcode Fuzzy Hash: 153e022489d75c936608ec3bee24a66279efc4448291fb836990c8367d0918aa
                                                                                • Instruction Fuzzy Hash: 12216230A0010DAFCB10DF65CD85EEE77B8EF49714B004069F909DB252DA75EA45EB21
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?), ref: 00FC1B19
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharUpper
                                                                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                • API String ID: 3964851224-769500911
                                                                                • Opcode ID: 348ba62999213b4291ce057abfa76b39625cc7112ac168407ccf1479f1c86a4f
                                                                                • Instruction ID: 9aae68fef7099f32b8a245426871e777dcea2181d913da7eb935239d2bf53edb
                                                                                • Opcode Fuzzy Hash: 348ba62999213b4291ce057abfa76b39625cc7112ac168407ccf1479f1c86a4f
                                                                                • Instruction Fuzzy Hash: 96118E349002098FCF04EF54DD529EEB3B4FF66304B508459D85467296EB365D0AEF40
                                                                                APIs
                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00FDEC07
                                                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00FDEC37
                                                                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00FDED6A
                                                                                • CloseHandle.KERNEL32(?), ref: 00FDEDEB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                                • String ID:
                                                                                • API String ID: 2364364464-0
                                                                                • Opcode ID: 91cdeb5c2c095b61a29498f7a3fbade624968a878da83c1f7085262aa70c83ae
                                                                                • Instruction ID: 823f92a60b7aeb81f0111b93cc8ad915ff3bcdf2e7f75f355260ba4678568469
                                                                                • Opcode Fuzzy Hash: 91cdeb5c2c095b61a29498f7a3fbade624968a878da83c1f7085262aa70c83ae
                                                                                • Instruction Fuzzy Hash: 158181B16043009FD720EF28CC86F6AB7E5EF54760F04891EF9999B392DAB4AC41DB51
                                                                                APIs
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                  • Part of subcall function 00FE0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FDFDAD,?,?), ref: 00FE0E31
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FE00FD
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FE013C
                                                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00FE0183
                                                                                • RegCloseKey.ADVAPI32(?,?), ref: 00FE01AF
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00FE01BC
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                                                • String ID:
                                                                                • API String ID: 3440857362-0
                                                                                • Opcode ID: be52ef7a8f26a715cad0629451392060668bc0def5c3e90e39df7dda187888dc
                                                                                • Instruction ID: d5dce8cd3ce2381423f0a06cb1b8ddffa535e507658310ef7759237ff8c3daa7
                                                                                • Opcode Fuzzy Hash: be52ef7a8f26a715cad0629451392060668bc0def5c3e90e39df7dda187888dc
                                                                                • Instruction Fuzzy Hash: FF518C71608244AFC714EF54CC81F6AB7E8FF84314F40482DF5858B2A2DB79E948EB52
                                                                                APIs
                                                                                  • Part of subcall function 00F69837: __itow.LIBCMT ref: 00F69862
                                                                                  • Part of subcall function 00F69837: __swprintf.LIBCMT ref: 00F698AC
                                                                                • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00FDD927
                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00FDD9AA
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00FDD9C6
                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00FDDA07
                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00FDDA21
                                                                                  • Part of subcall function 00F65A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FC7896,?,?,00000000), ref: 00F65A2C
                                                                                  • Part of subcall function 00F65A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FC7896,?,?,00000000,?,?), ref: 00F65A50
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 327935632-0
                                                                                • Opcode ID: 02d89608bd9b38e305a161c003117d0ee352d27c647f718e9f56710ae48ff887
                                                                                • Instruction ID: da06acd135c02f383e6790ce8e9600b0ea5fbfaaafd6a0b7c5b05a5d3c1163b4
                                                                                • Opcode Fuzzy Hash: 02d89608bd9b38e305a161c003117d0ee352d27c647f718e9f56710ae48ff887
                                                                                • Instruction Fuzzy Hash: F3512835A04209DFCB00EFA8C8949ADB7B5FF59324B08806AE855AB312D739ED45DF51
                                                                                APIs
                                                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00FCE61F
                                                                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00FCE648
                                                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00FCE687
                                                                                  • Part of subcall function 00F69837: __itow.LIBCMT ref: 00F69862
                                                                                  • Part of subcall function 00F69837: __swprintf.LIBCMT ref: 00F698AC
                                                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00FCE6AC
                                                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00FCE6B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 1389676194-0
                                                                                • Opcode ID: 084e0f68d54e033f11941bdf2ca9c98574cf12423643b4098f874d01cdff5cb4
                                                                                • Instruction ID: cb3188a70951c3b910b36a1f0a8a933f341c7533dd5fda966cae480060528b28
                                                                                • Opcode Fuzzy Hash: 084e0f68d54e033f11941bdf2ca9c98574cf12423643b4098f874d01cdff5cb4
                                                                                • Instruction Fuzzy Hash: 89510B35A10105DFCB01EF64C981AAEBBF9EF09314F1480A9E909AB361CB35ED15EF50
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ea55b59d5367bedc9aac6493c40d5ac63b721cd88355cf41b8fcdc1b3e6d708c
                                                                                • Instruction ID: da64d83def4082c67b493e78e8365a07fb6861cde5c90f0b44a1fe4e716c906c
                                                                                • Opcode Fuzzy Hash: ea55b59d5367bedc9aac6493c40d5ac63b721cd88355cf41b8fcdc1b3e6d708c
                                                                                • Instruction Fuzzy Hash: 1041F336D04284AFC720DF29CC88FA9BBA5EB09320F154165F916A72E1C774BD41FE51
                                                                                APIs
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FB63E7
                                                                                • TranslateAcceleratorW.USER32(?,?,?), ref: 00FB6433
                                                                                • TranslateMessage.USER32(?), ref: 00FB645C
                                                                                • DispatchMessageW.USER32(?), ref: 00FB6466
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FB6475
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                                                • String ID:
                                                                                • API String ID: 2108273632-0
                                                                                • Opcode ID: fcaedfbec0d675cb4189cc910d17151239f5e641c10edebcfad1926285f7ca89
                                                                                • Instruction ID: 064501ce0b73afaf8a0b34d9c9e890b6f797dd88e2e26b1cb158d38a7ff15a2f
                                                                                • Opcode Fuzzy Hash: fcaedfbec0d675cb4189cc910d17151239f5e641c10edebcfad1926285f7ca89
                                                                                • Instruction Fuzzy Hash: 7931A431900646EFDB34CEB1DC48BF67BA8AB05320F244175E465C6191E76D9889EF60
                                                                                APIs
                                                                                • GetWindowRect.USER32(?,?), ref: 00FB8A30
                                                                                • PostMessageW.USER32(?,00000201,00000001), ref: 00FB8ADA
                                                                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00FB8AE2
                                                                                • PostMessageW.USER32(?,00000202,00000000), ref: 00FB8AF0
                                                                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00FB8AF8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePostSleep$RectWindow
                                                                                • String ID:
                                                                                • API String ID: 3382505437-0
                                                                                • Opcode ID: a82f036230d17b80d0e119ed0c4eb24ccef457cefb4258217a9adf7d8bed2660
                                                                                • Instruction ID: 1fcfaa0bd8c7b5ebcf0476c96514d3392f19c16aaafd0f835154d2baedaca50a
                                                                                • Opcode Fuzzy Hash: a82f036230d17b80d0e119ed0c4eb24ccef457cefb4258217a9adf7d8bed2660
                                                                                • Instruction Fuzzy Hash: 6F31F171900219EBCF00CF68DD8CADE3BB9EB44325F108229F825EA1D0C7B49915EF90
                                                                                APIs
                                                                                • IsWindowVisible.USER32(?), ref: 00FBB204
                                                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00FBB221
                                                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00FBB259
                                                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00FBB27F
                                                                                • _wcsstr.LIBCMT ref: 00FBB289
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                                • String ID:
                                                                                • API String ID: 3902887630-0
                                                                                • Opcode ID: d6601247bea3d8cad1655508580af8bfa1ec4f584fc432937eef82ad3019ccdc
                                                                                • Instruction ID: ef14b67889abffa6cddb5bb85704f13624366e53da528da49f107b3c5d1ebcac
                                                                                • Opcode Fuzzy Hash: d6601247bea3d8cad1655508580af8bfa1ec4f584fc432937eef82ad3019ccdc
                                                                                • Instruction Fuzzy Hash: 4221F5326042457BEB266B7ADC49EBF7B98DF49720F004139F804DA1A1EFA5DC40BB60
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FB9320
                                                                                  • Part of subcall function 00F67BCC: _memmove.LIBCMT ref: 00F67C06
                                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FB9352
                                                                                • __itow.LIBCMT ref: 00FB936A
                                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FB9392
                                                                                • __itow.LIBCMT ref: 00FB93A3
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$__itow$_memmove
                                                                                • String ID:
                                                                                • API String ID: 2983881199-0
                                                                                • Opcode ID: bcef309a85119e6001d7c9debfe016ff8b05880d3e4155b40d846d9cb77e6330
                                                                                • Instruction ID: 5305e5bb6ef286199ae043516bdb79b1fbda9f15d64d86627c63a591150e13a4
                                                                                • Opcode Fuzzy Hash: bcef309a85119e6001d7c9debfe016ff8b05880d3e4155b40d846d9cb77e6330
                                                                                • Instruction Fuzzy Hash: DF21C831B04208BBDB10AA669CC5EEE7BEDEF48720F084025FA45DB191D6B48D45AB91
                                                                                APIs
                                                                                • IsWindow.USER32(00000000), ref: 00FD5A6E
                                                                                • GetForegroundWindow.USER32 ref: 00FD5A85
                                                                                • GetDC.USER32(00000000), ref: 00FD5AC1
                                                                                • GetPixel.GDI32(00000000,?,00000003), ref: 00FD5ACD
                                                                                • ReleaseDC.USER32(00000000,00000003), ref: 00FD5B08
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ForegroundPixelRelease
                                                                                • String ID:
                                                                                • API String ID: 4156661090-0
                                                                                • Opcode ID: 7d8c7eec9754b7523e82e28d94664720d9dbe72154dc595058b4569653ce491d
                                                                                • Instruction ID: d30d2205062487173da1a92063c81e7ddb61fb7f2ee175f914d6288116a80540
                                                                                • Opcode Fuzzy Hash: 7d8c7eec9754b7523e82e28d94664720d9dbe72154dc595058b4569653ce491d
                                                                                • Instruction Fuzzy Hash: E121C675A00118AFDB00EF64DC84A5ABBF9EF88350F14C079F809DB351CA74AD05EB90
                                                                                APIs
                                                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F6134D
                                                                                • SelectObject.GDI32(?,00000000), ref: 00F6135C
                                                                                • BeginPath.GDI32(?), ref: 00F61373
                                                                                • SelectObject.GDI32(?,00000000), ref: 00F6139C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ObjectSelect$BeginCreatePath
                                                                                • String ID:
                                                                                • API String ID: 3225163088-0
                                                                                • Opcode ID: 3e5e95c0912f137601a4d935d37220106f2455ab0d681dfbdcb2ffa81de49fbd
                                                                                • Instruction ID: 2c7298978906326151d66c340398e57ebe8f3ce7e91d0447ee8480ca5a817ff9
                                                                                • Opcode Fuzzy Hash: 3e5e95c0912f137601a4d935d37220106f2455ab0d681dfbdcb2ffa81de49fbd
                                                                                • Instruction Fuzzy Hash: 6A214131C00208EFDB319F25DD467A97BA8FB04321F384216F851AA2A4D7F69995EF94
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memcmp
                                                                                • String ID:
                                                                                • API String ID: 2931989736-0
                                                                                • Opcode ID: 811af26d3f37174bfe917ca6c1bae26d723bb05b85f78c83984bfc63fdc6addb
                                                                                • Instruction ID: bfab6f485b81997a382e1de7bdbf94eecec738934b7938c9dc1480ace803912d
                                                                                • Opcode Fuzzy Hash: 811af26d3f37174bfe917ca6c1bae26d723bb05b85f78c83984bfc63fdc6addb
                                                                                • Instruction Fuzzy Hash: BB01B5B27011097BD204FB129D42FFBB75CEE553A8F044021FE0596342EB94DE11BAE1
                                                                                APIs
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00FC4ABA
                                                                                • __beginthreadex.LIBCMT ref: 00FC4AD8
                                                                                • MessageBoxW.USER32(?,?,?,?), ref: 00FC4AED
                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00FC4B03
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00FC4B0A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                                                • String ID:
                                                                                • API String ID: 3824534824-0
                                                                                • Opcode ID: f9660164e91818a2580cbc896ae3f364f906df3d246f3bb2917fb720c8bdfcba
                                                                                • Instruction ID: 266f8216fb3d6db56cf2b9d6d2267eda8422d892392ff443f30571d5c1c28711
                                                                                • Opcode Fuzzy Hash: f9660164e91818a2580cbc896ae3f364f906df3d246f3bb2917fb720c8bdfcba
                                                                                • Instruction Fuzzy Hash: 32110876904249BBC7219FA89C45FDB7FACEB86334F144269F814D3290D679DD089BA0
                                                                                APIs
                                                                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FB821E
                                                                                • GetLastError.KERNEL32(?,00FB7CE2,?,?,?), ref: 00FB8228
                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00FB7CE2,?,?,?), ref: 00FB8237
                                                                                • HeapAlloc.KERNEL32(00000000,?,00FB7CE2,?,?,?), ref: 00FB823E
                                                                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FB8255
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                • String ID:
                                                                                • API String ID: 842720411-0
                                                                                • Opcode ID: d9cfcd5baf7d93e95b892b7fc733625d4ea93a6665ece24fd2dfcb54edc23260
                                                                                • Instruction ID: 53967e89cd562b347c209f9df9a47c1bda22538825e409786714822f941c065c
                                                                                • Opcode Fuzzy Hash: d9cfcd5baf7d93e95b892b7fc733625d4ea93a6665ece24fd2dfcb54edc23260
                                                                                • Instruction Fuzzy Hash: 15016271601249BFDB104FA6DC88DA77B6CEF867A47504429F809C6160DA318C05EA60
                                                                                APIs
                                                                                • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FB7044,80070057,?,?,?,00FB7455), ref: 00FB7127
                                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FB7044,80070057,?,?), ref: 00FB7142
                                                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FB7044,80070057,?,?), ref: 00FB7150
                                                                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FB7044,80070057,?), ref: 00FB7160
                                                                                • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FB7044,80070057,?,?), ref: 00FB716C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                • String ID:
                                                                                • API String ID: 3897988419-0
                                                                                • Opcode ID: 427094509afedd113b73471be9c3e9496f9b27745dc174008ba6752306e0252b
                                                                                • Instruction ID: bbe94fce01d34afd3b7c07b02ae7a2c8d9052e8b9613469cce607a1196da53d6
                                                                                • Opcode Fuzzy Hash: 427094509afedd113b73471be9c3e9496f9b27745dc174008ba6752306e0252b
                                                                                • Instruction Fuzzy Hash: 820184B2601308BFDB115F69DC84BAA7BADEF84761F144064FD04D6220D731DE40ABA0
                                                                                APIs
                                                                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FC5260
                                                                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FC526E
                                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FC5276
                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FC5280
                                                                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FC52BC
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                • String ID:
                                                                                • API String ID: 2833360925-0
                                                                                • Opcode ID: d3291056a4e82f2f77c9259c5d5e3f3975172c05c1e67241dcfa732de6c868f8
                                                                                • Instruction ID: 9c41810a5605932f4340825f44b4f3aa7b728d22e8b7ab53ceb92fe3a068ddaf
                                                                                • Opcode Fuzzy Hash: d3291056a4e82f2f77c9259c5d5e3f3975172c05c1e67241dcfa732de6c868f8
                                                                                • Instruction Fuzzy Hash: 04012D31D01A1EDBDF00DFE4E98AAEDBBB8FB09B11F400159E941F6181CB346594A7A5
                                                                                APIs
                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FB8121
                                                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FB812B
                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FB813A
                                                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FB8141
                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FB8157
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                • String ID:
                                                                                • API String ID: 44706859-0
                                                                                • Opcode ID: d201723e9600249d21cf9e9c0977670165eec146bee81c96522cd9b9cda8bd2b
                                                                                • Instruction ID: 22411515ed4ffd824c1b2f89675cb4fc5ee1dcaa60064d2ecddb9b571ed6ad38
                                                                                • Opcode Fuzzy Hash: d201723e9600249d21cf9e9c0977670165eec146bee81c96522cd9b9cda8bd2b
                                                                                • Instruction Fuzzy Hash: B9F06871601348AFD7110F65DCC8EA73BACFF857A4B000025F545D6150CB619D46EE60
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00FBC1F7
                                                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00FBC20E
                                                                                • MessageBeep.USER32(00000000), ref: 00FBC226
                                                                                • KillTimer.USER32(?,0000040A), ref: 00FBC242
                                                                                • EndDialog.USER32(?,00000001), ref: 00FBC25C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                • String ID:
                                                                                • API String ID: 3741023627-0
                                                                                • Opcode ID: be4ad540a29bfc77f72e7b4f59e29eb4f0e92d30a5091bd2df8ba69d6a1f92df
                                                                                • Instruction ID: f3f22486638a23c777f2d57be17dce4252150d92442305b23ecc926c28443c0f
                                                                                • Opcode Fuzzy Hash: be4ad540a29bfc77f72e7b4f59e29eb4f0e92d30a5091bd2df8ba69d6a1f92df
                                                                                • Instruction Fuzzy Hash: 20018B3090470897EB206B55DD8EFD77778FF00706F000669F586954E1D7F46958AF90
                                                                                APIs
                                                                                • EndPath.GDI32(?), ref: 00F613BF
                                                                                • StrokeAndFillPath.GDI32(?,?,00F9B888,00000000,?), ref: 00F613DB
                                                                                • SelectObject.GDI32(?,00000000), ref: 00F613EE
                                                                                • DeleteObject.GDI32 ref: 00F61401
                                                                                • StrokePath.GDI32(?), ref: 00F6141C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                • String ID:
                                                                                • API String ID: 2625713937-0
                                                                                • Opcode ID: d5ebc77b595db5de5226c3b4ebe0c3f3c4cead42575d523c03a72f98bf23c088
                                                                                • Instruction ID: 0ee34aabffac07690bf3f8ffd15a3723da447fdae80a2a2e708e3539cf0f0311
                                                                                • Opcode Fuzzy Hash: d5ebc77b595db5de5226c3b4ebe0c3f3c4cead42575d523c03a72f98bf23c088
                                                                                • Instruction Fuzzy Hash: 15F01D30000248DBDB319F16EC4D7A83BA8BB01336F288225E569590F5C7BA4595EF14
                                                                                APIs
                                                                                • CoInitialize.OLE32(00000000), ref: 00FCC432
                                                                                • CoCreateInstance.OLE32(00FF2D6C,00000000,00000001,00FF2BDC,?), ref: 00FCC44A
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                • CoUninitialize.OLE32 ref: 00FCC6B7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CreateInitializeInstanceUninitialize_memmove
                                                                                • String ID: .lnk
                                                                                • API String ID: 2683427295-24824748
                                                                                • Opcode ID: 27c2d0d6a92ea3a5fa0e5d8855a6920fa49ceb16468f965e4e62514c84c68504
                                                                                • Instruction ID: b58400422859fecd641307bde77d8094c673d5f345b40f472464488a34d71c63
                                                                                • Opcode Fuzzy Hash: 27c2d0d6a92ea3a5fa0e5d8855a6920fa49ceb16468f965e4e62514c84c68504
                                                                                • Instruction Fuzzy Hash: B1A13AB1108205AFD700EF64CC91EABB7ECEF95354F00491CF1959B1A2DBB5EA09DB52
                                                                                APIs
                                                                                  • Part of subcall function 00F80DB6: std::exception::exception.LIBCMT ref: 00F80DEC
                                                                                  • Part of subcall function 00F80DB6: __CxxThrowException@8.LIBCMT ref: 00F80E01
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                  • Part of subcall function 00F67A51: _memmove.LIBCMT ref: 00F67AAB
                                                                                • __swprintf.LIBCMT ref: 00F72ECD
                                                                                Strings
                                                                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00F72D66
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                                • API String ID: 1943609520-557222456
                                                                                • Opcode ID: 81b14abb543dd39366de9eb41088143f1d05cc50b0c973f868aa4d0fb10402df
                                                                                • Instruction ID: 4b9739faf78eb489369f0fd1353a158120296d609dc4ecc78a5ac88c753b82b1
                                                                                • Opcode Fuzzy Hash: 81b14abb543dd39366de9eb41088143f1d05cc50b0c973f868aa4d0fb10402df
                                                                                • Instruction Fuzzy Hash: 4D915B725083019FC714FF24CC85CAEB7A8EF95750F04491EF4969B2A1EA78ED44EB62
                                                                                APIs
                                                                                  • Part of subcall function 00F64750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F64743,?,?,00F637AE,?), ref: 00F64770
                                                                                • CoInitialize.OLE32(00000000), ref: 00FCB9BB
                                                                                • CoCreateInstance.OLE32(00FF2D6C,00000000,00000001,00FF2BDC,?), ref: 00FCB9D4
                                                                                • CoUninitialize.OLE32 ref: 00FCB9F1
                                                                                  • Part of subcall function 00F69837: __itow.LIBCMT ref: 00F69862
                                                                                  • Part of subcall function 00F69837: __swprintf.LIBCMT ref: 00F698AC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                                                • String ID: .lnk
                                                                                • API String ID: 2126378814-24824748
                                                                                • Opcode ID: 17d0369c065ed41006635f608786455179ec7b715898a38c9bbeb785729eca24
                                                                                • Instruction ID: 69f66bb40a232cc4210f48b0898dd40f7d451a5bb5bb99b5440a59f870797352
                                                                                • Opcode Fuzzy Hash: 17d0369c065ed41006635f608786455179ec7b715898a38c9bbeb785729eca24
                                                                                • Instruction Fuzzy Hash: 4CA144756042069FCB00DF24C985E6ABBE5FF89324F04898CF8999B3A1CB35ED45DB91
                                                                                APIs
                                                                                • __startOneArgErrorHandling.LIBCMT ref: 00F850AD
                                                                                  • Part of subcall function 00F900F0: __87except.LIBCMT ref: 00F9012B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorHandling__87except__start
                                                                                • String ID: pow
                                                                                • API String ID: 2905807303-2276729525
                                                                                • Opcode ID: f168eef43cc3bda3dbdc14283209e0f73e2ba76d89d0d75bdaf43d60fb38dad2
                                                                                • Instruction ID: 84c7f32a2c7403accbcd9cc1682b3db94fe49821d16b0d0bcaf8edca01077a87
                                                                                • Opcode Fuzzy Hash: f168eef43cc3bda3dbdc14283209e0f73e2ba76d89d0d75bdaf43d60fb38dad2
                                                                                • Instruction Fuzzy Hash: B9514C61D0CA068BEF117724CD053BE7B949F41B20F208D59E4D5862A9EF398DD4FB86
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memset$_memmove
                                                                                • String ID: ERCP
                                                                                • API String ID: 2532777613-1384759551
                                                                                • Opcode ID: 0eed5a1e93fa3562ce4c37f3fe10f68493f81a00602b609c8aeb27cac0aa2bb9
                                                                                • Instruction ID: 983e49c81836650541bfc2830751ee3066d87f51c1c6f9389a50442152a653d2
                                                                                • Opcode Fuzzy Hash: 0eed5a1e93fa3562ce4c37f3fe10f68493f81a00602b609c8aeb27cac0aa2bb9
                                                                                • Instruction Fuzzy Hash: D751B071900B05DBDB64DF65C881BEBB7F4EF08314F20856EE94AD7281EB34AA44DB41
                                                                                APIs
                                                                                  • Part of subcall function 00FC14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FB9296,?,?,00000034,00000800,?,00000034), ref: 00FC14E6
                                                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00FB983F
                                                                                  • Part of subcall function 00FC1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FB92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 00FC14B1
                                                                                  • Part of subcall function 00FC13DE: GetWindowThreadProcessId.USER32(?,?), ref: 00FC1409
                                                                                  • Part of subcall function 00FC13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00FB925A,00000034,?,?,00001004,00000000,00000000), ref: 00FC1419
                                                                                  • Part of subcall function 00FC13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00FB925A,00000034,?,?,00001004,00000000,00000000), ref: 00FC142F
                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FB98AC
                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FB98F9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                • String ID: @
                                                                                • API String ID: 4150878124-2766056989
                                                                                • Opcode ID: 30a1fb8f8cd29b8b965eafd8834a9900556f0bbbf85acea87f926e046f115815
                                                                                • Instruction ID: d6316a923885de044a0ecb0c5b1426c7c47f64af15d9b1056350200cd7d1c769
                                                                                • Opcode Fuzzy Hash: 30a1fb8f8cd29b8b965eafd8834a9900556f0bbbf85acea87f926e046f115815
                                                                                • Instruction Fuzzy Hash: 8C416F7690011DAFDB14DFA4CD82EDEBBB8EB06300F004059FA45B7181DA706E49DBA0
                                                                                APIs
                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00FEF910,00000000,?,?,?,?), ref: 00FE79DF
                                                                                • GetWindowLongW.USER32 ref: 00FE79FC
                                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00FE7A0C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Long
                                                                                • String ID: SysTreeView32
                                                                                • API String ID: 847901565-1698111956
                                                                                • Opcode ID: d1d44e35db7824122ce0629df6278a90e722e5b7311aa038b8169a25bc10f850
                                                                                • Instruction ID: 8c3749d30b07fcce801614a113547b075dd3d57445726ae5796a3825c5a9d018
                                                                                • Opcode Fuzzy Hash: d1d44e35db7824122ce0629df6278a90e722e5b7311aa038b8169a25bc10f850
                                                                                • Instruction Fuzzy Hash: 7A31FC3160424AABDB209E39CC41BEB77A9FF08334F244725F8B5A32E1D735E850AB50
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00FE7461
                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00FE7475
                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00FE7499
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Window
                                                                                • String ID: SysMonthCal32
                                                                                • API String ID: 2326795674-1439706946
                                                                                • Opcode ID: 9117716d0eaae83f71ffbd54cb2b251acc83ba9cf758482dc37e7027593521eb
                                                                                • Instruction ID: 8f9f8d3d1d5c0ae70ceb6d2b52a20c0e4c111e38a72c33c40aaed745c37751bf
                                                                                • Opcode Fuzzy Hash: 9117716d0eaae83f71ffbd54cb2b251acc83ba9cf758482dc37e7027593521eb
                                                                                • Instruction Fuzzy Hash: 4121D132500258ABDF21DE65CC82FEA3B79FF48724F110214FE556B1D0DA75AC90EBA0
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00FE7C4A
                                                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00FE7C58
                                                                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00FE7C5F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$DestroyWindow
                                                                                • String ID: msctls_updown32
                                                                                • API String ID: 4014797782-2298589950
                                                                                • Opcode ID: 5ad7f52f72119d66b1d72d7f45b84568a7a654722a22056bbafd4774bf0b8ed1
                                                                                • Instruction ID: d42d291753ce077f1b1b7728c975c8d3a3cd43a93467a6bda0f6ecd8673403e3
                                                                                • Opcode Fuzzy Hash: 5ad7f52f72119d66b1d72d7f45b84568a7a654722a22056bbafd4774bf0b8ed1
                                                                                • Instruction Fuzzy Hash: 99218EB1604249AFDB10EF29DCC1DA737ECEF4A364B240459F9119B361CB76EC01AB60
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00FE6D3B
                                                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00FE6D4B
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00FE6D70
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$MoveWindow
                                                                                • String ID: Listbox
                                                                                • API String ID: 3315199576-2633736733
                                                                                • Opcode ID: da5dcefc45a9cdecacda336b18d0db3b489bb147a5b6686d8322bd057d693acb
                                                                                • Instruction ID: 5d8dac94bcdff7b4dfe4db26ef5f16ea3009b7efbe6cdc9b5430a309dfd3de49
                                                                                • Opcode Fuzzy Hash: da5dcefc45a9cdecacda336b18d0db3b489bb147a5b6686d8322bd057d693acb
                                                                                • Instruction Fuzzy Hash: 2B21D73260015CBFDF218F55CC45FBB37BAEF997A4F518124F9449B190C6719C51A7A0
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00FE7772
                                                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00FE7787
                                                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00FE7794
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: msctls_trackbar32
                                                                                • API String ID: 3850602802-1010561917
                                                                                • Opcode ID: 924360b5776a69f653ee655c8f3cf2e38a22db22b5a8a566127e9a25fdc7c900
                                                                                • Instruction ID: a03429f921e9e27cf7580d58d169536e6cb1e009cb3cb4d4d2adb443d0ffeafd
                                                                                • Opcode Fuzzy Hash: 924360b5776a69f653ee655c8f3cf2e38a22db22b5a8a566127e9a25fdc7c900
                                                                                • Instruction Fuzzy Hash: 83113A72644349BFEF206F62CC41FD77768FF88B64F110128F64196090C672E811EB10
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00F64B83,?), ref: 00F64C44
                                                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F64C56
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                • API String ID: 2574300362-1355242751
                                                                                • Opcode ID: 370fc6846ed482419f761d52f33fd4628dd7c95b322150ab5420537089f59839
                                                                                • Instruction ID: f15c8f31dc760ce462aa34d1352631de5c5140f140b5fbbb7e69031013e745be
                                                                                • Opcode Fuzzy Hash: 370fc6846ed482419f761d52f33fd4628dd7c95b322150ab5420537089f59839
                                                                                • Instruction Fuzzy Hash: 8DD01730910717CFD724AF32D94860A76E5AF45365B11C83E94A6DE264E678E884EA50
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00F64BD0,?,00F64DEF,?,010252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F64C11
                                                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F64C23
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                • API String ID: 2574300362-3689287502
                                                                                • Opcode ID: 6baca8943725bfba4fb6a63aa581a254a70d25b251bf736279019419ebd1ccf3
                                                                                • Instruction ID: c1231f16a2a9102ff67e2fb0222485c1320f7af06a309d3b3dc3cec85ffc52cd
                                                                                • Opcode Fuzzy Hash: 6baca8943725bfba4fb6a63aa581a254a70d25b251bf736279019419ebd1ccf3
                                                                                • Instruction Fuzzy Hash: 69D01230911717CFD7206F71D948607B6D5EF49355B11CC3E9485DA260E6B4D484D651
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,00FE1039), ref: 00FE0DF5
                                                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00FE0E07
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                • API String ID: 2574300362-4033151799
                                                                                • Opcode ID: 3090d612949645c05282a3611832d2d6c16f2d3477454e017021102a29babf5f
                                                                                • Instruction ID: 6cddbe5ae7d81a3bc7cfbf293b84b211c051ca23d6fb31ac9009cec2fc8717d6
                                                                                • Opcode Fuzzy Hash: 3090d612949645c05282a3611832d2d6c16f2d3477454e017021102a29babf5f
                                                                                • Instruction Fuzzy Hash: BCD0177091076ACFD7209FB6C84869676E5AF04266F118C3E94C6EA120EAB8D8D0DB51
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00FD8CF4,?,00FEF910), ref: 00FD90EE
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00FD9100
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: GetModuleHandleExW$kernel32.dll
                                                                                • API String ID: 2574300362-199464113
                                                                                • Opcode ID: c1cfd41ac8ce3798f89fe37fd2c8a9b0161294cbd2fe0cdbf41846b05b05609e
                                                                                • Instruction ID: 4c5f9d1d3ff75bd409d27eae76b4ebe2872870adbf28eb5df851060ac6b15b8e
                                                                                • Opcode Fuzzy Hash: c1cfd41ac8ce3798f89fe37fd2c8a9b0161294cbd2fe0cdbf41846b05b05609e
                                                                                • Instruction Fuzzy Hash: 83D01734914717CFDB209FB2D85860676E5AF05365B16C83F948ADA660E6B8C884EA90
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: LocalTime__swprintf
                                                                                • String ID: %.3d$WIN_XPe
                                                                                • API String ID: 2070861257-2409531811
                                                                                • Opcode ID: 0a32de6640462183ed0792f9e18fc917f061d52c53c126e5555afbacb2daf1a4
                                                                                • Instruction ID: c9735d7ac0626f3b69756e6d923965cd1d96b8bd099bc21ca7817b555c927652
                                                                                • Opcode Fuzzy Hash: 0a32de6640462183ed0792f9e18fc917f061d52c53c126e5555afbacb2daf1a4
                                                                                • Instruction Fuzzy Hash: 2FD017B7844118EACB009A90DC88EF9777CBB0A701F152462F946E2040E2269B98FA21
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: dae51d08387c71757dd391f41db00909a63a24b6be19927c1a341813d372ce31
                                                                                • Instruction ID: 6088a168a59e563c05e5fa8f67c88eded36db86cf163937efc002d7f5d71aad4
                                                                                • Opcode Fuzzy Hash: dae51d08387c71757dd391f41db00909a63a24b6be19927c1a341813d372ce31
                                                                                • Instruction Fuzzy Hash: 15C16C75A04216EFCB14DFA5C884AAEBBB5FF88314B148599E805EB251D730ED81EF90
                                                                                APIs
                                                                                • CharLowerBuffW.USER32(?,?), ref: 00FDE0BE
                                                                                • CharLowerBuffW.USER32(?,?), ref: 00FDE101
                                                                                  • Part of subcall function 00FDD7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00FDD7C5
                                                                                • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00FDE301
                                                                                • _memmove.LIBCMT ref: 00FDE314
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharLower$AllocVirtual_memmove
                                                                                • String ID:
                                                                                • API String ID: 3659485706-0
                                                                                • Opcode ID: 21b0fb0607262093ca94047a4ec1c0a775a1b495a5aa514cdbdfb5886c7f1807
                                                                                • Instruction ID: 0a4fa70e415231aab92ddebeb0402332d508c7f750aa32f51169edc2f69c901a
                                                                                • Opcode Fuzzy Hash: 21b0fb0607262093ca94047a4ec1c0a775a1b495a5aa514cdbdfb5886c7f1807
                                                                                • Instruction Fuzzy Hash: 4EC14971A08301DFC714EF28C880A6ABBE5FF89714F08896EF8999B351D735E945DB81
                                                                                APIs
                                                                                • CoInitialize.OLE32(00000000), ref: 00FD80C3
                                                                                • CoUninitialize.OLE32 ref: 00FD80CE
                                                                                  • Part of subcall function 00FBD56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00FBD5D4
                                                                                • VariantInit.OLEAUT32(?), ref: 00FD80D9
                                                                                • VariantClear.OLEAUT32(?), ref: 00FD83AA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                                • String ID:
                                                                                • API String ID: 780911581-0
                                                                                • Opcode ID: 4199a16e82b7c0b66891d7faaba8e2f16b0a3a994323474d3700632973f4c2b5
                                                                                • Instruction ID: 7683a2ae198c496471c0fb2dc6223d6d0e27732f79c470fef740db8ae26c794b
                                                                                • Opcode Fuzzy Hash: 4199a16e82b7c0b66891d7faaba8e2f16b0a3a994323474d3700632973f4c2b5
                                                                                • Instruction Fuzzy Hash: 3AA135756087019FCB00DF64C881B2AB7E9FF89364F484449F99A9B3A1CB74ED05EB42
                                                                                APIs
                                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00FF2C7C,?), ref: 00FB76EA
                                                                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00FF2C7C,?), ref: 00FB7702
                                                                                • CLSIDFromProgID.OLE32(?,?,00000000,00FEFB80,000000FF,?,00000000,00000800,00000000,?,00FF2C7C,?), ref: 00FB7727
                                                                                • _memcmp.LIBCMT ref: 00FB7748
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: FromProg$FreeTask_memcmp
                                                                                • String ID:
                                                                                • API String ID: 314563124-0
                                                                                • Opcode ID: 9b36626e694fc491471a7419688f781c7ad7cec9db95591d0c7a034fa434bfa7
                                                                                • Instruction ID: 79e851f23702974e3553cbbbb0b7d619178e1e3cef8a8c92f07ef676afeb1ae5
                                                                                • Opcode Fuzzy Hash: 9b36626e694fc491471a7419688f781c7ad7cec9db95591d0c7a034fa434bfa7
                                                                                • Instruction Fuzzy Hash: 09810B75A00209EFCB04DFA5C984EEEB7B9FF89315F204558E506AB250DB71AE06DF60
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$AllocClearCopyInitString
                                                                                • String ID:
                                                                                • API String ID: 2808897238-0
                                                                                • Opcode ID: 1a159c576b1614bec1d94f8c290f929b8724ff435145a57165c9579a675d16d6
                                                                                • Instruction ID: e046286710eac8c1a000b5ac96381c98fc81af507f43b68eb96b3fc1ca0c3f07
                                                                                • Opcode Fuzzy Hash: 1a159c576b1614bec1d94f8c290f929b8724ff435145a57165c9579a675d16d6
                                                                                • Instruction Fuzzy Hash: 2F51C4757043029ACF24EF66D891BBAB3E9AF45310F20C81FE586DB291DA7CD845AF01
                                                                                APIs
                                                                                • GetWindowRect.USER32(00A2E1C8,?), ref: 00FE9863
                                                                                • ScreenToClient.USER32(00000002,00000002), ref: 00FE9896
                                                                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00FE9903
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ClientMoveRectScreen
                                                                                • String ID:
                                                                                • API String ID: 3880355969-0
                                                                                • Opcode ID: 07ab650d83e832445c46482f5757b10ddeadf0ce0fcc886bdca11a5cabd4ca9d
                                                                                • Instruction ID: 623c2ea5d0ced3b74141a49ed57570da00541cf0f43afbfd8485c8f8986e4380
                                                                                • Opcode Fuzzy Hash: 07ab650d83e832445c46482f5757b10ddeadf0ce0fcc886bdca11a5cabd4ca9d
                                                                                • Instruction Fuzzy Hash: EB515134E04248EFCF20CF15C880AAE7BB5FF45360F548169F8659B2A1D7B1AE41DB60
                                                                                APIs
                                                                                • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00FB9AD2
                                                                                • __itow.LIBCMT ref: 00FB9B03
                                                                                  • Part of subcall function 00FB9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00FB9DBE
                                                                                • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00FB9B6C
                                                                                • __itow.LIBCMT ref: 00FB9BC3
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$__itow
                                                                                • String ID:
                                                                                • API String ID: 3379773720-0
                                                                                • Opcode ID: 5dc50b2a635a33c90fc6f45806e2498429af9d48c9fb567133d5a46c82690eec
                                                                                • Instruction ID: 91ba71728490fce96555bf45cb56737447d7706670279b70b64e27adfcb342b3
                                                                                • Opcode Fuzzy Hash: 5dc50b2a635a33c90fc6f45806e2498429af9d48c9fb567133d5a46c82690eec
                                                                                • Instruction Fuzzy Hash: 6E419270A04308ABDF11EF55DC45BEE7BB9EF84724F004059FA05A7291DBB49A44EB61
                                                                                APIs
                                                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 00FD69D1
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FD69E1
                                                                                  • Part of subcall function 00F69837: __itow.LIBCMT ref: 00F69862
                                                                                  • Part of subcall function 00F69837: __swprintf.LIBCMT ref: 00F698AC
                                                                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00FD6A45
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FD6A51
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$__itow__swprintfsocket
                                                                                • String ID:
                                                                                • API String ID: 2214342067-0
                                                                                • Opcode ID: 35317f769d8218e10e75a318f1fb81c0dbb98e3bc41a995d8e760357123ea489
                                                                                • Instruction ID: b0a91549af3da63e20499b66bf85a1b8a5f1836455ba0e98ac482fabee49bd31
                                                                                • Opcode Fuzzy Hash: 35317f769d8218e10e75a318f1fb81c0dbb98e3bc41a995d8e760357123ea489
                                                                                • Instruction Fuzzy Hash: 4E419275640200AFEB60AF64CC86F2977A9DB14B54F44811CFA59DF3C2DAB89D01A751
                                                                                APIs
                                                                                • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00FEF910), ref: 00FD64A7
                                                                                • _strlen.LIBCMT ref: 00FD64D9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _strlen
                                                                                • String ID:
                                                                                • API String ID: 4218353326-0
                                                                                • Opcode ID: 13da6dfa4ac60f63366b0127112ad9509c87fcfe9e0b17c3ab30fcda6176fafd
                                                                                • Instruction ID: 80b776db8e4277a1fe58b170919ec88943e2fe389d0eb9ad98a92097081f7519
                                                                                • Opcode Fuzzy Hash: 13da6dfa4ac60f63366b0127112ad9509c87fcfe9e0b17c3ab30fcda6176fafd
                                                                                • Instruction Fuzzy Hash: 1E41B631904104ABCB14FBA4EC95FEEB7A9AF44310F18815AF815DB396DB38EE44EB50
                                                                                APIs
                                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00FCB89E
                                                                                • GetLastError.KERNEL32(?,00000000), ref: 00FCB8C4
                                                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00FCB8E9
                                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00FCB915
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                • String ID:
                                                                                • API String ID: 3321077145-0
                                                                                • Opcode ID: 8b81f00341a4f016ed015fa667d16368efcd3b03bf1ef3f61c7b0d10be29d43e
                                                                                • Instruction ID: 941c22c7432971179399a721b5d13b3d79bf28acf3d00d8f3a731330709a26dd
                                                                                • Opcode Fuzzy Hash: 8b81f00341a4f016ed015fa667d16368efcd3b03bf1ef3f61c7b0d10be29d43e
                                                                                • Instruction Fuzzy Hash: D4416C39A00511DFCB10EF64C985A59BBE5EF89320F088088ED4A9F362CB74FD01EB91
                                                                                APIs
                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00FE88DE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: InvalidateRect
                                                                                • String ID:
                                                                                • API String ID: 634782764-0
                                                                                • Opcode ID: a819f2f22400d0838dd4461cbc895d5ec0a77d282978e826619d696fa4186045
                                                                                • Instruction ID: 18c725479f4a9b341380fed9e39a68ebf33ef78ac5ae2c330c9fd50a0ea69080
                                                                                • Opcode Fuzzy Hash: a819f2f22400d0838dd4461cbc895d5ec0a77d282978e826619d696fa4186045
                                                                                • Instruction Fuzzy Hash: 32310830E40188AFEB30BE56DC45BBC37A5FB057A0F544012F959E61E2CE71DA42B752
                                                                                APIs
                                                                                • ClientToScreen.USER32(?,?), ref: 00FEAB60
                                                                                • GetWindowRect.USER32(?,?), ref: 00FEABD6
                                                                                • PtInRect.USER32(?,?,00FEC014), ref: 00FEABE6
                                                                                • MessageBeep.USER32(00000000), ref: 00FEAC57
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                                                • String ID:
                                                                                • API String ID: 1352109105-0
                                                                                • Opcode ID: 569a8120dff141dabe7207e6942346c38c6ec43531358856e8e1628f1ef12704
                                                                                • Instruction ID: 3e0c6a5c398aeb17db56a3ee90cefb70eae61bab07431df0dd4319de51a156ea
                                                                                • Opcode Fuzzy Hash: 569a8120dff141dabe7207e6942346c38c6ec43531358856e8e1628f1ef12704
                                                                                • Instruction Fuzzy Hash: 0B418E30A00588DFCB21CF59D884BA97BF5FB89310F2480A9E855DF254C771F841EB92
                                                                                APIs
                                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00F961FB
                                                                                • __isleadbyte_l.LIBCMT ref: 00F96229
                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00F96257
                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00F9628D
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                • String ID:
                                                                                • API String ID: 3058430110-0
                                                                                • Opcode ID: 181108065d0b7cace2b26ba31ce33186e9889d39816ab40a9f41b9a2a990f5d4
                                                                                • Instruction ID: 5b10c1b1f7b60b61d45d644c0d8fbae7d01de71b58c32f57d7d01ab41ecdeb7e
                                                                                • Opcode Fuzzy Hash: 181108065d0b7cace2b26ba31ce33186e9889d39816ab40a9f41b9a2a990f5d4
                                                                                • Instruction Fuzzy Hash: FF319231A04246AFEF229F65CC44BAA7BA9FF41720F154129F864D71A1D731E990E750
                                                                                APIs
                                                                                • GetForegroundWindow.USER32 ref: 00FE4F02
                                                                                  • Part of subcall function 00FC3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FC365B
                                                                                  • Part of subcall function 00FC3641: GetCurrentThreadId.KERNEL32 ref: 00FC3662
                                                                                  • Part of subcall function 00FC3641: AttachThreadInput.USER32(00000000,?,00FC5005), ref: 00FC3669
                                                                                • GetCaretPos.USER32(?), ref: 00FE4F13
                                                                                • ClientToScreen.USER32(00000000,?), ref: 00FE4F4E
                                                                                • GetForegroundWindow.USER32 ref: 00FE4F54
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                • String ID:
                                                                                • API String ID: 2759813231-0
                                                                                • Opcode ID: f9a56263ad42b62bdd44314b6d8bea5c44dd424063a1040bcba7ec70780172a4
                                                                                • Instruction ID: 9f663a1bc75dde32beb17107f41107e239a19c8a8f251af6fc8de1851b6f6a84
                                                                                • Opcode Fuzzy Hash: f9a56263ad42b62bdd44314b6d8bea5c44dd424063a1040bcba7ec70780172a4
                                                                                • Instruction Fuzzy Hash: 8C31FAB1D00108AFDB10EFB5CD85AEEB7FDEF98304B10406AE415E7241DA75AE459BA1
                                                                                APIs
                                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00FC3C7A
                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00FC3C88
                                                                                • Process32NextW.KERNEL32(00000000,?), ref: 00FC3CA8
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00FC3D52
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                • String ID:
                                                                                • API String ID: 420147892-0
                                                                                • Opcode ID: 9602eaf2fed1049f8d61c98b881f51e9761b028256cdf653342ae9bcc30cfd0c
                                                                                • Instruction ID: c28d64753e014af1601c04cd132a3dc3f4300bbb3a4350f77cf6cc66cdc91485
                                                                                • Opcode Fuzzy Hash: 9602eaf2fed1049f8d61c98b881f51e9761b028256cdf653342ae9bcc30cfd0c
                                                                                • Instruction Fuzzy Hash: C63191711083499FD300EF50CD81FAFBBE8AF95364F50482DF482861A1EB759A49EB92
                                                                                APIs
                                                                                  • Part of subcall function 00F62612: GetWindowLongW.USER32(?,000000EB), ref: 00F62623
                                                                                • GetCursorPos.USER32(?), ref: 00FEC4D2
                                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00F9B9AB,?,?,?,?,?), ref: 00FEC4E7
                                                                                • GetCursorPos.USER32(?), ref: 00FEC534
                                                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00F9B9AB,?,?,?), ref: 00FEC56E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                • String ID:
                                                                                • API String ID: 2864067406-0
                                                                                • Opcode ID: 7e9450ec2889ff6bebbc276444d5259117915128c064a62e4c3238e39bcb0f9a
                                                                                • Instruction ID: aec5e79c60b3078b21e9e22d880ff46fafb4a885574652ce4a3333e7c54e8fa3
                                                                                • Opcode Fuzzy Hash: 7e9450ec2889ff6bebbc276444d5259117915128c064a62e4c3238e39bcb0f9a
                                                                                • Instruction Fuzzy Hash: EE31C335500198AFCB25CF59C898EFE7BB5EB09320F484065F9059B261C735AD51EFE4
                                                                                APIs
                                                                                  • Part of subcall function 00FB810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FB8121
                                                                                  • Part of subcall function 00FB810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FB812B
                                                                                  • Part of subcall function 00FB810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FB813A
                                                                                  • Part of subcall function 00FB810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FB8141
                                                                                  • Part of subcall function 00FB810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FB8157
                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00FB86A3
                                                                                • _memcmp.LIBCMT ref: 00FB86C6
                                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FB86FC
                                                                                • HeapFree.KERNEL32(00000000), ref: 00FB8703
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                • String ID:
                                                                                • API String ID: 1592001646-0
                                                                                • Opcode ID: 53cb361d3359a792633f0291a284c0796bfc8527709391211ded3d6dc3b39cbc
                                                                                • Instruction ID: f9f1f6d799eda0b280a7a59fd99793077141316dd3273214d322892e330b09bd
                                                                                • Opcode Fuzzy Hash: 53cb361d3359a792633f0291a284c0796bfc8527709391211ded3d6dc3b39cbc
                                                                                • Instruction Fuzzy Hash: 0F219D71E01108EFDB10DFA9C949BEEB7B9EF85354F158059E444AB241DB34AE06EF90
                                                                                APIs
                                                                                • __setmode.LIBCMT ref: 00F809AE
                                                                                  • Part of subcall function 00F65A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FC7896,?,?,00000000), ref: 00F65A2C
                                                                                  • Part of subcall function 00F65A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FC7896,?,?,00000000,?,?), ref: 00F65A50
                                                                                • _fprintf.LIBCMT ref: 00F809E5
                                                                                • OutputDebugStringW.KERNEL32(?), ref: 00FB5DBB
                                                                                  • Part of subcall function 00F84AAA: _flsall.LIBCMT ref: 00F84AC3
                                                                                • __setmode.LIBCMT ref: 00F80A1A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                                                • String ID:
                                                                                • API String ID: 521402451-0
                                                                                • Opcode ID: 52c7cc0d1a4db20b60078a05ad5c0cf5e626b249e733d86408548dc44f3c1d19
                                                                                • Instruction ID: ce47c1bd3d15853ed17c3b1e92ee58099f8e7bd7ff25d0163e995d8f777bbbcd
                                                                                • Opcode Fuzzy Hash: 52c7cc0d1a4db20b60078a05ad5c0cf5e626b249e733d86408548dc44f3c1d19
                                                                                • Instruction Fuzzy Hash: 05112732908246AFDB04B6B49C47AFEB7689F46320F640119F10567182EF7C684677A5
                                                                                APIs
                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00FD17A3
                                                                                  • Part of subcall function 00FD182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00FD184C
                                                                                  • Part of subcall function 00FD182D: InternetCloseHandle.WININET(00000000), ref: 00FD18E9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$CloseConnectHandleOpen
                                                                                • String ID:
                                                                                • API String ID: 1463438336-0
                                                                                • Opcode ID: b3c9d4c6ba26747a299d05153d6337dd197964d4107f2c161361679d91831486
                                                                                • Instruction ID: 974dad46fa0c590badb6968f69555cb5e3434f22605ee20530dde9b1641a20c4
                                                                                • Opcode Fuzzy Hash: b3c9d4c6ba26747a299d05153d6337dd197964d4107f2c161361679d91831486
                                                                                • Instruction Fuzzy Hash: 6421A172600605BFEB129F60DC41FBABBABFF89710F18402BFA1196751DB759811B7A0
                                                                                APIs
                                                                                • GetFileAttributesW.KERNEL32(?,00FEFAC0), ref: 00FC3A64
                                                                                • GetLastError.KERNEL32 ref: 00FC3A73
                                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FC3A82
                                                                                • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00FEFAC0), ref: 00FC3ADF
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                • String ID:
                                                                                • API String ID: 2267087916-0
                                                                                • Opcode ID: 8437214a7b3c2157dc89634036163d88c6cbfbabd7808b582f905469ee5043a7
                                                                                • Instruction ID: a4b6377da8d1f1a4b041fb316a6eab5cbd4b08159f4b90fe4634cea575932e76
                                                                                • Opcode Fuzzy Hash: 8437214a7b3c2157dc89634036163d88c6cbfbabd7808b582f905469ee5043a7
                                                                                • Instruction Fuzzy Hash: F521A6755083069FC300EF24C982D6A77E4AE593A4F108A2DF4D9C72A1D735DE59EB82
                                                                                APIs
                                                                                  • Part of subcall function 00FBF0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00FBDCD3,?,?,?,00FBEAC6,00000000,000000EF,00000119,?,?), ref: 00FBF0CB
                                                                                  • Part of subcall function 00FBF0BC: lstrcpyW.KERNEL32(00000000,?,?,00FBDCD3,?,?,?,00FBEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FBF0F1
                                                                                  • Part of subcall function 00FBF0BC: lstrcmpiW.KERNEL32(00000000,?,00FBDCD3,?,?,?,00FBEAC6,00000000,000000EF,00000119,?,?), ref: 00FBF122
                                                                                • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00FBEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FBDCEC
                                                                                • lstrcpyW.KERNEL32(00000000,?,?,00FBEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FBDD12
                                                                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,00FBEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FBDD46
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: lstrcmpilstrcpylstrlen
                                                                                • String ID: cdecl
                                                                                • API String ID: 4031866154-3896280584
                                                                                • Opcode ID: 3754abcf9e79eaf9ff5c8ae5b5830b903495130320387a4f156c5a2abaae0aaf
                                                                                • Instruction ID: 03094ad4c3a9a81fa26a813ad5ad5ca97c332bcbdec050afea86b5fa4b629f0b
                                                                                • Opcode Fuzzy Hash: 3754abcf9e79eaf9ff5c8ae5b5830b903495130320387a4f156c5a2abaae0aaf
                                                                                • Instruction Fuzzy Hash: 8311D63A200309EFCB25AF35CC45DBA77A8FF49350B40402AF846CB261FB759844EB91
                                                                                APIs
                                                                                • _free.LIBCMT ref: 00F95101
                                                                                  • Part of subcall function 00F8571C: __FF_MSGBANNER.LIBCMT ref: 00F85733
                                                                                  • Part of subcall function 00F8571C: __NMSG_WRITE.LIBCMT ref: 00F8573A
                                                                                  • Part of subcall function 00F8571C: RtlAllocateHeap.NTDLL(00A10000,00000000,00000001,00000000,?,?,?,00F80DD3,?), ref: 00F8575F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateHeap_free
                                                                                • String ID:
                                                                                • API String ID: 614378929-0
                                                                                • Opcode ID: 9d08eebcfdee3a2950f060c203f381b0511949d061da14fd3f2ca7c2d777e1cb
                                                                                • Instruction ID: bb7e64f17bdbdba372a2261f990e85af8e59f69217387bb0502d09dff4419ea7
                                                                                • Opcode Fuzzy Hash: 9d08eebcfdee3a2950f060c203f381b0511949d061da14fd3f2ca7c2d777e1cb
                                                                                • Instruction Fuzzy Hash: 3E110672900A15AFEF333F70AC4579D3B98AF84BB1B204529F9449A160DF39CC81B790
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00F644CF
                                                                                  • Part of subcall function 00F6407C: _memset.LIBCMT ref: 00F640FC
                                                                                  • Part of subcall function 00F6407C: _wcscpy.LIBCMT ref: 00F64150
                                                                                  • Part of subcall function 00F6407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F64160
                                                                                • KillTimer.USER32(?,00000001,?,?), ref: 00F64524
                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F64533
                                                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F9D4B9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                                • String ID:
                                                                                • API String ID: 1378193009-0
                                                                                • Opcode ID: 3b05e0e916e6a1ee12c3f11e6a9e68dda20a306626fd744bf0d63ca4671f8a80
                                                                                • Instruction ID: 88e6cea6d32721951eda1af9816a3e283424053c81fca6f05d59c0c61f088eeb
                                                                                • Opcode Fuzzy Hash: 3b05e0e916e6a1ee12c3f11e6a9e68dda20a306626fd744bf0d63ca4671f8a80
                                                                                • Instruction Fuzzy Hash: 7721C575904394AFFB72DB248C55BE7BBEC9B06314F14009EE69A9A181C3742E88EB51
                                                                                APIs
                                                                                  • Part of subcall function 00F65A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FC7896,?,?,00000000), ref: 00F65A2C
                                                                                  • Part of subcall function 00F65A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FC7896,?,?,00000000,?,?), ref: 00F65A50
                                                                                • gethostbyname.WSOCK32(?,?,?), ref: 00FD6399
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00FD63A4
                                                                                • _memmove.LIBCMT ref: 00FD63D1
                                                                                • inet_ntoa.WSOCK32(?), ref: 00FD63DC
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                                                • String ID:
                                                                                • API String ID: 1504782959-0
                                                                                • Opcode ID: 4baae2451b63c0efba58fbcc1b5d7fa1b2fd2793fbb7bc37cf2cbdd24d01ea55
                                                                                • Instruction ID: c1f5ef53bf7bb588afb3c2eb652d18a91679e2806a489c12a3d6a7bff12ff2df
                                                                                • Opcode Fuzzy Hash: 4baae2451b63c0efba58fbcc1b5d7fa1b2fd2793fbb7bc37cf2cbdd24d01ea55
                                                                                • Instruction Fuzzy Hash: 18112171900109AFCB04FBA4DD86DEE77B9EF15310B544065F505F7261DB389E18EB61
                                                                                APIs
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00FB8B61
                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FB8B73
                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FB8B89
                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FB8BA4
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID:
                                                                                • API String ID: 3850602802-0
                                                                                • Opcode ID: be117c7e9b464ae31e5afa18ad321c5fa937b96908975f9914fb0bf96e4a9f2a
                                                                                • Instruction ID: b80b846001710131e697021ef2e82259b25849a85a6ab86dd62302e552c761cd
                                                                                • Opcode Fuzzy Hash: be117c7e9b464ae31e5afa18ad321c5fa937b96908975f9914fb0bf96e4a9f2a
                                                                                • Instruction Fuzzy Hash: AE110A7A901218FFDB11DBA5CC85F9DBB78FB88750F204095E900B7250DA716E11EB94
                                                                                APIs
                                                                                  • Part of subcall function 00F62612: GetWindowLongW.USER32(?,000000EB), ref: 00F62623
                                                                                • DefDlgProcW.USER32(?,00000020,?), ref: 00F612D8
                                                                                • GetClientRect.USER32(?,?), ref: 00F9B5FB
                                                                                • GetCursorPos.USER32(?), ref: 00F9B605
                                                                                • ScreenToClient.USER32(?,?), ref: 00F9B610
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Client$CursorLongProcRectScreenWindow
                                                                                • String ID:
                                                                                • API String ID: 4127811313-0
                                                                                • Opcode ID: 666f6e3187f005995bd31df7516b5c5bd3f3574a9d18632ef097412f83f4a6eb
                                                                                • Instruction ID: de4e921321d7aa3906560050ee1270b33398a3c6052c3f35d6bc439ca775c459
                                                                                • Opcode Fuzzy Hash: 666f6e3187f005995bd31df7516b5c5bd3f3574a9d18632ef097412f83f4a6eb
                                                                                • Instruction Fuzzy Hash: 28115536A00159ABCB10EFA8D8999FE77B8FB05300F440456FA01E7240C734BA55ABA5
                                                                                APIs
                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FBFCED,?,00FC0D40,?,00008000), ref: 00FC115F
                                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00FBFCED,?,00FC0D40,?,00008000), ref: 00FC1184
                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FBFCED,?,00FC0D40,?,00008000), ref: 00FC118E
                                                                                • Sleep.KERNEL32(?,?,?,?,?,?,?,00FBFCED,?,00FC0D40,?,00008000), ref: 00FC11C1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CounterPerformanceQuerySleep
                                                                                • String ID:
                                                                                • API String ID: 2875609808-0
                                                                                • Opcode ID: 6fc5807a730cec9028afc4997908b979d3ff4d176ca0407486666135f15dae5f
                                                                                • Instruction ID: 148620f606a2411dedf3c977c1f36ad109a1b092a68d99c4034164430dad24f0
                                                                                • Opcode Fuzzy Hash: 6fc5807a730cec9028afc4997908b979d3ff4d176ca0407486666135f15dae5f
                                                                                • Instruction Fuzzy Hash: 92118231C0051EDBCF009FA4D995BEEBB7CFF0A711F544059DA40B6282CB389564EB91
                                                                                APIs
                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00FBD84D
                                                                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00FBD864
                                                                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00FBD879
                                                                                • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00FBD897
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Type$Register$FileLoadModuleNameUser
                                                                                • String ID:
                                                                                • API String ID: 1352324309-0
                                                                                • Opcode ID: 7face72016eafbc67100826fccaa4b88c9f44387ab6e359b6b8c176e4c4c4822
                                                                                • Instruction ID: e5fc3b23aca976ebc6844d2bbd267b1e806077ca9eec6a5874d9df3cb0d67430
                                                                                • Opcode Fuzzy Hash: 7face72016eafbc67100826fccaa4b88c9f44387ab6e359b6b8c176e4c4c4822
                                                                                • Instruction Fuzzy Hash: 50116175606704DBE320CF52DC48FD3BBBCEB00B01F108569A516D6490E7B1E549AFA2
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                • String ID:
                                                                                • API String ID: 3016257755-0
                                                                                • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                • Instruction ID: 10dad3c70f84cabc1013dfa31298d70cfcb634aa5c657541cb14e3cafae1f37b
                                                                                • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                • Instruction Fuzzy Hash: F9014C7245824ABBDF166F84CC42CEE3F62BB18364F598415FE1858031D336D9B1BB81
                                                                                APIs
                                                                                • GetWindowRect.USER32(?,?), ref: 00FEB2E4
                                                                                • ScreenToClient.USER32(?,?), ref: 00FEB2FC
                                                                                • ScreenToClient.USER32(?,?), ref: 00FEB320
                                                                                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00FEB33B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ClientRectScreen$InvalidateWindow
                                                                                • String ID:
                                                                                • API String ID: 357397906-0
                                                                                • Opcode ID: 7a875328d049ce722970b6808a23ab71373bb33463b71ee111d35361a843a333
                                                                                • Instruction ID: 647d524b00b9ce411f4033a88e11fdac02b7534bc105f1f499ce9adc040cc588
                                                                                • Opcode Fuzzy Hash: 7a875328d049ce722970b6808a23ab71373bb33463b71ee111d35361a843a333
                                                                                • Instruction Fuzzy Hash: FE1143B9D0024DEFDB41CFA9D8849EEBBB9FB08310F108166E914E3220D735AA559F50
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FEB644
                                                                                • _memset.LIBCMT ref: 00FEB653
                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,01026F20,01026F64), ref: 00FEB682
                                                                                • CloseHandle.KERNEL32 ref: 00FEB694
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _memset$CloseCreateHandleProcess
                                                                                • String ID:
                                                                                • API String ID: 3277943733-0
                                                                                • Opcode ID: c6b815389dd82187d9766c032109427ef71bd55c846e9c810f712cf90cbde104
                                                                                • Instruction ID: a099e6507d0db1411103d17d52a0f2a84188c37bc9835ea091b0738d36fc661e
                                                                                • Opcode Fuzzy Hash: c6b815389dd82187d9766c032109427ef71bd55c846e9c810f712cf90cbde104
                                                                                • Instruction Fuzzy Hash: 1BF089B25403547FE6602B61AC45FBB3E9CEB04355F404021FE48D5195D77B5C0097B8
                                                                                APIs
                                                                                • EnterCriticalSection.KERNEL32(?), ref: 00FC6BE6
                                                                                  • Part of subcall function 00FC76C4: _memset.LIBCMT ref: 00FC76F9
                                                                                • _memmove.LIBCMT ref: 00FC6C09
                                                                                • _memset.LIBCMT ref: 00FC6C16
                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 00FC6C26
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalSection_memset$EnterLeave_memmove
                                                                                • String ID:
                                                                                • API String ID: 48991266-0
                                                                                • Opcode ID: 35457ddfc996c290802e0d8824747491c90ebf0adde58c973b057cb9b473e2fc
                                                                                • Instruction ID: fe50d48fffc8300f6b03624b705bbf0e387a9b59aa2432d3f56809762e1f1f24
                                                                                • Opcode Fuzzy Hash: 35457ddfc996c290802e0d8824747491c90ebf0adde58c973b057cb9b473e2fc
                                                                                • Instruction Fuzzy Hash: 7AF05E3A200204ABCF416F55DC85E8ABF29EF45360F04C065FE085E227DB35E915EBB4
                                                                                APIs
                                                                                • GetSysColor.USER32(00000008), ref: 00F62231
                                                                                • SetTextColor.GDI32(?,000000FF), ref: 00F6223B
                                                                                • SetBkMode.GDI32(?,00000001), ref: 00F62250
                                                                                • GetStockObject.GDI32(00000005), ref: 00F62258
                                                                                • GetWindowDC.USER32(?,00000000), ref: 00F9BE83
                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 00F9BE90
                                                                                • GetPixel.GDI32(00000000,?,00000000), ref: 00F9BEA9
                                                                                • GetPixel.GDI32(00000000,00000000,?), ref: 00F9BEC2
                                                                                • GetPixel.GDI32(00000000,?,?), ref: 00F9BEE2
                                                                                • ReleaseDC.USER32(?,00000000), ref: 00F9BEED
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                                • String ID:
                                                                                • API String ID: 1946975507-0
                                                                                • Opcode ID: 3ad2cd3568147e055c4d09dafdd6fe73a27b662af7eea2b39ef901fa1e480d71
                                                                                • Instruction ID: 5bb19b0bd7da4d253727dd0908f8ef149d56ecaed850aab4084f44736ee7f907
                                                                                • Opcode Fuzzy Hash: 3ad2cd3568147e055c4d09dafdd6fe73a27b662af7eea2b39ef901fa1e480d71
                                                                                • Instruction Fuzzy Hash: D6E03031504288AAEF215FA4FC4D7D83B15EB55336F048366FA69880E187754584EB11
                                                                                APIs
                                                                                • GetCurrentThread.KERNEL32 ref: 00FB871B
                                                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,00FB82E6), ref: 00FB8722
                                                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00FB82E6), ref: 00FB872F
                                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,00FB82E6), ref: 00FB8736
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentOpenProcessThreadToken
                                                                                • String ID:
                                                                                • API String ID: 3974789173-0
                                                                                • Opcode ID: 072a7fe79bef2351d236ec112870cb89f74e1b4b8dcf81842ed5dfa7d9f5ea35
                                                                                • Instruction ID: 5d81b0a006217cc9984825c8d135e08b146c01da6f5c8734723ee8fb66044bbe
                                                                                • Opcode Fuzzy Hash: 072a7fe79bef2351d236ec112870cb89f74e1b4b8dcf81842ed5dfa7d9f5ea35
                                                                                • Instruction Fuzzy Hash: FCE08636A122569BD7205FB16D4CB963BACEF907E5F258828B345CE040DA34844AEB50
                                                                                APIs
                                                                                • OleSetContainedObject.OLE32(?,00000001), ref: 00FBB4BE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ContainedObject
                                                                                • String ID: AutoIt3GUI$Container
                                                                                • API String ID: 3565006973-3941886329
                                                                                • Opcode ID: 9ef521781819a88491c124f1451c823bf72f34dd08226da2f15f9def063daa7f
                                                                                • Instruction ID: cc51a49e9d6a5fc2314b5daa2ca46406747e70cda436a6d56e68162ac1cd9684
                                                                                • Opcode Fuzzy Hash: 9ef521781819a88491c124f1451c823bf72f34dd08226da2f15f9def063daa7f
                                                                                • Instruction Fuzzy Hash: 77916A71600601AFDB64DF65C884BAABBE5FF49710F24846DF94ACB2A1DBB0E841DF50
                                                                                APIs
                                                                                  • Part of subcall function 00F7FC86: _wcscpy.LIBCMT ref: 00F7FCA9
                                                                                  • Part of subcall function 00F69837: __itow.LIBCMT ref: 00F69862
                                                                                  • Part of subcall function 00F69837: __swprintf.LIBCMT ref: 00F698AC
                                                                                • __wcsnicmp.LIBCMT ref: 00FCB02D
                                                                                • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00FCB0F6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                                                • String ID: LPT
                                                                                • API String ID: 3222508074-1350329615
                                                                                • Opcode ID: a198756cb824f935c9a88fe1c400ec2547f66d5eb706d197f905775b203565b9
                                                                                • Instruction ID: 3445e5f8ce2b8492587d4c51dc0b1f5bba45d4bd3399a87a8d663cd4a5041ad7
                                                                                • Opcode Fuzzy Hash: a198756cb824f935c9a88fe1c400ec2547f66d5eb706d197f905775b203565b9
                                                                                • Instruction Fuzzy Hash: CC616E76E00216AFCB14DF94C993FAEB7B8EB08310F14406EF916AB251D774AE44EB51
                                                                                APIs
                                                                                • Sleep.KERNEL32(00000000), ref: 00F72968
                                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 00F72981
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: GlobalMemorySleepStatus
                                                                                • String ID: @
                                                                                • API String ID: 2783356886-2766056989
                                                                                • Opcode ID: 78a268f8b52062619bc464d9d3956a6d4e9822a272b15030a21a8b2222aa1f9f
                                                                                • Instruction ID: 868706ec6be733eef579d6244ec42a2de4fbb651a4710a61c06410ac722714d9
                                                                                • Opcode Fuzzy Hash: 78a268f8b52062619bc464d9d3956a6d4e9822a272b15030a21a8b2222aa1f9f
                                                                                • Instruction Fuzzy Hash: 2A5134724087449BD320AF60DC86BAFBBF8FB85344F81885DF2D8810A5DF758529DB66
                                                                                APIs
                                                                                  • Part of subcall function 00F64F0B: __fread_nolock.LIBCMT ref: 00F64F29
                                                                                • _wcscmp.LIBCMT ref: 00FC9824
                                                                                • _wcscmp.LIBCMT ref: 00FC9837
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscmp$__fread_nolock
                                                                                • String ID: FILE
                                                                                • API String ID: 4029003684-3121273764
                                                                                • Opcode ID: 5398f71eb575948ae28d3c99be8e0655dc54a261c70ffbf3d5e6285ef83ae88d
                                                                                • Instruction ID: 0e4de7a4de64f706e8ac23d1ff3b293760914833bf8a61b46164eb5750937b47
                                                                                • Opcode Fuzzy Hash: 5398f71eb575948ae28d3c99be8e0655dc54a261c70ffbf3d5e6285ef83ae88d
                                                                                • Instruction Fuzzy Hash: CD41D971A0420ABADF20ABA4CC5AFEFB7BDDF85710F010469F904E7181D6B5AA049B61
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FD259E
                                                                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00FD25D4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CrackInternet_memset
                                                                                • String ID: |
                                                                                • API String ID: 1413715105-2343686810
                                                                                • Opcode ID: b2e77f4e48990c3b52bfe9a410c450a7f2d930fbe636f51740eef51a48feba4f
                                                                                • Instruction ID: 37274a2797d0ca177f9e3a60a18b110d8ca749d01cd2b2285d7e61ea0e37f0d0
                                                                                • Opcode Fuzzy Hash: b2e77f4e48990c3b52bfe9a410c450a7f2d930fbe636f51740eef51a48feba4f
                                                                                • Instruction Fuzzy Hash: AC312C71800219EBCF41EFA1CC85EEEBFB9FF18310F14005AF915A6265DB359955EBA0
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00FE7B61
                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00FE7B76
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: '
                                                                                • API String ID: 3850602802-1997036262
                                                                                • Opcode ID: dfcbf58e6fed74f7ee95ea793a61430d4f0f43c9d13f3fb2842b5f541c2ee8ee
                                                                                • Instruction ID: 8fe53a752a8bf7b9c47df52a65a7975efd695902db4a63322612843fdc3ef5ef
                                                                                • Opcode Fuzzy Hash: dfcbf58e6fed74f7ee95ea793a61430d4f0f43c9d13f3fb2842b5f541c2ee8ee
                                                                                • Instruction Fuzzy Hash: 2D413A74A0434A9FDB14DF65C880BEABBB9FF08700F10016AE904EB395E770A941DF90
                                                                                APIs
                                                                                • DestroyWindow.USER32(?,?,?,?), ref: 00FE6B17
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00FE6B53
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$DestroyMove
                                                                                • String ID: static
                                                                                • API String ID: 2139405536-2160076837
                                                                                • Opcode ID: 1ebdf5f376b03a96a81345658baf203997e5448147fd1a8a24bd2d1b912969af
                                                                                • Instruction ID: cf2b1610fff54c96efe59af30e87e16903491904f8cfafe46c49bb5374226a44
                                                                                • Opcode Fuzzy Hash: 1ebdf5f376b03a96a81345658baf203997e5448147fd1a8a24bd2d1b912969af
                                                                                • Instruction Fuzzy Hash: 1B31AF71600248AEDB109F65CC80BFB77B9FF98764F108629F9A5D7190DB35AC81E760
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FC2911
                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FC294C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: InfoItemMenu_memset
                                                                                • String ID: 0
                                                                                • API String ID: 2223754486-4108050209
                                                                                • Opcode ID: a2e043457c82920f0938309e29653bd64e16701c42f9a2649bc928bf81c0e703
                                                                                • Instruction ID: 887e2ed7a870d52b4727c450d2eb6c4334f9572db971490f3cf7a2fb18d039d7
                                                                                • Opcode Fuzzy Hash: a2e043457c82920f0938309e29653bd64e16701c42f9a2649bc928bf81c0e703
                                                                                • Instruction Fuzzy Hash: 3231C332A00306DBEBA4DE58CE86FEEBBB4EF45360F14001DE985A61A0D7B09944FB51
                                                                                APIs
                                                                                • __snwprintf.LIBCMT ref: 00FD3A66
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: __snwprintf_memmove
                                                                                • String ID: , $$AUTOITCALLVARIABLE%d
                                                                                • API String ID: 3506404897-2584243854
                                                                                • Opcode ID: c5342d24eefb366c6d931e7e797260d420c0117dafad74041781d0f4e861ddef
                                                                                • Instruction ID: 3332e34adc3acaff090a9b10b058e9a150ada0a5a2bce32eab4b0feb2d0fd677
                                                                                • Opcode Fuzzy Hash: c5342d24eefb366c6d931e7e797260d420c0117dafad74041781d0f4e861ddef
                                                                                • Instruction Fuzzy Hash: CB219E35B00219ABCF10EF64CC82AAE77B9EF44700F04445AF545AB242DB3DEA45EB62
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00FE6761
                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FE676C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: Combobox
                                                                                • API String ID: 3850602802-2096851135
                                                                                • Opcode ID: ea417ecf9b1c74983fd4d889e95f65fbbc10cc131fd2d8f6956ae12a75d496e9
                                                                                • Instruction ID: 0a7fe66a86027b39941be1576754307f7bbb62f45b4d8f789eb22a7b44ed0c7d
                                                                                • Opcode Fuzzy Hash: ea417ecf9b1c74983fd4d889e95f65fbbc10cc131fd2d8f6956ae12a75d496e9
                                                                                • Instruction Fuzzy Hash: D811B27160024CAFEF218F55CC80EAB3B6AEB583A8F100129F914DB290DA359C51A7A0
                                                                                APIs
                                                                                  • Part of subcall function 00F61D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F61D73
                                                                                  • Part of subcall function 00F61D35: GetStockObject.GDI32(00000011), ref: 00F61D87
                                                                                  • Part of subcall function 00F61D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F61D91
                                                                                • GetWindowRect.USER32(00000000,?), ref: 00FE6C71
                                                                                • GetSysColor.USER32(00000012), ref: 00FE6C8B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                • String ID: static
                                                                                • API String ID: 1983116058-2160076837
                                                                                • Opcode ID: 7b829930431646b1daf2244f3cc80f34a840471f1331aa3b243d69d4bc931e83
                                                                                • Instruction ID: 4f43a0cb5795329e2b910df31416f91ad3116e45cf855a897bbe5eb46d8ae3ea
                                                                                • Opcode Fuzzy Hash: 7b829930431646b1daf2244f3cc80f34a840471f1331aa3b243d69d4bc931e83
                                                                                • Instruction Fuzzy Hash: 20215672A10249AFDF04DFA9CC45AEA7BB8FB08355F144628F996D2250E735E850EB60
                                                                                APIs
                                                                                • GetWindowTextLengthW.USER32(00000000), ref: 00FE69A2
                                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00FE69B1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: LengthMessageSendTextWindow
                                                                                • String ID: edit
                                                                                • API String ID: 2978978980-2167791130
                                                                                • Opcode ID: 6dedd289811589e7c3f1de58f46ff8cc094e3ea4faf4c59654ab9093aaed9957
                                                                                • Instruction ID: adf122818ba3ca6ad09434a7dfaf9dc6c2597c904e1e5b126aa2a61176f58373
                                                                                • Opcode Fuzzy Hash: 6dedd289811589e7c3f1de58f46ff8cc094e3ea4faf4c59654ab9093aaed9957
                                                                                • Instruction Fuzzy Hash: 2C119D71500288ABEB108E659C80AEF3669EB253B4F104724F9A1D61D1C735DC50B760
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00FC2A22
                                                                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00FC2A41
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: InfoItemMenu_memset
                                                                                • String ID: 0
                                                                                • API String ID: 2223754486-4108050209
                                                                                • Opcode ID: 9a22af351031c864b951beb52ca234f5c96d723fc707f6d5a52a0ec59f09264a
                                                                                • Instruction ID: 27b12fd936272025faf67254be8981df634c504a76fce27f45ad374583c0c329
                                                                                • Opcode Fuzzy Hash: 9a22af351031c864b951beb52ca234f5c96d723fc707f6d5a52a0ec59f09264a
                                                                                • Instruction Fuzzy Hash: 4911E932D0121AABCB70DF58DD46FEA77B8EB46320F144039E855E7250D778AD05E791
                                                                                APIs
                                                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00FD222C
                                                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00FD2255
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$OpenOption
                                                                                • String ID: <local>
                                                                                • API String ID: 942729171-4266983199
                                                                                • Opcode ID: 1ab932ee08c0164f9022404b8a745171627212b012b1fec5f7cdcfa6fc11c6db
                                                                                • Instruction ID: f64d8df39daeb22b37fb29615af733fb00a2269934115f99ddb8f95467bc094a
                                                                                • Opcode Fuzzy Hash: 1ab932ee08c0164f9022404b8a745171627212b012b1fec5f7cdcfa6fc11c6db
                                                                                • Instruction Fuzzy Hash: E011E071901265BAEB258F118C84FBBFBA9FF26362F14822BF90486200D3705984E6F0
                                                                                APIs
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                  • Part of subcall function 00FBAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FBAABC
                                                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00FB8E73
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameSend_memmove
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 372448540-1403004172
                                                                                • Opcode ID: b4e189db3986670ef0d04492faeb1c595ee6da0356c81b33b3983ad3d5163427
                                                                                • Instruction ID: b87f65b6bfe95d6c209ee8a85e319942bb3ddc7c861f18983414283de40ccf11
                                                                                • Opcode Fuzzy Hash: b4e189db3986670ef0d04492faeb1c595ee6da0356c81b33b3983ad3d5163427
                                                                                • Instruction Fuzzy Hash: 3E012871A41218ABCB14FBE5CC419FE736CEF41360F000A19F871672D1DE39980CEA60
                                                                                APIs
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                  • Part of subcall function 00FBAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FBAABC
                                                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 00FB8D6B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameSend_memmove
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 372448540-1403004172
                                                                                • Opcode ID: 699bbc1e331e9e33d83077cb39e2736e11e7f173677f724860034e98344457d1
                                                                                • Instruction ID: 646d1faeba43f8af229d901c1431d3ca6974780977144e8ca5261567108c3426
                                                                                • Opcode Fuzzy Hash: 699bbc1e331e9e33d83077cb39e2736e11e7f173677f724860034e98344457d1
                                                                                • Instruction Fuzzy Hash: 6C01F771B41108ABCB15EBA1CD92EFE73ACDF15350F10001AB84167291DE189E0CFA71
                                                                                APIs
                                                                                  • Part of subcall function 00F67DE1: _memmove.LIBCMT ref: 00F67E22
                                                                                  • Part of subcall function 00FBAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FBAABC
                                                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00FB8DEE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameSend_memmove
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 372448540-1403004172
                                                                                • Opcode ID: 9210fb8ea9c1c78e21c27c97d9dc45f45906056fe3646146af0d904671b53cc4
                                                                                • Instruction ID: 64eb0ae2a1645b4a025be2f70e4006a56ee03ed328f57eebe684fe9b8f9d6c92
                                                                                • Opcode Fuzzy Hash: 9210fb8ea9c1c78e21c27c97d9dc45f45906056fe3646146af0d904671b53cc4
                                                                                • Instruction Fuzzy Hash: BB01A271A41109A7DB11EBA5CD82AFE77AC9F25350F10041AB845B7292DE298E0DFA71
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: ClassName_wcscmp
                                                                                • String ID: #32770
                                                                                • API String ID: 2292705959-463685578
                                                                                • Opcode ID: c2f5693e7ffc4d98119e8708d19f30263761d7ec0f65db6bfd58e9dd272e2e03
                                                                                • Instruction ID: be28af4bbb60c5f9432c6f1490044a25d05f8ca20f87d1400adfd780af64ac73
                                                                                • Opcode Fuzzy Hash: c2f5693e7ffc4d98119e8708d19f30263761d7ec0f65db6bfd58e9dd272e2e03
                                                                                • Instruction Fuzzy Hash: 2CE09232A002292AD720AA99AC4AFE7FBACEB45B70F01016BFD44D7051D575AB4587E0
                                                                                APIs
                                                                                  • Part of subcall function 00F9B314: _memset.LIBCMT ref: 00F9B321
                                                                                  • Part of subcall function 00F80940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00F9B2F0,?,?,?,00F6100A), ref: 00F80945
                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,00F6100A), ref: 00F9B2F4
                                                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00F6100A), ref: 00F9B303
                                                                                Strings
                                                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00F9B2FE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                • API String ID: 3158253471-631824599
                                                                                • Opcode ID: 80c33a8f12f7dd00a706fc8495b5f0933c264688b4368130d6212d9462328f22
                                                                                • Instruction ID: 97347e549d851aef2a8583e1ede7b8749b9943dc1a2b6c0ee2c2f4287a4e9330
                                                                                • Opcode Fuzzy Hash: 80c33a8f12f7dd00a706fc8495b5f0933c264688b4368130d6212d9462328f22
                                                                                • Instruction Fuzzy Hash: 98E092702007408FEB31DF28E9087427BE8AF00714F00896CE496CB381EBB8D808DBA1
                                                                                APIs
                                                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00FB7C82
                                                                                  • Part of subcall function 00F83358: _doexit.LIBCMT ref: 00F83362
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Message_doexit
                                                                                • String ID: AutoIt$Error allocating memory.
                                                                                • API String ID: 1993061046-4017498283
                                                                                • Opcode ID: 9a1fd22cfbf509450371c531617cc7b2cacd2c9e93a3ad65267dced7b2a34a3c
                                                                                • Instruction ID: 1bae530511593e0c49c761942a574f14014931c6153a760573e700203a536805
                                                                                • Opcode Fuzzy Hash: 9a1fd22cfbf509450371c531617cc7b2cacd2c9e93a3ad65267dced7b2a34a3c
                                                                                • Instruction Fuzzy Hash: 13D05B323C435C37D11532A5AC07FDA7A484F05F56F040415FB145E5E34DD9958172E9
                                                                                APIs
                                                                                • GetSystemDirectoryW.KERNEL32(?), ref: 00FA1775
                                                                                  • Part of subcall function 00FDBFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,00FA195E,?), ref: 00FDBFFE
                                                                                  • Part of subcall function 00FDBFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00FDC010
                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00FA196D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                                                • String ID: WIN_XPe
                                                                                • API String ID: 582185067-3257408948
                                                                                • Opcode ID: bed2de9f2223be02a43ad44640597b1fb522ac3b4e023190162271f47f9e4e0d
                                                                                • Instruction ID: 15ede1fd0a2c253fa72d5bffe05ae826fd946e1849d9b6af47a2f1fd5c979fec
                                                                                • Opcode Fuzzy Hash: bed2de9f2223be02a43ad44640597b1fb522ac3b4e023190162271f47f9e4e0d
                                                                                • Instruction Fuzzy Hash: 5FF039B180000CDFCB25DF90CA84BECBBF8BB08301F251095E442A6090C7354F88EF60
                                                                                APIs
                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FE59AE
                                                                                • PostMessageW.USER32(00000000), ref: 00FE59B5
                                                                                  • Part of subcall function 00FC5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FC52BC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: FindMessagePostSleepWindow
                                                                                • String ID: Shell_TrayWnd
                                                                                • API String ID: 529655941-2988720461
                                                                                • Opcode ID: 52e649886e9a20a0219cf8c897c8da0a0c54728e5a255399d49533dba9d1935a
                                                                                • Instruction ID: eb3d86151bc4fec2ec55d25e7a59e9a52e4e1657485b061850f59f0ed6fb7a0b
                                                                                • Opcode Fuzzy Hash: 52e649886e9a20a0219cf8c897c8da0a0c54728e5a255399d49533dba9d1935a
                                                                                • Instruction Fuzzy Hash: 53D0C9313803557BE664AB709D8FFD67A54AB54B50F040829B246AE1E4C9E4A804D654
                                                                                APIs
                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FE596E
                                                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00FE5981
                                                                                  • Part of subcall function 00FC5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FC52BC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2128452476.0000000000F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F60000, based on PE: true
                                                                                • Associated: 00000000.00000002.2128227422.0000000000F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000000FEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128503678.0000000001014000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128550916.000000000101E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2128603791.0000000001027000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_f60000_ZeAX5i7cGB.jbxd
                                                                                Similarity
                                                                                • API ID: FindMessagePostSleepWindow
                                                                                • String ID: Shell_TrayWnd
                                                                                • API String ID: 529655941-2988720461
                                                                                • Opcode ID: cb9c5246614d162bbc4a86743247549ecbfc559f8b97fb5e5521a2409d3007bf
                                                                                • Instruction ID: 2d591cda2ad461a190fb62c2c69893a37b2c2095f277389c67f394ff22d99b36
                                                                                • Opcode Fuzzy Hash: cb9c5246614d162bbc4a86743247549ecbfc559f8b97fb5e5521a2409d3007bf
                                                                                • Instruction Fuzzy Hash: 43D0C931384355B7E664AB709D8FFD67A54AB50B50F040829B24AAE1E4C9E4A804D654